Microsoft acquires Israeli security firm Hexadite, sources say for $100M

Spread the love

Spread the loveTweet Yet more activity in the world of cybersecurity. Microsoft today confirmed that it has acquired Hexadite, an Israeli startup that uses AI to identify and protect against attacks.…


Spread the love

Trump’s cybersecurity executive order is a good first step

Spread the love

Spread the loveTweet Bob Ackerman Contributor More posts by this contributor: A significant piece of cybersecurity news erupted last week, although it was nearly drowned out by the growing flap over…


Spread the love

Today’s Massive Ransomware Attack Was Mostly Preventable—Here’s How To Avoid It

Spread the love

Spread the loveTweet Photo: Getty Ransomware may be mostly thought of as a (sometimes costly) nuisance, but when it hinders the ability of doctors and nurses to provide aid to…


Spread the love

Las Vegas taps AI for cybersecurity help

Spread the love

Spread the loveTweet Hundreds of thousands of people live in the city of Las Vegas. But the city’s information security team is made up of just three employees and one…


Spread the love

Trump signs executive order for sweeping review of US cybersecurity

Spread the love

Spread the loveTweet The reviews aim to point out holes in the nation’s cybersecurity that have been abused by pranksters, hackers and foreign government-directed data thieves. The EO further directs…


Spread the love

Trump signs long-delayed executive order on cybersecurity

Spread the love

Spread the loveTweet President Trump signed a executive order today commanding a review of the United States’ cybersecurity capabilities. Trump was initially set to sign the order shortly after his…


Spread the love

Trump creates American Technology Council to ‘modernize’ US government

Spread the love

Spread the loveTweet The executive order further states that the Council will use IT to advise policy decisions. But, it “shall not extend to any national security systems.” The order…


Spread the love

Ransomware Is Being Hidden Inside Attachments of Attachments

Spread the love

Spread the loveTweet The new ransomware campaign, highlighted by the Naked Security blog, works like this: Advertisement Advertisement You’re sent a spam email with a PDF attachment (which should already…


Spread the love

Get Your Two-Step (Verification) On

Spread the love

Spread the loveTweetSpread the loveTweet


Spread the love

Scary Phone Virus Bypasses Two-Factor Authentication

Spread the love

Spread the loveTweetSpread the loveTweet


Spread the love