collaboration
Volt Typhoon Malware: US Critical Infrastructure Breached
In a recent revelation, the U.S. government disclosed that the Chinese state-sponsored hacking group, Volt Typhoon has surreptitiously infiltrated critical infrastructure networks within the country for a staggering five-year period. This embedded ...
Does Your Security Team Need a Dedicated Collaboration Tool?
Investing in an IT- and/or security-specific collaboration platform ensures your team has tools that align with their IT and security requirements ...
Innovation With a Security-First Mindset
Prioritizing a robust security-first position does not have to hinder productivity or the ability of teams to achieve business goals ...
Microsoft Storm-1152 Crackdown: Stopping Threat Actors
In a significant stride against cybercrime, Microsoft has declared victory in dismantling cybercrime operations of Storm-1152. This group, a major player in the cybercrime-as-a-service (CaaS) ecosystem, was involved in selling access to ...
Black Hat: The Importance of Collaboration With Digital Hands’ Charlotte Baker
Shira Rubinoff: This is Shira Rubinoff here at Black Hat, coming at you live. I’m here with Charlotte Baker, CEO of Digital Hands. Charlotte, it’s such a pleasure to see you again ...
Maximizing Output: The Link between Cloud Infrastructure Security and Team Productivity
Effective teamwork and seamless collaboration are crucial for the success of any organization. In today’s digital age, where data is stored and accessed through cloud infrastructure, ensuring robust security measures is paramount ...
The Essential Guide to Securing Hybrid Workplace Environments
From here on out, hybrid and remote work are here to stay. Unfortunately, this seismic shift in the way we work has expanded the attack surface for opportunistic cybercriminals. Mimecast’s 2022 state ...
Decentralized IT Clouds Security Team’s Ability to Spot Risks
The shadow IT trend has been underway for some time, but if a recent survey from Zoho ManageEngine is any indication, the amount of decentralized IT decision-making has passed an inflection point ...
Auth Token Mining Weakens Microsoft Teams Security
Microsoft Teams users, beware. Anyone signed into the app can have their credentials stolen by miscreants with file system access who follow an attack path recently identified by the Vectra Protect team ...
Survey Surfaces Need For More Security Collaboration
A survey of more than 2,000 IT decision-makers and security operations (SecOps) professionals in the U.S., United Kingdom and Australia found lots of room for improvement when it comes to the way ...