Cryptomining: The next malware attack

September 28, 2018

Mining for cryptocurrencies is no small task; it takes a lot of CPU and GPU cycles to process the data necessary to generate the currencies. Not everyone has the technical wherewithal, financial resources and the massive amount of hardware to build their own cryptomine, so what options do they have? The answer is simple and as old as time: If you don’t have the resources, you “borrow” (steal?) from someone who does.

This webcast looks at how cryptomining works and how to determine if your computing resources are being used without your knowledge for cryptomining.

Previous Video
Moving to the Cloud, Staying Compliant, and Staying Secure
Moving to the Cloud, Staying Compliant, and Staying Secure

As agencies continue to transition to the cloud it’s more important than ever to stay secure and stay in co...

Next Flipbook
Cloudlock SOC3 Report
Cloudlock SOC3 Report

Report on Cisco Systems, Inc.'s Cloudlock System Relevant to Security, Availability and Confidentiality.