dcsimg

Microservices Architecture: LEGO for DevOps

DevOps is one of the biggest trends in tech today, but it wouldn’t be half of what it is without microservices architecture. … [Read more...]

Podcast: Can Former Cyber Criminals Be Trusted?

If you work in the cyber security field, chances are you've run into current or former black hats. But some of these hackers have put their dark pasts behind them and are doing great things in the world cyber security research today. The big question is should an individual's dark past define their future? … [Read more...]

A week in security (June 10 – 16)

Last week on Malwarebytes Labs, we revealed to readers the mindset of security pros as to why they lack confidence in their ability to prevent their organizations getting breached. We also reported on Maine Governor Janet Mills implementing the state’s own privacy protections, how Apple can better protect its users’ privacy, the continuous trending of the MegaCortex ransomware, how cyberbullies … [Read more...]

HIPAA Compliance Checklist and Requirements

<p>As a managed services provider (MSP), complying with a range of legal regulations can be a major part of your responsibilities. This is more than a way to provide great value to your customers—staying compliant can also protect you from penalties. This is especially true if you work with customers within the healthcare sector who are covered by the Health Insurance Portability and … [Read more...]

Hope Is Not a Strategy: Four Lessons ‘Survivor’ Taught Me About Cybersecurity

The Fijian island landscape may look very different from the Cyber Exposure landscape, but surviving them has more in common than you would think. And I have the personal experience to prove it. In 2018, I took a short break from my position as a Technical Writer at Tenable and traded writing documentation for vulnerability management solutions for something a little less high-tech. I flew to Fiji … [Read more...]

5 Easy Ways to Improve Office 365 Security

Office 365’s Advanced Threat Protection (APT) may be a useful way to improve the security of the platform, but it is not without its flaws. Security researchers discovered back in 2018 that Office 365 APT had some fundamental flaws when it came to defending against a new wave of phishing attacks. It seems as though SharePoint invitations containing malicious links were being sent out to some … [Read more...]

Trolls abuse Twitter Lists to collate their targets

I’ve been using Twitter for more than a decade. And one of its features that I find valuable is Lists. Turns out I’m not the only one. Lists allow Twitter users to group profiles or feeds based on certain criteria, such as sports, tech news, celebrities, fashion—you get the idea. Having Lists makes it a lot easier to find content or catch up on posts I’d otherwise miss without having to … [Read more...]

The Real Cost of a Data Breach: Compliance Penalties are Just the Tip of the Iceberg

I’ve said it before and I’ll say it again: We are living in the age of the data breach. Now more than ever, our lives are defined by the massive data sets built from our online presence, and now more than ever, they are routinely disrupted when those data sets fall into the wrong hands. … [Read more...]

2 Attacks Traditional Antivirus Is Powerless to Stop

You do your due diligence when it comes to security: You patch. You have backup in place. You install spam protection on your email servers and train your people to avoid phishing attacks. And you have antivirus (AV) installed on every machine to catch malware that happens to get through all the other defenses. Yet, somehow, your customers still get attacked.  Read More … [Read more...]

An overview of the GDPR with Alice Turley, data protection expert

The GDPR (General Data Protection Regulation), which came into effect on 25 May 2018, places obligations on organisations to be more accountable for data protection.   What is personal data?  Personal data is any information relating to an identified or identifiable natural person (data subject). The GDPR places much stronger controls on the processing of special categories of personal data … [Read more...]