Secure and Track Your Mobile and Remote Assets Anywhere. Anytime.
- Emotet malware infrastructure seized after seven years April 22, 2021After seven years of malicious activity, law enforcement have managed to seize the infrastructure of the notorious malware variant “Emotet,” and have scheduled a mass uninstallation event to occur on April 25. In their latest research, Digital Shadows discusses the significance of the shutdown, how the process unfolded, and what it means for the cybercriminal […]
- 5 minutes with Motti Sorani - What is Device Centric Risk Management (DCRM)? April 22, 2021Device Centric Risk Management (DCRM) is a layered approach to cybersecurity that protects each device, driving remediation and mitigation directly on medical and IoT assets. To find out more about how this paradigm helps with regulatory compliance and helps mitigate cyberattacks, we speak to Motti Sorani, Chief Technology Officer at CyberMDX.
- The inside threat posed by the transition of power April 22, 2021Changeover is inevitable at every organization, all the way up to the chief executive, but former employees with a motive can abuse their privileges to access information they deem valuable or useful in the future, causing irreparable harm to the enterprise and its operations. This insider threat is preventable. Find out how.
- Rethinking cybersecurity in the age of COVID: The "Dos and Don'ts" of protection April 22, 2021Its vital that enterprise security leaders reinvent their approach to security to stay one step ahead of those who seek to cause harm.