Home Search
microsoft - search results
If you're not happy with the results, please do another search
Axio Offers a Limited Time Free Coverage Analysis for SolarWinds Impacts
Axio, a cyber risk management service provider, in the wake of the SolarWinds event, has come up with a limited time offer to perform...
Sparrow: CISA’s Free Anomalies Detection Tool for Azure/M365 Environment
The Cybersecurity and Infrastructure Security Agency (CISA) has launched a detection tool to identify any unusual or malicious activities in an Azure/Microsoft O365 environment....
Seven Impactful Cyber-Tech Trends of 2020 and What it Means for 2021
Every year I like to research and commentate on the most impactful security technology and business happenings from the prior year. This year is...
A Look Back at the Top 9 Data Breaches of 2020
At the beginning of the year, people celebrated the turn of the decade and readied themselves to strike off the “Things-to-Do” from their bucket...
Greater Cybersecurity Threat Predictions with a Primer in Machine Learning
With the increased number of cyberattacks, especially in light of the COVID-19 pandemic, the process of manually or semi-automatically receiving cyberthreat alerts that need...
Suit Up! Ransomware Task Force is Here
Ransomware has continued to plague digital transformation since the onset of the pandemic. A recent survey from cybersecurity firm CrowdStrike, revealed that nearly 56%...
How Cyberattacks Cause Severe Hazards to Health Care Industry
Cyberattacks on health care organizations have become rampant in 2020. With multiple data breaches and ransomware attacks, the health care providers continued to be...
Insider Threats: A Byproduct of the New Normal
Despite the continuous security improvements, the concern over insider threats seems to be growing for organizations globally. The new distributed working conditions have also...
NTreatment Exposes Thousands of Health Records and Lab Results in a Security Lapse
In a cloud storage security lapse, NTreatment exposed around 109,000 files that contained health records and lab results.
The said cloud server was hosted on...
Security Evolution: From Legacy to Advanced, to ML and AI
AI and ML present a new dawn in the cybersecurity industry. AI is not a new concept to computing. It was defined in 1956...