Cybersecurity for journalists: How to defeat threat actors and defend freedom of the press

Credit to Author: Pieter Arntz| Date: Fri, 01 Nov 2019 20:26:48 +0000

When it comes to cybersecurity, journalists need to protect themselves, their sources, and the freedom of the press. Which methods should they use?

Categories:

Tags:

(Read more…)

The post Cybersecurity for journalists: How to defeat threat actors and defend freedom of the press appeared first on Malwarebytes Labs.

Read more

The Data Economy: 3 paths to value

Credit to Author: Hervé Coureil| Date: Thu, 26 Sep 2019 13:24:51 +0000

Transforming data into revenue? That is the burning question in today’s boardrooms across industries. While there are many enablers for turning data into business insights or predictions, the question remains:… Read more »

The post The Data Economy: 3 paths to value appeared first on Schneider Electric Blog.

Read more

What role does data destruction play in cybersecurity?

Credit to Author: Kayla Matthews| Date: Fri, 20 Sep 2019 18:18:26 +0000

Organizations are keen to protect the personal data of their employees and customers from cyberattack. But what about the data they no longer need? We discuss why data destruction is just as important to cybersecurity as protection.

Categories:

Tags:

(Read more…)

The post What role does data destruction play in cybersecurity? appeared first on Malwarebytes Labs.

Read more

Hacking with AWS: incorporating leaky buckets into your OSINT workflow

Credit to Author: Vasilios Hioureas| Date: Fri, 13 Sep 2019 20:44:52 +0000

When penetration testing for an organization, what OSINT tactics can researchers employ? We discuss how hacking with AWS buckets can provide more recon data and uncover any leaks.

Categories:

Tags:

(Read more…)

The post Hacking with AWS: incorporating leaky buckets into your OSINT workflow appeared first on Malwarebytes Labs.

Read more

Leaks and breaches: a roundup

Credit to Author: Christopher Boyd| Date: Mon, 03 Jun 2019 16:47:11 +0000

There’s been some huge leaks and breaches over the last few days, impacting everything from regular logins to important financial documents. What’s the fallout?

Categories:

Tags:

(Read more…)

The post Leaks and breaches: a roundup appeared first on Malwarebytes Labs.

Read more

Medical industry struggles with PACS data leaks

Credit to Author: Vasilios Hioureas| Date: Fri, 24 May 2019 18:05:21 +0000

PACS servers are often used to store and transmit patient data. But how is their security implemented? We take a look at case of how poor setup can easily lead to data leaks.

Categories:

Tags:

(Read more…)

The post Medical industry struggles with PACS data leaks appeared first on Malwarebytes Labs.

Read more

“A tipping point for advancing AI’s business value”

Credit to Author: Ibrahim Gokcen| Date: Mon, 22 Apr 2019 12:00:52 +0000

Look around. AI is everywhere. From our daily use of Siri, Cortana, and/or Alexa to Netflix’s ability to recommend exactly what we like to watch on TV at any time…. Read more »

The post “A tipping point for advancing AI’s business value” appeared first on Schneider Electric Blog.

Read more