• img February 13, 2018

Microsoft to provide Windows Defender ATP for older OS versions

Microsoft will backport Windows Defender Advanced Threat Protection (ATP) to meet the security needs of organizations that have not yet entirely switched to Windows 10. Windows Defender ATP provides deep insights into Windows 7 events on a rich machine timeline What is Windows Defender ATP? Windows Defender ATP is a unified endpoint security platform that […]

Read More
  • img February 13, 2018

Venerable Unicode Technique Used to Deliver Cryptomining Malware Through Telegram

It’s just the latest reported vulnerability for the secure messaging application.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/venerable-unicode-technique-used-to-deliver-cryptomining-malware-through-telegram/

Read More
  • img February 13, 2018

Most CIOs plan to deploy artificial Iintelligence

Meaningful artificial intelligence (AI) deployments are just beginning to take place. Gartner’s 2018 CIO Agenda Survey shows that four percent of CIOs have implemented AI, while a further 46 percent have developed plans to do so. “Despite huge levels of interest in AI technologies, current implementations remain at quite low levels,” said Whit Andrews, research […]

Read More
  • img February 13, 2018

German court says Facebook use of personal data is illegal

Facebook’s default privacy settings and some of its terms of service fall afoul of the German Federal Data Protection Act, the Berlin Regional Court has found. By not adequately securing the informed consent of its users, Facebook’s use of personal data is illegal – and so is the social network’s “real-name” clause, as the German […]

Read More
  • img February 13, 2018

Tackling the insider threat: Where to start?

Many organizations still believe the definition of an insider threat is limited to a rogue employee purposefully leaking embarrassing information, or nuking a couple of systems when he or she quits and walks out the door with internal or customer data to take to a new job. But not all insider threats have to be […]

Read More