article thumbnail

Smooth Cybercriminals: Google Warns of Iran-Backed APT Hackers

SecureWorld News

TAG reported that Iranian-government-backed actors, known as APT35 and by the aliases Rocket Kitten and Charming Kitten, are quickly picking up speed, especially when it comes to implementing slick phishing attacks. The phishing kit will also ask for second-factor authentication codes sent to devices," reads the TAG blog post.

Google 76
article thumbnail

Inside the Complex Universe of Cybersecurity

SecureWorld News

Another major trend necessitating a holistic governance process is cloud security. Role-based access controls, multi-factor authentication, and adherence to standard screening checklists are essential to securing the cloud environment.

article thumbnail

Cloud Musings by Kevin L. Jackson: IBM Debate Series - What's.

Cloud Musings

Next week I will be participating in the inaugural session of What’s Next in IT Debate Series , a new program of authentic debates and conversations on key technology topics. GovCloud: Cloud Computing for the Business of Government. Demystifying PaaS for Federal Government. Cloud Computing Presentations. Popular Pages.

IBM 107