Latest Content tagged with Security Management
Operational technology (OT) has long been hiding in the factories and sites of industrial installations, but things are changing.
By combining, two threat actors leveraged their own specific areas of expertise into one highly efficient – and private &ndash tool.
BlackBerry Cylance threat researchers Anuj Soni, Jordan Barth and Brian Marks recently discovered obfuscated malware code that was embedded within WAV audio files.
This October we visited the trade fair it-sa, which counts as one of the more important IT security exhibitions in the world. They hosted more than 750 security vendors from 25 countries who presented their solutions for the international market.
Palo Alto Network's Unit 42 has found the first cryptocurrency miner malware that spreads like a worm through the use of Docker containers.
Top Tips for Blocking pwned [email protected]$$wOrds in Your Organization
Tuesday, October 29, 2019
12 p.m. New York/ 4:00 p.m. London
Podcast: Infrastructure Hunting – Stopping Bad Actors in Their Tracks
Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.
Podcast: Digital Transformation, SD-WAN & Optimal Security
Dan Reis chats to Cybera's Josh Flynn about how to achieve digital transformation without sacrificing security.
Tweets by Security_Now_
like us on facebook