Access Control — Opinions

Goodbye legacy systems, hello “Composable IT”

We all remember how much fun it was to build stuff with Lego blocks, right? Imagine how much more fun it would be if the blocks could duplicate themselves whenever you wanted, and if they were programmed so that you could quickly construct, say, an ocean liner, then deconstruct it at the touch of a button and turn it into a skyscraper.

Paul Haverfield | 30 Oct | Read more

Seven predictions for ransomware’s evolution

During the past six months, the Carbon Black Threat Analysis Unit (TAU) analysed more than 1,000 ransomware samples, categorising them into 150 families, and found attackers are looking to make quick, easy money with unsophisticated malware, combined with sophisticated delivery methods.

Brian Baskin | 26 Sep | Read more