Security

MalwareBytesSecurity

A week in security (February 18 – 24)

Credit to Author: Malwarebytes Labs| Date: Mon, 25 Feb 2019 16:52:20 +0000

A roundup of security news from February 18–24 covering our most recent blogs and happenings in the world of infosec, including ATM hacking, Facebook location settings, spear phishing, and more.

Categories:

Tags:

(Read more…)

The post A week in security (February 18 – 24) appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Max Schrems: lawyer, regulator, international man of privacy

Credit to Author: davidruiz| Date: Mon, 25 Feb 2019 16:00:00 +0000

Almost 10 years ago, privacy advocate Max Schrems and the European Union began separate efforts to change the way the world thinks about online privacy. Thanks to them, we now have GDPR.

Categories:

Tags:

(Read more…)

The post Max Schrems: lawyer, regulator, international man of privacy appeared first on Malwarebytes Labs.

Read More
SecuritySophos

Providing context to Zero Trust and Microsoft Intune with Sophos Mobile Security

Credit to Author: Matt Cooke| Date: Sun, 24 Feb 2019 13:00:25 +0000

The corporate network perimeter defensive line no longer exists. With increased attack sophistication and insider threats, organizations can&#8217;t guarantee that everything on the inside of their network can be trusted. This is the principle of Zero Trust architecture. These days, organizations need to build controls immediately around the individual data assets, wherever they reside. Administrators [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/XjVD_dGJXyQ” height=”1″ width=”1″ alt=””/>

Read More
SecuritySophos

Providing context to Zero Trust and Microsoft Intune with Sophos Mobile Control

Credit to Author: Matt Cooke| Date: Sun, 24 Feb 2019 13:00:25 +0000

The corporate network perimeter defensive line no longer exists. With increased attack sophistication and insider threats, organizations can&#8217;t guarantee that everything on the inside of their network can be trusted. This is the principle of Zero Trust architecture. These days, organizations need to build controls immediately around the individual data assets, wherever they reside. Administrators [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/KdKRyMB9Bck” height=”1″ width=”1″ alt=””/>

Read More