article thumbnail

Case Studies: CISOs Take on the 'Zero Trust' Challenge

Data Breach Today

Three Examples of How to Overcome Hurdles Three CISOs offer real-world insights on addressing the challenges involved in implementing a "zero trust" framework to enhance security in an era when so many remote employees are accessing applications and data in the cloud as well as within internal networks.

Cloud 264
article thumbnail

Case Study: Intrusion Prevention, Detection in the Cloud

Data Breach Today

Chronic disease management firm Omada Health has been changing its approach to cloud intrusion prevention and detection, which is reducing time spent on investigating false positives, says the company's information security leader, Bill Dougherty.

Cloud 162
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 13

Security Affairs

How the Necro Trojan infiltrated Google Play, again Kryptina RaaS | From Unsellable Cast-Off to Enterprise Ransomware “Marko Polo” Navigates Uncharted Waters With Infostealer Empire Octo2: European Banks Already Under Attack by New Malware Variant Infostealer malware bypasses Chrome’s new cookie-theft defenses AI-Generated Malware Found in the Wild (..)

Security 314
article thumbnail

Security Affairs newsletter Round 258

Security Affairs

addresses two zero-days exploited in the wild Microsofts case study: Emotet took down an entire network in just 8 days New Coronavirus-themed campaign spread Lokibot worldwide. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->.

Security 285
article thumbnail

[Podcast] Achieving Cloud Content Harmony – Access with Control

AIIM

Cloud Content Management has the power to change the game for businesses of all sizes and types. On this episode, your host Kevin Craine interviews Cresyl’s Jim Ongena to dig deeper into this balancing act with cloud content management – the topic of Jim’s session at The AIIM Conference 2020. But this great power needs balance!

Cloud 129
article thumbnail

1,859 Android and iOS apps were containing hard-coded Amazon AWS credentials

Security Affairs

Researchers from Broadcom Symantec’s Threat Hunter team discovered 1,859 Android and iOS apps containing hard-coded Amazon Web Services (AWS) credentials that allowed access to private cloud services. “Over three-quarters (77%) of the apps contained valid AWS access tokens allowing access to private AWS cloud services.”

Cloud 251
article thumbnail

[Podcast] Tips for Staying Cyber-Safe While Working from Home

AIIM

And finally, on this episode, hear an AIIM member case study of how Laserfiche helped Mille Lacs Corporate Ventures migrate their contract management process to the cloud. Then, we continue the AIIM member spotlight series with Karen Loftis, Director of Industry Product Management at Hyland. Click here to check out this episode.

Libraries 211