Skip to main content

NEWS & EVENTS

Opticom


ROKRAT using Twitter, other social media as command and control link

Security researchers at Cisco Talos explain how the ROKRAT malware is leveraging social media to hide its C&C communications in plain sight. Thomas Fischer comments on the story.

Read Now

Senators Question Apple About New COVID-19 App Privacy


Case Study: Consolidated DLP and EDR for Internal and External Threats


person holding tablet device

Definitive guide to bullet proofing data security for technology companies


Data Scanning: How to Protect Sensitive & Confidential Data


Ransomware

What is Ransomware as a Service? Learn About the New Business Model in Cybercrime


IT Security Professionals Lack Focus on Strategic Security Priorities

Security professionals are reluctant to adopt a more comprehensive endpoint data security approach for fear the gains in security may be outweighed.

Read the full article

Learn More

Following Breach, Marketplace Minted Target of New CCPA Lawsuit


Datasheet: Digital Guardian Endpoint Data Loss Prevention