Montana healthcare provider tries to resolve lawsuit filed on behalf of victims of 2019 data breach
One Charged in Puppy Scam
US brings charges against suspected operator of fraudulent website lovelyhappypuppy.com
Orca Security Nets $55m Series B Funding
Funding will see firm expand cloud security, compliance and sales capabilities
One in Five Online Marketplace Listings Show Signs of Fraud
19% of items listed over Black Friday and Cyber Monday showed signs of being fraudulent or dangerous
Most Victim Organizations Suffer Second Intrusion Within a Year
CrowdStrike calls for continuous monitoring to keep threats at bay
Former NCSC CEO Ciaran Martin Joins SBRC Board
Martin will work with SBRC to strengthen its strategic cyber-relationships across the UK
Thales and Google Cloud Partner for External Encryption Key Management
Partnership will enable security teams to leverage Google Cloud technology for external key management
NSA: Patch VMware Bug Now to Stop Russian Hackers
CVE-2020-4006 was fixed only last week
BTC-e Founder Gets Five Years for Money Laundering
Vinnik escapes charges of involvement in Locky ransomware
Can Edge Computing Exist Without the Edge? Part 2: Edge Computing
In part 1 of this series, I drew the architectural distinction between a centralized cloud platform and a distributed edge network. This is an important foundation upon which to explain the difference between cloud computing and edge computing. The two…