It’s Back to School Time, So How Do I Keep My Child Safe Online?
Credit to Author: Michael Miley| Date: Tue, 29 Aug 2017 22:00:24 +0000
The end of the summer can be a pretty stressful time for parents as well as their kids. Apart from the prospect of a return to school, there’s a whole checklist of items to get ready. Schoolbag? Check. Sports kit? Check. Smartphone? Check. Internet safety guide? Errr… The truth is that today, there aren’t many…
One of the first steps in guarding against ransomware infections is remaining in-the-know about emerging threats and attack styles. Now, a new threat has come to the surface: Petya.
On August 28th at VMworld 2017 in Las Vegas, VMware announced initial availability for their unique offering called ‘VMware Cloud on AWS’ allowing customers to run VMware workloads on the AWS cloud. This means customers can take advantage of agile cloud infrastructure all the while maintaining their familiar VMware tools, skill sets and architecture framework…
The future is cloud. At this point in it’s evolution it’s undeniable. The questions facing organizations now are “how much?” and “how fast?” How do you map out a reasonable path to a cloud deployment? Few organizations will be 100 percent cloud and most will take years to migrate existing assets from their on-premises environments….
In last week’s blog entry, I mentioned the fact that the Zero Day Initiative (ZDI) published two zero-day advisories (ZDI-17-691 and ZDI-17-692) for vulnerabilities found in Foxit Reader after Foxit failed to meet the 120-day deadline outlined in ZDI’s disclosure policy. Since the public disclosure, Foxit has reached out to ZDI and has committed to…
Phishing is one of the greatest and most time-consuming challenges security professionals face today.
Mobile devices are increasingly being targeted by ransomware attacks, but employees and businesses simply aren’t taking enough action to secure them.
While not seen in many headlines currently, targeted attacks continue to pose a threat to today’s enterprises, and it’s imperative that those in charge of the enterprise’s security keep this risk in mind.