Ransomware-as-a-Service model enables even inexperienced hackers to target businesses who use remote desktop software.
Posts tagged "Threat"
Address The new Threat Vectors On Your New Landscape
Jamal Hartenstein has worked with the department of defense, as a part of joint task forces and has experience with every branch of service. He’s helped with cyber security and data privacy initiative…
Reducing Threat Impact With CIS Controls
Lane Roush, vice-president of Presales Systems Engineering at Arctic Wolf Networks, discusses CIS roles, controls, and tools in this digital summit session.
IOTW: Shiny Hunters Is The New Threat Actor In Town
During the first two weeks of May, over 73 million user records across over at least 10 different organizations showed up on the dark web. The hacker group Shiny Hunters claims credit.
Scaling Enterprise Threat Detection And Response Is The Theme Of Cyber Security…
Cyber Security Hub has united experts from every aspect of this space to present their most compelling case studies and real-world advice. By the end of the event, you will have the tools necessary to…
RSAC 2020 Watchlist: Threat Intelligence, Info Sharing And Frameworks
With the growing focus on fraud and identity, there is great interest in enterprise cyber security related to user behavior analytics, indicating a strong link between behavioral sciences and cyber th…