Government IT leaders have been working through digital transformation roadmaps with a key focus on cybersecurity for several years, supported by mandates and volumes of guidelines from the federal government. While customer experience has not historically been tied to these efforts, the…
Source: www.meritalk.com – Read more

Hazy Hawk Exploits Organizations’ DNS Gaps to Abuse Cloud Resources & Deliver Malware
Security researchers have identified a threat actor called “Hazy Hawk” that is hijacking abandoned cloud resources from prominent organisations to distribute scams and malware. The