Media coverage

Cold boot attack method leaves laptops vulnerable

Sorry, this post has not been published yet, check again later!

October 4, 2018
Published by:

ITProToday

“A proper response should include the revocation of credentials and user access from that system," says Chris Morales, head of security analytics at Vectra. "This works if the proper response policy is in place and users know to respond quickly to IT before potential access and compromise occurs.”

Read publication

Most recent media coverage

Mergers and acquisitions: Cybersecurity risks

December 11, 2019

Forbes

Read more

Ring camera hacker uses home security systems to spew racial slurs at Florida family

December 10, 2019

Newsweek

Read more

New approach needed following DDoS attacks

December 8, 2019

Intelligent CIO Africa

Read more