Explained: edge computing

Credit to Author: Pieter Arntz| Date: Mon, 30 Dec 2019 18:41:23 +0000

What is edge computing? And how will this fledgling technology change the way we create, consume, share, and store data? We tackle the technical considerations and security implications for delivering data to the edge.

Categories:

Tags:

(Read more…)

The post Explained: edge computing appeared first on Malwarebytes Labs.

Read more

Explained: What is containerization?

Credit to Author: Pieter Arntz| Date: Wed, 04 Dec 2019 17:00:00 +0000

Containerization is gaining traction as a method to improve consistency, portability, and scalability without the investments required for virtualization. But is it secure?

Categories:

Tags:

(Read more…)

The post Explained: What is containerization? appeared first on Malwarebytes Labs.

Read more

Explained: juice jacking

Credit to Author: Pieter Arntz| Date: Thu, 21 Nov 2019 16:00:00 +0000

Juice jacking is a type of cyberattack that uses a USB charging port to steal data or infect phones with malware. Learn how it works and ways to protect against it.

Categories:

Tags:

(Read more…)

The post Explained: juice jacking appeared first on Malwarebytes Labs.

Read more

How security orchestration improves detection and response

Credit to Author: Pieter Arntz| Date: Wed, 02 Oct 2019 19:20:10 +0000

Security orchestration is a regulator that makes sure security solutions, often from different vendors, work well together to automate response and keep organizations safe.

Categories:

Tags:

(Read more…)

The post How security orchestration improves detection and response appeared first on Malwarebytes Labs.

Read more

Explained: how security orchestration improves protection and response

Credit to Author: Pieter Arntz| Date: Wed, 02 Oct 2019 19:20:10 +0000

Security orchestration is a regulator that makes sure security solutions, often from different vendors, work well together to automate response and keep organizations safe.

Categories:

Tags:

(Read more…)

The post Explained: how security orchestration improves protection and response appeared first on Malwarebytes Labs.

Read more

Explained: war shipping

Credit to Author: Pieter Arntz| Date: Tue, 08 Oct 2019 19:15:46 +0000

War shipping is a tactic already in use by Red teams, and is a growing opportunity for cybercriminals to compromise business networks. Learn how war shipping works and how to protect your organization from it.

Categories:

Tags:

(Read more…)

The post Explained: war shipping appeared first on Malwarebytes Labs.

Read more

Explained: security orchestration

Credit to Author: Pieter Arntz| Date: Wed, 02 Oct 2019 19:20:10 +0000

Security orchestration is a regulator that makes sure security solutions, often from different vendors, work well together to automate response and keep organizations safe.

Categories:

Tags:

(Read more…)

The post Explained: security orchestration appeared first on Malwarebytes Labs.

Read more

Knowing when it’s worth the risk: riskware explained

Credit to Author: Jovi Umawing| Date: Thu, 23 May 2019 19:22:47 +0000

Riskware is a type of software that, while considered legitimate, can still put users at risk in some way. Learn why anti-malware vendors detect it, and how to tell whether the apps you use are riskware or not.

Categories:

Tags:

(Read more…)

The post Knowing when it’s worth the risk: riskware explained appeared first on Malwarebytes Labs.

Read more