Edge Thinking or IT Thinking. Are You Transforming or Optimizing?

0
A question for the reader: what do you think is the driving force behind digital transformation? If you believe it’s internal pressures you might...

Colonial Pipeline’s Ransomware Attack Sparks Emergency Declaration

0
Security researchers mull possible perpetrators of the attack, and warned that the incident could be a harbinger of things to come.  Source link

Google Releases Open Source Tool for Verifying Containers

0
Google has released a new open-source tool called cosign to make it easier to manage the process of signing and verifying container images. Developed...

Colonial Pipeline Targets Recovery From Ransomware Attack by End of Week

0
After a ransomware attack forced Colonial Pipeline Company to proactively shut down operations of the largest refined products pipeline in the United States, the...

Ransomware Gangs Get More Aggressive Against Law Enforcement

0
Police Chief Will Cunningham came to work four years ago to find that his six-officer department was the victim of a crime. Hackers had taken...

Diplomatic Entities Targeted with New ‘Moriya’ Windows Rootkit

0
Researchers at anti-malware vendor Kaspersky are documenting a new, previously unknown Windows rootkit being used in the toolkit of an APT actor currently targetings...

Four Eastern Europeans Admit in U.S. Court to Providing Bulletproof Hosting

0
Four individuals from Eastern Europe have pleaded guilty in a United States court to their roles in a RICO conspiracy. Between 2008 and 2015,...

Cybersecurity M&A Roundup: 16 Deals Announced May 1-9, 2021

0
A total of 16 cybersecurity-related acquisitions were announced in the first part of May 2021 (May 1-9). Acuant acquires Hello Soda Identity verification and fraud prevention...

The Benefits of Cloud Services Far Outweigh On-Premises in 2021

0
The pandemic, among other variables, has greatly accelerated cloud adoption for many organizations in 2021. It’s time. If they weren’t already invested, the events of...