The supply chain attack that Trojanized a SolarWinds update to infect and spy on the IT management platform’s customer base continues to be analyzed. Early reports have called the methods highly sophisticated and the actors highly trained. We do know that IP addresses, a command and control server and a malicious product update file were […]
The post Essential Threat Intelligence: Importance of Fundamentals in Identifying IOCs appeared first on Webroot Blog.
Read More Essential Threat Intelligence: Importance of Fundamentals in Identifying IOCs
Today, the average enterprise uses over 2000 cloud applications and services, and we expect this number will continue to grow as more businesses realize the efficiency, flexibility and collaboration benefits these services bring. But the use of cloud-based applications also comes with a few caveats; for example, the apps themselves may pose potential security vulnerabilities, […]
The post How to Stop Shadow IT, Manage Access and Ensure Security with Cloud Applications appeared first on Webroot Blog.
Read More How to Stop Shadow IT, Manage Access and Ensure Security with Cloud Applications
Webroot BrightCloud® Threat Intelligence relies on the collective power of millions of devices working together. But what sometimes gets lost is the actual humans behind bringing this technology to market. In this Employee Spotlight, we talk to Account Development Executive, Jordan Gray, who works with C-level executives to integrate threat intelligence solutions within their environments. […]
The post Employee Spotlight: The Human Faces Behind Artificial Intelligence appeared first on Webroot Blog.
Read More Employee Spotlight: The Human Faces Behind Artificial Intelligence