top of page

Ransomware: First files … now complete devices

As ransomware threats continue to grow and evolve, threat types of attacks need to be taken into account and receive specific focus.

1 view

Recent Posts

See All

Rethinking Software in the Organizational Hierarchy

I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and hierarchical security. The concept of least privilege and the d


bottom of page