The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.
How annoying is it when you get a telemarketing call from a random phone number? Even if you block it, it won’t make a difference because the next one will be from a brand new number. Cyber attackers employ the same dirty tricks. Using domain generated algorithms (DGAs), malware creators change the source of their command and control infrastructure, evading detection and frustrating security analysts trying to block their activity.
The California Consumer Privacy Act (CCPA) is a new act that strengthens and unifies data protection for consumers by giving California residents more control over their personal information. This regulates not only how it is collected and used, but also, how it is sold by companies. The CCPA went into effect January 1, and enforcement will begin July 1.
The cloud has become ubiquitous in all we do, and the line between the perimeter and the cloud continues to shrink as most enterprise organizations are looking to shift their cloud strategy to a multi-cloud approach. Moving to the cloud comes with plenty of benefits like performance optimization, improved reliability and overall cost savings, but cloud adoption is not without its risks and challenges.