Cloud migration is now the norm. When will security follow?
Traditional end-point or network-accessed protection measures are no longer good enough, says Sanele Ntoza, channel manager, F5 Networks at Westcon-Comstor Sub-Saharan Africa.
This ransomware is unique in that it is activated by human operators and not automated, says Zaheer Ebrahim, senior sales engineer South Africa at Trend Micro Sub-Saharan Africa.
Trend Micro has been closely following waves of Pawn Storm's targeted credential phishing attacks and has collected thousands of e-mail samples, says Indi Siriniwasa, VP at Trend Micro Sub-Saharan Africa.
The notorious espionage group has been using its resources to begin directly attacking Web and cloud services, says Indi Siriniwasa, VP at Trend Micro Sub-Saharan Africa.
While the hacking group’s techniques might change, the history of Pawn Storm shows it has significant resources at its disposal to pivot wherever needed, says Indi Siriniwasa, VP at Trend Micro Sub-Saharan Africa.