Home Search
Microsoft - search results
If you're not happy with the results, please do another search
Focus on Consolidating and Simplifying Operational Systems
The unprecedented events of 2021 have accelerated the growing network of technology integrations, which has automated business workflows and data exchange. However, this has...
What the Cybersecurity Leaders Are Saying About Data Privacy
Security intrusions and data breaches continue to be severe concerns for organizations and users’ data privacy. Despite constant cybersecurity awareness campaigns, several people still...
40 Billion User Records Exposed Globally in 2021
Cybercriminals often exploit leaked/stolen sensitive user information to perform various cyberattacks, including phishing and identity theft. The rising information leaks on dark web forums...
Federal Agencies Release Advisory On Mitigating Security Threats From Russian APT Actors
State-sponsored hackers from Russia continue to prevail in the cyberthreat landscape. Government authorities and organizations globally are warning about frequent cyberespionage campaigns from Russian...
Attackers Exploit Cloud Services to Deploy Nanocore, Netwire, and AsyncRAT
Since digitalization began, there has been a significant increase in organizations turning to cloud computing. Most companies leverage multiple cloud environments to host their...
Adopt Modern Tools and Technologies to Protect Supply Chains and the Hybrid Workforce
In security, you always need to be thinking ahead about what might come down the pipeline. As we wrapped up the year 2021, I...
CISA Adds 15 New Flaws to its Actively Exploited Vulnerabilities Catalog
Unresolved security issues serve as frequent attack vectors for opportunistic cybercriminals. It is known that threat actors often target publicly known or unpatched security...
Experts to Convene at Ransomware Resilience Summit Series
Ransomware attacks have surged 311% in the past year with a business now being attacked every 11 seconds. From crippling the Irish healthcare system...
Blockchain Technologies Will Be Integrated with Information Security and Cybersecurity Products
Making predictions in cybersecurity or any discipline or field can be quite challenging. First, it is virtually impossible to predict the future – consider...
How to Generate CISO Buy-In For Active Directory Protection
Generating CISO buy-in for Active Directory Protection ranks high in a company's success against ransomware attacks. Active Directory (AD) sits at the heart of...