MonthJanuary 2018

Google Cloud Least-Privilege Function Goes Live

Lazarus Group, Fancy Bear Most Active Threat Groups in 2017

Why Google partnered with MobileIron – and what they plan to offer

Google Cloud and MobileIron have announced a partnership to provide a secure enterprise applications and services portal.

Why Google Cloud and MobileIron? Because Google wants to use its Orbitera commerce platform, which enables the buying and selling of software and services in the cloud – and it needs an OS- and hardware-agnostic distribution and security partner.

MobileIron will not only help Google distribute the apps through its enterprise mobility management (EMM) platform, but its software can also provide analytics that show which apps and services are the most popular, and with whom.

To read this article in full, please click here

Perfect end to a perfect month: Yet another Win10 1709 cumulative update, KB 4058258

Microsoft told us three weeks ago that Win10 Fall Creators Update, version 1709, was ready for enterprise deployment. Since then, we’ve seen the early January patch yanked because it tanked AMD machines. Then, after the first patch was reinstated, we got two more cumulative updates. In the past three weeks.

I guess that’s what Microsoft now means by “Current Branch for Business” and/or “Semi-Annual Channel.”

To read this article in full, please click here

IoT Botnets by the Numbers

IoT devices are a botherder's dream attack-vector.

700,000 Bad Apps Deleted from Google Play in 2017

Google rejected 99% of apps with abusive content before anyone could install them, according to a 2017 security recap.

5 Questions to Ask about Machine Learning

Marketing hyperbole often exceeds reality. Here are questions you should ask before buying.

Phishing Campaign Underscores Threat from Low Budget, Low Skilled Attackers

For just over $1,000, a phishing operation successfully spied on members of the Tibetan community for 19 months, Toronto University's Citizen Lab found.

Digital Extortion to Expand Beyond Ransomware

In the future of digital extortion, ransomware isn't the only weapon, and database files and servers won't be the only targets.

Breach-Proofing Your Data in a GDPR World

Here are six key measures for enterprises to prioritize over the next few months.