[ad_1] Follow these best practices to strengthen endpoint management strategies and protect company data. Cyberattacks are increasing across industries, and cybercriminals are savvier than ever. While the total number of IT vulnerabilities is decreasing, the number considered to be critical is on the rise — and so are the number of actual security exploits. Businesses
[ad_1] The attack involves malware installed on POS systems Checkers Drive-In Restaurants Inc. notified its customers that about 15% of its restaurants in 20 states may have had data exposures possibly starting back into 2015, and some lasting until about mid-April this year. The company operates and franchises nearly 900 restaurants. See Related: “Cyber Attack
[ad_1] A old vulnerability in Alpine Linux containers has spread and propagated to as much as 20% of the containers on the Docker Store. Nearly one in five of the most popular containers available on the Docker store have no password for root access. That’s the finding of researcher Jerry Gamblin, building on work by
[ad_1] Digital Shadows researchers scanned various online file-sharing services and concluded the number of exposed files is up 50% from March of 2018. More than 2.3 billion files are exposed across misconfigured online file storage technologies, marking an increase of 750 million files – or a 50% jump – from 1.5 billion in March 2018.
[ad_1] With the new era of Windows as a service, Microsoft is rolling out changes to the operating system twice a year. Many of those changes will allow you to improve your security posture and offer more security choices. You no longer have to wait for a new operating system to deploy new security features.
[ad_1] The company also agreed to buy container security company Twistlock as it develops its cloud security suite. Palo Alto Networks is on a cloud security shopping spree as it builds out its new Prisma cloud security strategy. This week the company confirmed acquisitions of PureSec and Twistlock. PureSec, an Israeli startup founded in 2016,
[ad_1] Baltimore has so far refused to comply with a ransom demand. It’s being forced to make a decision all such victims face: to act morally or practically. Although ransomware took a backseat to other attack vectors in 2018, the threat has regained momentum this year. The most recent high-profile ransomware attack occurred 20 miles
[ad_1] Under very specific conditions, code running in a Docker container could access files anywhere on a server, according to a new CVE. A recently discovered vulnerability in the Docker container platform could allow an attacker to gain access to files used by other containers and the host server itself. And, in an unusual progression
[ad_1] The idea of the pending influx of Internet of Things (IoT) devices just waiting to jump on my network is starting to give me heartburn. Sure, you could probably think of all the crazy thermostats and speakers and lightbulbs in your house right now. But what about enterprise or industrial IoT devices? Gas pumps.