Security

MalwareBytesSecurity

The Advanced Persistent Threat files: APT10

Credit to Author: William Tsing| Date: Wed, 16 Jan 2019 17:00:00 +0000

While security companies are getting good at analyzing the tactics of nation-state threat actors, they still struggle with placing these actions in context and making solid risk assessments. So in this series, we’re going to take a look at a few APT groups, and see how they fit into the larger threat landscape—starting with APT10.

Categories:

Tags:

(Read more…)

The post The Advanced Persistent Threat files: APT10 appeared first on Malwarebytes Labs.

Read More
MicrosoftSecurity

Step 3. Protect your identities: top 10 actions to secure your environment

Credit to Author: Debbie Seres| Date: Wed, 16 Jan 2019 17:00:18 +0000

The Top 10 actions to secure your environment series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In todays installment, Step 3. Protect your identities, youll learn how to define security policies to protect individual user identities against account compromise and protect your administrative accounts.

The post Step 3. Protect your identities: top 10 actions to secure your environment appeared first on Microsoft Secure.

Read More
SecuritySophos

Safeguard Encryption “worth checking out” says SC Magazine

Credit to Author: mattcookesophoscom| Date: Wed, 16 Jan 2019 10:32:52 +0000

SC Magazine&#8217;s labs team has taken a look at Sophos Safeguard Encryption. We&#8217;re delighted to say they scored the product a massive 4.75 out of 5! &#8230;adding the extra layer of file security, location-based file encryption and application-based encryption, makes this product worth checking out. You can read the full review here. If you’re looking [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/GWaJe5c_asY” height=”1″ width=”1″ alt=””/>

Read More