Six steps for responding to a disruptive attack
Disruptive attacks have become a disturbing trend that IT security departments must consider when analyzing the ongoing threat landscape. This DarkReading article includes six slides that were developed following interviews with Günter Ollmann, chief security officer at Vectra Networks, and Jurgen Kutscher, senior vice president at FireEye.
Barnes & Noble gets hacked; notifies customers of possible data breach
Comment les cybers attaquants exploitent Microsoft 365 pour s’emparer des données des entreprises?
Poor identity controls allow attackers to exploit Office 365