For decades government leaders have had to wrestle with questions of building solutions vs buying existing solutions. The needs of government enterprises have shifted over the decades, but so have the capabilities of commercially available products. It is critically important that executives in government frame their build vs buy/COTS vs GOTS questions correctly so they make … [Read more...] about Announcing A New CTOvision Study: Build vs Buy in the Government Sector
Read Nicole Martin explain what you can do if your data was breached on Forbes : Data breaches seem to be everywhere in today's society. Just this week it was announced that a massive data breach exposed sensitive data of nearly every individual in Ecuador. The breach impacted an estimated 20 million people, 6.7 million of those being minors. In fact, according to the Identity … [Read more...] about What To Do If Your Data Was Breached
The Phorpiex (aka Trik) botnet has existed for almost 10 years. First developed to distribute various malware like Gandcrab, Pony, and Pushdo to email users for the purpose of turning victim accounts into hosts for fraudulent cryptomining operations, Phorpiex now has a new trick up its sleeve. Researchers at the Tel Aviv-based Check Point confirmed that the botnet is now … [Read more...] about Malware Uses Your PC to send 30K Sextortion Emails Per Hour
Read George Platsis take a look at whether the authentication systems will run into the privacy wall on Security Intelligence : Identity authentication is absolutely necessary to conducting our affairs today. Without it, we would lose virtually all confidence to conduct business or create and foster relationships. But with ever increasing concerns related to data privacy, it … [Read more...] about Will the Future of Authentication Run Into a Privacy Wall?
Most of your employees likely know better than to send a password via email or open a strange attachment from someone they don't know. But do they know better than to post photos of their badges on social media or include details about internal software in job descriptions? "I see this all the time, and this is what makes my job as a simulated attacker so much easier," says … [Read more...] about 8 Ways Businesses Unknowingly Help Hackers