Home Search
microsoft - search results
If you're not happy with the results, please do another search
Fine-tune Your Passwords this World Password Day 2021
Passwords – the most common and effective authentication method to securely log in systems and keep data secure – have now become a potential...
Security Incident in a Med-Tech Company Derails Treatment of Cancer Patients in U.S.
Recent research titled “Moving Forward: Setting the Direction” highlighted that healthcare supply chain security is one of the lowest-ranked areas for the National Institute of Standards...
FIDO Launches IoT Protocol for Onboarding to Cloud and On-premises Platforms
Based on a recent report titled “IoT Professional Services Market,” the global IoT service market is expected to grow from $98.8 billion in 2020...
Biden’s 100-Day Plan to Enhance Electric Grid Security
With the rising cybersecurity incidents in the U.S., the Biden administration is focusing on elevating the country’s security strategy to protect its critical infrastructure...
Justice Department to Launch Ransomware Taskforce
Ransomware operators continue to innovate hacking techniques to encrypt victims’ sensitive information and demand ransom or threaten targets of leaking their data online. Besides...
REvil Ransomware Gang Targets Apple’s Supplier, Quanta; Threatens to Leak Blueprints
The REvil ransomware gang reportedly hacked Taiwanese manufacturer Quanta Computer, which among others, manufactures Apple’s iWatch and MacBook devices. As per the REvil gang’s...
Emergency Directive! CISA Warns About Ivanti Pulse Connect Secure Vulnerabilities
Software programs often have flaws/vulnerabilities, which are often exploited by cybercriminals to gain access to victims’ data. Recently, federal agencies have been ordered to...
Amid Today’s Threat Landscape, Protecting Active Directory is a CISO-Level Concern
Despite Active Directory’s critical role in today’s IT infrastructure, CISOs rarely list protecting it as a top priority. They assume that policy management and...
SolarWinds Hack Orchestrated by Russia’s SVR, Claims U.S. and U.K.
Earlier in December 2020, the White House had acknowledged that a Russian state-sponsored group known as the Cozy Bear or APT 29 carried out...
Top 10 Neglected Data Security Best Practices
Ensuring data security becomes harder every day. Firstly, sensitive data is often spread across on-premises and cloud-based storage locations, which makes it more difficult...