Source Link Edge is the concept that moves computing from a centralized model to…
Michael Hill
-
-
Network SecuritySecurity
BadUSB explained: How rogue USBs threaten your organization
by Michael Hillby Michael HillIn January 2022, the FBI issued a public warning over a USB attack campaign…
-
Network SecuritySecurity
INTERPOL and Nigerian Police bust business email compromise ring, arrest 11
by Michael Hillby Michael HillINTERPOL and the Nigerian Federal Police today announced the arrests of 11 business email…
-
Data BreachSecurity
Cyber insurance explained: What it covers and why prices continue to rise
by Michael Hillby Michael HillCyber insurance definition Cyber insurance, also referred to as cyber risk insurance or cyber…
-
Security incidents affecting WordPress have been of notable prevalence in recent years as more…
-
Cybersecurity and threat analysts from Fox-IT (part of NCC Group) have shone a light…
-
The attack on US-based software provider Kaseya by notorious Russia-linked ransomware group REvil in…
-
Cloud SecuritySecurity
Google forms Cybersecurity Action Team to support customer security transformation
by Michael Hillby Michael HillGoogle has announced the formation of a cybersecurity action team to provide support to…
-
Telecommunications giant T-Mobile has warned that information including names, dates of birth, US Social…
-
Unsanctioned software and applications running on corporate mobile devices is a security nightmare. These…