article thumbnail

RSAC insights: Malware is now spreading via weaponized files circulating in data lakes, file shares

The Last Watchdog

As part of this very complex, highly distributed architecture, unstructured data flows from myriad sources into and back out of partner networks, cloud file shares and data lakes. He told me about this recent example: an attacker was able to slip malicious code into a zip file sent from an attorney to a banking client in a very advanced way.

article thumbnail

ISG Returns to In-Person Events with Digital Business Summit in London

CyberSecurity Insiders

In-person and remote speakers include leaders from such organizations as Lloyds, Amadeus, Re-source, Mars, Royal Bank of Canada, Virgin, Nokia, Unisys, Axians, Tillburg University and Metis Digital. All attendees can access the event content live on location or on-demand.