A threat group identifying as the “Bl00dy” ransomware gang is targeting unpatched instances of PaperCut NG and PaperCut MF in the education...
Tag - Security
A cloud audit is when an organization assesses the performance of its cloud vendor. Auditors can survey aspects of cloud use, including compliance with...
Quantum computing will not only challenge modern cryptography — it could change how we approach data encryption forever.
Much of the discourse...
What are Active Directory functional levels?
Active Directory functional levels are controls that specify which advanced Active Directory domain features can...
While May Patch Tuesday was relatively small, one Windows zero-day will burden admins for months to come.
Microsoft resolved 38 unique new...
In covering cloud-native security, a lot of people use the terms shift left or shift-left security. A few weeks ago at RSA Conference 2023, the concept...
What is Hash-based Message Authentication Code (HMAC)?
Hash-based Message Authentication Code (HMAC) is a message encryption method that uses a cryptographic...
The COVID-19 pandemic hastened the move to the cloud for many organizations. Security, however, was often not considered. Cloud security requires...
Malicious actors target cloud user accounts with the highest levels of access, with admin roles the most prized. To protect against bad actors, IT teams...
Former Uber chief security officer Joe Sullivan avoided jail time for attempting to cover up a high-profile data breach in 2016.
The long-running...