article thumbnail

More Than 90 Percent of Malware in Q2 Came Via Encrypted Traffic: WatchGuard

eSecurity Planet

percent of all malware detected on networks of WatchGuard Technologies customers in the second quarter came over encrypted connections, raising the security risk for the 80 percent of such organizations that lack processes for decrypting and scanning HTTPS traffic for threats. Malware in Encrypted Traffic. A surprising 91.5

article thumbnail

Navigating Compliance: Understanding India's Digital Personal Data Protection Act

Thales Cloud Protection & Licensing

This act, set to replace the existing frameworks under the Information Technology Act of 2000 and the SPDI Rules of 2011, provides a comprehensive approach to protecting digital personal data. It limits administrators' control over security activities and encryption keys, supporting two-factor authentication.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How better key management can close cloud security gaps troubling US government

Thales Cloud Protection & Licensing

Gaps in human capital and tools to securely deploy cloud services The Treasury’s point here, as stated in its news release on the report , is the “current talent pool needed to help financial firms tailor cloud services to better serve their customers and protect their information is well below demand.”

article thumbnail

Microsoft warns about ongoing PonyFinal ransomware attacks

Security Affairs

pic.twitter.com/Q3BMs7fSvx — Microsoft Security Intelligence (@MsftSecIntel) May 27, 2020. Learn how to build organizational security hygiene to prevent human-operated attacks: [link] — Microsoft Security Intelligence (@MsftSecIntel) May 27, 2020. The ransom note contains the payment instructions.

article thumbnail

STRRAT RAT spreads masquerading as ransomware

Security Affairs

Microsoft Security Intelligence researchers uncovered a malware campaign that is spreading a remote access trojan (RAT) tracked as STRRAT. This RAT is infamous for its ransomware-like behavior of appending the file name extension.crimson to files without actually encrypting them. Researchers noticed that STRRAT version 1.5

article thumbnail

Protecting Big Data, while Preserving Analytical Agility

Thales Cloud Protection & Licensing

And, as more data is available for analytical purposes, more sensitive and private information is at risk. As The 2018 Thales Global Data Threat Report notes, “The top Big Data security issue is that sensitive data can be anywhere – and therefore everywhere – a concern expressed by 34% of global and U.S. respondents.”.

article thumbnail

How better key management can close cloud security gaps troubling US government

Security Boulevard

Gaps in human capital and tools to securely deploy cloud services The Treasury’s point here, as stated in its news release on the report , is the “current talent pool needed to help financial firms tailor cloud services to better serve their customers and protect their information is well below demand.”