Media coverage

Cold boot attack method leaves laptops vulnerable

Sorry, this post has not been published yet, check again later!

October 4, 2018
Published by:

ITProToday

“A proper response should include the revocation of credentials and user access from that system," says Chris Morales, head of security analytics at Vectra. "This works if the proper response policy is in place and users know to respond quickly to IT before potential access and compromise occurs.”

Read publication

Most recent media coverage

Hackers target Pfizer exposing sensitive patient information

October 25, 2020

The National

Read more

Cybercriminals Could be Coming After Your Coffee

October 23, 2020

Dark Reading

Read more

Malicious SharePoint and OneDrive Links Are a Phishing Scammer’s Dream

October 22, 2020

SC Magazine

Read more