#cyberfraud | #cybercriminals | The Top 20 Security Predictions for 2020

But what’s the ‘main thing’ when navigating technology as we enter 2020? The simple answer is… Cybersecurity. As innovation explodes into every area of our lives, cybersecurity is providing the glue that can enable the good and disable the bad for impl…

The Top 20 Security Predictions for 2020 – Government Technology

“The main thing is to keep the main thing the main thing.” These wise words of world-renowned business author Stephen Covey challenge each of us as we stand on the precipice of a new decade. But what’s the ‘main thing’ when navigating technology as we …

What is Sandboxing? Why Does Your Endpoint Security Need It?

One particular feature that not every endpoint security solution offers is sandboxing: a tool that analyzes suspicious files before they can deploy. But what is sandboxing? And how much weight should enterprises give to its inclusion or exclusion when …

WikiLeaks Releases “Vault7” Details of CIA Data Intrusion, Monitoring, Tracking and Collection…

) Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency. The first full part of the s…

Mirai Variant ECHOBOT Resurfaces with 13 Previously Unexploited Vulnerabilities

Executive Summary. Since the discovery of the Mirai variant using the binary name ECHOBOT in May 2019, it has resurfaced from time to time, using new infrastructure, and more remarkably, adding to the list of vulnerabilities it scans for, as a means to…