Estimated reading time: 2 minutes
The evolution of the Work From Anywhere model has led to a highly distributed workforce with a proliferation of devices that are both BYOD and corporate-owned. This proliferation has resulted in an expansion of an enterprise’s attack surface, due...Estimated reading time: 3 minutes
Modern day data security and protection requirements aren’t only about integrity, confidentiality, and availability. Instead, security professionals must take a proactive approach for improving business value and addressing organizational security. However, talking about proactivity isn’t going to make much...Estimated reading time: 3 minutes
As we have explained in the previous Troldesh ransomawre blog, Cyber criminals are now spreading and infecting ransomware by gaining access to computers through Remote Desktop. Remote access to the victim’s computer is gained by using brute-force techniques which...