With its wild beauty, favorable tax laws and growing tech scene, the State of Wyoming is experiencing a surge in business growth. But with this prosperity comes a rise in cyber risk due to the expanding commerce platforms and digital infrastructure needed to support it. “We’ve had several large tech companies relocate to Wyoming recently,” explained Jason Strohbehn, Deputy CISO … [Read more...] about State of Wyoming Looks to Expand CrowdStrike Protections Statewide
expand
New Go-based Zerobot Botnet Exploiting Dozen of IoT Vulnerabilities to Expand its Network
Dec 07, 2022Ravie LakshmananInternet of Things / Botnet A novel Go-based botnet called Zerobot has been observed in the wild proliferating by taking advantage of nearly two dozen security vulnerabilities in the internet of things (IoT) devices and other software. The botnet "contains several modules, including self-replication, attacks for different protocols, and … [Read more...] about New Go-based Zerobot Botnet Exploiting Dozen of IoT Vulnerabilities to Expand its Network
CrowdStrike and Cloudflare Expand Zero Trust
Threat actors continue to exploit users, devices and applications, especially as more of them exist outside of the traditional corporate perimeter. With employees consistently working remotely, adversaries are taking advantage of distributed workforces and the poor visibility and control that legacy security tools provide. Traditional tools that connect employees to corporate … [Read more...] about CrowdStrike and Cloudflare Expand Zero Trust
Choosing the right security analytics solution as networks expand: competitive considerations and customer validation
May you live in interesting times… We’re currently witnessing a fundamental shift towards a more remote workforce amidst the tumultuous world events of 2020. This recent development made me recall the tongue-in-cheek, 19th century adage – “May you live in interesting times”. This old proverb served as a curse disguised as a fortuitous blessing, as the concept of “interesting … [Read more...] about Choosing the right security analytics solution as networks expand: competitive considerations and customer validation