A week in security (March 2 – 8)

A roundup of the previous week’s security headlines, including the introduction of a new series on child identity theft, an examination of law enforcement’s cybersecurity woes, a progress check on our stalkerware initiative, and more coronavirus scammers on the prowl.

Categories:

Tags:

(Read more…)

The post A week in security (March 2 – 8) appeared first on Malwarebytes Labs.

Lock and Code S1Ep1: On RSA, the human element, and the week in security

We look at all the interesting security news from last week and also present the latest episode of our podcast, Lock and Code.

Categories:

Tags:

(Read more…)

The post Lock and Code S1Ep1: On RSA, the human element, and the week in security appeared first on Malwarebytes Labs.

Explained: the strengths and weaknesses of the Zero Trust model

Zero Trust is an information security framework that insists its users “never trust, always verify.” Is this the best security model for organizations today? We examine its strengths and weaknesses.

Categories:

Tags:

(Read more…)

The post Explained: the strengths and weaknesses of the Zero Trust model appeared first on Malwarebytes Labs.

Explained: edge computing

What is edge computing? And how will this fledgling technology change the way we create, consume, share, and store data? We tackle the technical considerations and security implications for delivering data to the edge.

Categories:

Tags:

(Read more…)

The post Explained: edge computing appeared first on Malwarebytes Labs.

Explained: What is containerization?

Containerization is gaining traction as a method to improve consistency, portability, and scalability without the investments required for virtualization. But is it secure?

Categories:

Tags:

(Read more…)

The post Explained: What is containerization? appeared first on Malwarebytes Labs.

A week in security (November 11 – 17)

A roundup of cybersecurity news from November 11 – 17, including Facebook scams, the importance of securing food infrastructure, and our latest CTNT report.

Categories:

Tags:

(Read more…)

The post A week in security (November 11 – 17) appeared first on Malwarebytes Labs.

Cybersecurity for journalists: How to defeat threat actors and defend freedom of the press

When it comes to cybersecurity, journalists need to protect themselves, their sources, and the freedom of the press. Which methods should they use?

Categories:

Tags:

(Read more…)

The post Cybersecurity for journalists: How to defeat threat actors and defend freedom of the press appeared first on Malwarebytes Labs.

A week in security (October 7 – 13)

A look at the cybersecurity news from October 7 – 13, including updates on war shipping, managed service providers, and stalkerware.

Categories:

Tags:

(Read more…)

The post A week in security (October 7 – 13) appeared first on Malwarebytes Labs.

Securing the managed service provider (MSP)

Managed service providers (MSPs) have become the target of attacks, as lack of aggressive security posturing has left them—and the high-value data of their clients—vulnerable. Learn how MSPs can secure against a rising tide of threats.

Categories:

Tags:

(Read more…)

The post Securing the managed service provider (MSP) appeared first on Malwarebytes Labs.

Explained: security orchestration

Security orchestration is a regulator that makes sure security solutions, often from different vendors, work well together to automate response and keep organizations safe.

Categories:

Tags:

(Read more…)

The post Explained: security orchestration appeared first on Malwarebytes Labs.