RESOURCES


home.aspx
   
The New Breed of “Fileless Malware” and How It Can Be Stopped with Behavioral Analytics and Machine Learning THE NEW BREED OF “FILELESS MALWARE” AND HOW IT CAN BE STOPPED WITH BEHAVIORAL ANALYTICS AND MACHINE LEARNING

blog article

Feb 21, 2019

A new genus of malware has emerged that breaks the rules of traditional detection and defense methods. Unlike other breeds of malware that require the installation of software on a victim’s machine, fileless malware infects a host computer’s dynamic memory, or RAM. Fileless malware attac...

Read More

Mitigating Security Threats with MITRE ATT&CK MITIGATING SECURITY THREATS WITH MITRE ATT&CK

blog article

Feb 20, 2019

In a previous blog post I explained MITRE ATT&CK and the primary ways organizations might use it to improve their security. As a refresher, the MITRE ATT&CK framework, model, and taxonomy provide a categorized and structured catalog of tactics (the “why” of an attack) and techniq...

Read More

Phillips Lytle LLP: Data Security & Privacy PHILLIPS LYTLE LLP: DATA SECURITY & PRIVACY

video

Feb 19, 2019

Phillips Lytle is proud to provide our clients with extensive expertise in more than 40 practice areas. Our attorneys pride themselves as being knowledgeable, progressive thinkers who are up to speed on the latest trends and developments impacting the industries in which they are involved.

Read More

What is Ransomware and Ransomware Incident Response? WHAT IS RANSOMWARE AND RANSOMWARE INCIDENT RESPONSE?

blog article

Feb 19, 2019

Ransomware is a form of malicious computer malware, that hijacks a device and blocks direct access to it until the victim decides to pay a certain amount of money (ransom) asked for by the creator. This type of attack has seen a huge spike in recent times, partially due to the huge impact ransomware...

Read More

Why blockchain may be blockchain’s best cybersecurity option WHY BLOCKCHAIN MAY BE BLOCKCHAIN’S BEST CYBERSECURITY OPTION

blog article

Feb 19, 2019

One of the hallmark features of blockchain is that it is supposedly much more secure, adding remarkable levels of transparency that could help better identify and mitigate cyber threats. But, at a time when we’re approaching 2,000 blockchain projects in development worldwide, watching thousand...

Read More

How are social networking accounts used for malicious purposes? HOW ARE SOCIAL NETWORKING ACCOUNTS USED FOR MALICIOUS PURPOSES?

blog article

Feb 18, 2019

Close to 3 billion. No, that’s not the population of a country. According to a recent estimate, that will be the total number of users globally on social media. The popularity of this phenomenon called social media can aptly be summed up by just that statistic alone. Social media is everywhere...

Read More

3 Easy Steps to Mitigate Effects of Cyber Attacks 3 EASY STEPS TO MITIGATE EFFECTS OF CYBER ATTACKS

video

Feb 15, 2019

This program is designed to provide a brief overview of the current cybersecurity threats faced by attorneys while illustrating how technology in the practice of law influences an attorney's obligations under the rules of professional responsibility, with a focus on Virginia attorneys. This prog...

Read More

IBM Security Study Results IBM SECURITY STUDY RESULTS

video

Feb 15, 2019

This program is designed to provide a brief overview of the current cybersecurity threats faced by attorneys while illustrating how technology in the practice of law influences an attorney's obligations under the rules of professional responsibility, with a focus on Virginia attorneys. This prog...

Read More

A cyber security health check for the most vulnerable A CYBER SECURITY HEALTH CHECK FOR THE MOST VULNERABLE

blog article

Feb 15, 2019

Who’s most at risk? Having covered the start-up vs corporate question before, we thought we would look into which industry is currently most at risk of cyber attack. According to the Wikipedia entry ‘list of data breaches’, which contains a list of data breaches (spoilers), out of ...

Read More

Social Engineering Attacks by the Numbers: Prevalence, Costs, & Impact SOCIAL ENGINEERING ATTACKS BY THE NUMBERS: PREVALENCE, COSTS, & IMPACT

blog article

Feb 15, 2019

Social engineering attacks are not as rare as you think. In fact, you might already be a victim – you just don’t know it yet. Social engineering works because people are almost always the weakest link in information security. We sometimes do not think about the things we do, or are in a ...

Read More

NEW SCAMS ALERT NEW SCAMS ALERT

blog article

Feb 15, 2019

Tesco are warning customers not to fall for latest text message scam. The text message, under the alias of supermarket giant Tesco, is targeting victims by using their name and car registration plates to ultimately cause damage and steal confidential information. The message, which comprises of thre...

Read More

Defending Against Ransomware: Prevention, Protection, Removal DEFENDING AGAINST RANSOMWARE: PREVENTION, PROTECTION, REMOVAL

blog article

Feb 14, 2019

A ransomware attack can be crippling for an organization. During an attack, cybercriminals will block access to your files or network, claiming that if you pay a ransom fee, your access will be restored. An effective ransomware defense strategy is essential to prevent extensive damage and must inclu...

Read More

Easy Tips for Achieving Network Security EASY TIPS FOR ACHIEVING NETWORK SECURITY

infographic

Feb 14, 2019

To ensure and achieve network security in today’s IT infrastructure is complex, with most organizations supporting different operating systems, server, and Web. Here are the simple ways to help ensure a secure computer network.

Read More

The Best Way to Land that Next Cyber Opportunity THE BEST WAY TO LAND THAT NEXT CYBER OPPORTUNITY

blog article

Feb 14, 2019

Guest Blog by Kersley Joseph, CyberVista Instructor. You completed your cert. You think it might be time to jump ship. How do you go about landing your new opportunity convincingly? Is a certification enough? Is it all about experience and/or technology? Where should you focus your efforts to increa...

Read More

Bad Rabbit – What you need to know about this ransomware and its prevention? BAD RABBIT – WHAT YOU NEED TO KNOW ABOUT THIS RANSOMWARE AND ITS PREVENTION?

blog article

Feb 14, 2019

Ransomware is a malicious software, that secretly downloads on to a computer and warns the user to delete or revoke access to their data. When the hacker has full control of the computer or network, they demand a ransom normally through cryptocurrency to restore the access to the files. Of late, the...

Read More

SECURITY IN NUMBERS SECURITY IN NUMBERS

infographic

Feb 14, 2019

Security attacks aren't just rising; they're becoming more sophisticated and more difficult to deflect when they happen, and the figures are telling. So, even if "security" isn't in your title, it's still a top priority. 89% of businesses say their cybersecurity plan doesn&...

Read More

Fighting Back Against Phishing: A Workplace Concern FIGHTING BACK AGAINST PHISHING: A WORKPLACE CONCERN

blog article

Feb 14, 2019

Is someone phishing in your inbox? It’s more likely than you think. Phishing attacks are common online attacks that aim to steal useful information, from account credentials to personal data. Unlike traditional hacking, though, what sets phishing apart is its personal nature – the person...

Read More

 Harnessing the Power of Metadata for Security HARNESSING THE POWER OF METADATA FOR SECURITY

whitepaper

Feb 14, 2019

Download this white paper to see why metadata is the new super power that improves overall security efficacy.

Read More

 Countering Escalating Cyberthreats with a New Security Architecture COUNTERING ESCALATING CYBERTHREATS WITH A NEW SECURITY ARCHITECTURE

whitepaper

Feb 14, 2019

Learn how to meet your CEO's expectations while upgrading security.

Read More

Types of Phishing Attacks TYPES OF PHISHING ATTACKS

blog article

Feb 13, 2019

Phishing is a social engineering tactic in which an attacker attempts to gain personal data from victims by going undercover as a trusted source whether through an email or a phone call. Users are tricked into giving up their information. The goal of a phishing attack can vary; however, attackers us...

Read More

What is Cybersecurity and What does it mean for you? WHAT IS CYBERSECURITY AND WHAT DOES IT MEAN FOR YOU?

blog article

Feb 13, 2019

With the breadth of news coverage around blockchain, hacking scandals, and data integrity, an average person polled on the street is likely to have at least a basic sense of cybersecurity, as a concept if not by name. The idea of cybersecurity is omnipresent; we know it exists, and we know it matter...

Read More

Improved cybersecurity a 2019 resolution you can actually keep IMPROVED CYBERSECURITY A 2019 RESOLUTION YOU CAN ACTUALLY KEEP

blog article

Feb 13, 2019

Did you make a New Year’s resolution or 2019? While many people set ambitious goals each January – from losing weight to reading more books – most don’t even come close to reaching them. According to U.S. News, 80 percent of people have abandoned their resolutions by the seco...

Read More

A GDPR Update A GDPR UPDATE

blog article

Feb 12, 2019

It’s been nine months since May 25, 2018 when the General Data Protection Regulation (GDPR) went into effect in the European Union (EU). During this short period of time much has happened, including megabreaches that continue to occur throughout the world. The first GDPR enforcement actions ar...

Read More

6 REASONS WHY CYBER THREAT INTELLIGENCE MATTERS (AND HOW CTIA HELPS) 6 REASONS WHY CYBER THREAT INTELLIGENCE MATTERS (AND HOW CTIA HELPS)

blog article

Feb 12, 2019

In today’s technologically developed and evolved world, individuals and organizations alike are constantly connected to the internet to carry out all manner of personal and financial transactions. The internet has become so handy that criminals take advantage of our constant connectivity to st...

Read More

What is Swen Virus? WHAT IS SWEN VIRUS?

blog article

Feb 12, 2019

Swen is a malicious program that replicates and spreads on its own, it is technically classified as a worm virus. Swen does not require any human aid to replicate and circulate not only inside a computer but also to other computers connected to the network. The Swen worm is considered greatly danger...

Read More

Champions of Health and Cybersecurity Unite at HIMSS 2019 CHAMPIONS OF HEALTH AND CYBERSECURITY UNITE AT HIMSS 2019

blog article

Feb 12, 2019

Today is the first full day of HIMSS 2019 – the world’s largest health information and technology conference – and we’ve just arrived in sunny Orlando, Florida, joining more than 45,000 healthcare professionals from across 90+ countries. This year, HIMSS is emphasizing cyber ...

Read More

Does Your Small Business Need Cyber Insurance? DOES YOUR SMALL BUSINESS NEED CYBER INSURANCE?

blog article

Feb 11, 2019

Most businesses invest in physical security and general liability insurance, but cybersecurity is usually limited to a firewall and some antivirus software. Unfortunately, this leaves many small businesses exposed to the high cost of cyber attacks — which are increasing in frequency. According...

Read More

Enhancing cyber threat protection in Microsoft Office 365 ENHANCING CYBER THREAT PROTECTION IN MICROSOFT OFFICE 365

blog article

Feb 11, 2019

In our last blog, we explored the risk of receiving sensitive data unauthorized via email, the sharing sensitive information internally across departments, and the need for advanced data protection features within both on-premise email systems and Microsoft Office 365 (MO365) environments to mitigat...

Read More

A Call to Diversify the Cybersecurity Workforce A CALL TO DIVERSIFY THE CYBERSECURITY WORKFORCE

blog article

Feb 11, 2019

You’ve read about it, know it well, and can probably instantaneously identify one of today’s top cyber crises: the cybersecurity skills gap. It’s putting enterprises, governments and academic institutions at greater risk than ever because we don’t have enough professionals to...

Read More

PLEDGECAMP THE NEXT GENERATION OF CROWDFUNDING Whitepaper v. 2.1 PLEDGECAMP THE NEXT GENERATION OF CROWDFUNDING WHITEPAPER V. 2.1

whitepaper

Feb 11, 2019

Pledgecamp is a next-generation crowdfunding platform that incorporates blockchain technology for security and accountability. Backers gain a decentralized escrow mechanism which protects their funds. Creators receive wide-ranging project support and lower platform fees. Platform Users can earn toke...

Read More

Partnership Capgemini & Startupbootcamp - FinTech & CyberSecurity Program 2018/2019 PARTNERSHIP CAPGEMINI & STARTUPBOOTCAMP - FINTECH & CYBERSECURITY PROGRAM 2018/2019

video

Feb 11, 2019

At Capgemini, we strive to deliver value through applied innovation. One of the initiatives we participate in is the FinTech & CyberSecurity Program at Startupbootcamp. Being part of this ecosystem allows us to help partners in this network to innovate and solve real business problems. Vincent F...

Read More

The death of passwords THE DEATH OF PASSWORDS

infographic

Feb 08, 2019

Enterprises need to start preparing for a future without traditional passwords, according to LoginRadius.  Enterprises trying to keep customer data safe struggle with weak links in traditional authentication methods and employee practices, according to a recent infographic from LoginRadius. Mos...

Read More

London Welcomes IBM LONDON WELCOMES IBM'S C-TOC (CYBER TACTICAL OPERATIONS CENTER) TRUCK

video

Feb 08, 2019

This is why you shouldn’t miss the next visit of the IBM C-TOC (Cyber Tactical Operations Center) to London, the first Cyber Range and Security Operations Centre on wheels.

Read More

Darktrace Antigena: The Future of AI-Powered Autonomous Response DARKTRACE ANTIGENA: THE FUTURE OF AI-POWERED AUTONOMOUS RESPONSE

whitepaper

Feb 07, 2019

The current era in cyber security is characterized by three fundamental challenges: the complexity of the enterprise network and connected infrastructure, the speed of newage attacks, and the strain of overwhelmed incident responders. In many ways, the expansion of networks and continual adoption of...

Read More

The Truth Behind Voter Registration Data Found on the Darknet THE TRUTH BEHIND VOTER REGISTRATION DATA FOUND ON THE DARKNET

blog article

Feb 07, 2019

Very few would argue that recent headlines concerning election security haven’t been alarming. From hacking to voting systems to stolen voter registration data and the deliberate distribution of false candidate information, it’s no wonder people are questioning the integrity of election ...

Read More

Here Comes 5G—What are the Data Security Implications? HERE COMES 5G—WHAT ARE THE DATA SECURITY IMPLICATIONS?

blog article

Feb 07, 2019

Organizations and consumers alike are eagerly anticipating the arrival of 5G, the latest generation of cellular mobile communications. But perhaps IT and security executives need to be thinking about the potential security implications. This latest iteration of communications technology is designed ...

Read More

Bitdefender Smart Home Security places our cyber-security specialists at your disposal BITDEFENDER SMART HOME SECURITY PLACES OUR CYBER-SECURITY SPECIALISTS AT YOUR DISPOSAL

blog article

Feb 07, 2019

Protecting IoT devices is not just an option; it’s a necessity. Smart fridges, washing machines, coffee pots, light bulbs, garage locks, toys, baby monitors – you may have at least one of these. The more popular smart gadgets become, the more hackers are tempted to attack them or use the...

Read More

SamSam Ransomware: Definition and Prevention SAMSAM RANSOMWARE: DEFINITION AND PREVENTION

blog article

Feb 07, 2019

What is SamSam Ransomware? SamSam is a blend of malware and ransomware because the key objective of the cybercriminal behind SamSam is to get in into an organization. After getting in, it waits and gathers a lot of data. In the meantime, the cybercriminal gains access to systems and then copies the ...

Read More

Google Chrome extension warns if your password has been leaked GOOGLE CHROME EXTENSION WARNS IF YOUR PASSWORD HAS BEEN LEAKED

blog article

Feb 07, 2019

Anyone who has a presence on the internet is likely to be suffering from breach fatigue. Data leaks are reported in the headlines on a daily basis, and users can feel so overwhelmed by the sheer number of breaches that they feel there’s little they can do to keep ahead of hackers. It can almos...

Read More

The Top Tactics to Be Successful at Secure DevOps THE TOP TACTICS TO BE SUCCESSFUL AT SECURE DEVOPS

blog article

Feb 07, 2019

Today’s increasingly connected world, with access to mobile devices and cloud scale computing, is leading to disruption in business models and processes. To succeed, you have no option but to continuously deliver new value to customers at the increasing speed that they demand. Mark Andreessen,...

Read More

Web Malware Attack: The Different Stages WEB MALWARE ATTACK: THE DIFFERENT STAGES

infographic

Feb 07, 2019

Discussing the different stages of web malware attack, explaining how the malware makes its entry, how it gets distributed and then the other stages, namely exploit, infection and the execution. Protect yourself from web malware attacks.

Read More

Cyber-security trends to look out for this year CYBER-SECURITY TRENDS TO LOOK OUT FOR THIS YEAR

blog article

Feb 07, 2019

From a cyber-security perspective, last year was certainly eventful! In May, GDPR finally came into effect in Europe, a move that demonstrated how governing bodies are finally getting serious about protecting its citizens’ personal data. Suddenly, organisations who operate in Europe are faced ...

Read More

The Origins of Web Security and the Birth of Security Socket Layer (SSL) Protocol THE ORIGINS OF WEB SECURITY AND THE BIRTH OF SECURITY SOCKET LAYER (SSL) PROTOCOL

blog article

Feb 06, 2019

As people who live and breathe cybersecurity, at Exabeam we’re naturally fascinated by its history. In fact, we built a History of Cybersecurity 2019 Calendar to share our research. Each month features dates when significant events in cybersecurity occurred. This is the second blog in a series...

Read More

Cybersecurity Challenges in Japan CYBERSECURITY CHALLENGES IN JAPAN'S CRYPTOCURRENCY MARKET

whitepaper

Feb 06, 2019

In December 2017, the price of a bitcoin was more than USD 19,000 – nearly fifteen times the price for an ounce of gold. But while gold is a physical object that can be held, traded and used to make products and jewelry, bitcoin and other cryptocurrencies exist only digitally and derive their ...

Read More

HOW TO SECURE THE CLOUD HOW TO SECURE THE CLOUD

blog article

Feb 06, 2019

The cloud has become a mainstay for many businesses and governments and the revolution is still growing at a very fast pace. This mass migration to the cloud makes platforms that can ensure efficiency, productivity, flexibility, profitability, and agility very attractive. Like every technology, the ...

Read More

620 million Hacked Accounts Put on Sale 620 MILLION HACKED ACCOUNTS PUT ON SALE

blog article

Feb 06, 2019

Details of 620 million accounts were found for sale on the dark web, stolen from 16 different hacked websites. According to The Register, the stolen information was put up on the Tor network site Dream Market cyber-souk. A single hacker stole the account information up for sale. This malicious actor...

Read More

12 Cyber Security Principles from the Experts 12 CYBER SECURITY PRINCIPLES FROM THE EXPERTS

blog article

Feb 06, 2019

Blackpoint Cyber reveals 12 cyber security principles that drive their solution and business. Numerous successful cyber-attacks against even the best funded, most competent organizations demonstrate that current security strategies and solutions are not working. Here at Blackpoint we have a pretty u...

Read More

Cybersecurity: Billions Pour In, Basics Languish CYBERSECURITY: BILLIONS POUR IN, BASICS LANGUISH

blog article

Feb 06, 2019

2018’s headlines only underscored the need for robust data security. As if to add a whopping exclamation point to the end of the year, the massive Marriott/Starwood Resorts data breach (announced in November) saw an estimated 327-500 million records compromised. With the relentless parade of b...

Read More

Update your iOS devices now against the FaceTime eavesdropping bug UPDATE YOUR IOS DEVICES NOW AGAINST THE FACETIME EAVESDROPPING BUG

blog article

Feb 06, 2019

Last week a bug became such big news that it broke out of the technology press, and into the mainstream media – generating headlines around the globe. The reason? A bizarre bug had been discovered in the way iPhones and iPads handled Group FaceTime calls meant that someone could potentially li...

Read More

Twenty-Two Million Dollars: Enough Incentive for Cybersecurity? TWENTY-TWO MILLION DOLLARS: ENOUGH INCENTIVE FOR CYBERSECURITY?

blog article

Feb 06, 2019

As 2019 launches, the word cybersecurity is everywhere. There’s security around medical devices, telemedicine, IT systems and, arguably most importantly, portals – which are accessed by employees, vendors, and patients. Cybersecurity is a big focus for providers, a topic that ranked amon...

Read More

What is Penetration Testing? WHAT IS PENETRATION TESTING?

blog article

Feb 06, 2019

Penetration testing is an interesting subsection of cyber security. Where many areas of cyber security focus on defending networks, penetration testing is entirely about a pen tester breaking into networks and showing how they did it. The discipline is one of the most difficult paths to follow in th...

Read More

End-to-End Security: Unlock Opportunity With A New Security Approach END-TO-END SECURITY: UNLOCK OPPORTUNITY WITH A NEW SECURITY APPROACH

whitepaper

Feb 06, 2019

The average employee today uses 3 devices and 36 cloud services a day. Traditional security measures weren’t designed to accommodate this rapidly expanding array of devices, apps, services, and cloud infrastructure. In order to keep up with the pace of innovation, organizations need to rethink how t...

Read More

Six Must-Haves for Application Deliver in Hybrid- and Multi-Cloud Environments SIX MUST-HAVES FOR APPLICATION DELIVER IN HYBRID- AND MULTI-CLOUD ENVIRONMENTS

whitepaper

Feb 06, 2019

Discover why ninety-four percent of organizations surveyed are already modifying, overhauling, or reassessing their network infrastructure to facilitate application delivery in hybrid- and multi-cloud environments. Read this e-book to learn why you should re-architect your network infrastructure to ...

Read More

Home Router or Trojan Horse? HOME ROUTER OR TROJAN HORSE?

blog article

Feb 05, 2019

The world of cybersecurity is full of stories of technology secretly encroaching on our privacy. The most common attack comes from malware that we enable hackers to store on our computers or mobile devices. Most of us are familiar with these “Trojan horse” viruses that can open up our de...

Read More

Is Cybersecurity the Same as Data Privacy? IS CYBERSECURITY THE SAME AS DATA PRIVACY?

blog article

Feb 05, 2019

If you look at the title of this blog article and aren’t sure what to answer, you’re not alone. Even industry veterans find it hard to disentangle cybersecurity and data privacy. There is a good reason for this. They are associated, even intrinsically linked, and they both have to deal w...

Read More

A Network Operations Guide for Intent-based Segmentation A NETWORK OPERATIONS GUIDE FOR INTENT-BASED SEGMENTATION

whitepaper

Feb 05, 2019

Segmentation of networks, devices, users, and applications has long been a best practice for supplementing edge security and breaking up flat internal networks. However, for network engineering and operations leaders who prioritize risk mitigation, achieving compliance and effective security posture...

Read More

The State of our Digital Union: Where the U.S. Stands on Cybersecurity THE STATE OF OUR DIGITAL UNION: WHERE THE U.S. STANDS ON CYBERSECURITY

blog article

Feb 05, 2019

President Donald Trump is set to deliver his second State of the Union address tonight. Millions of Americans will tune in to hear Trump take stock of where our nation stands and lay out an agenda for his next year in office. According to news reports, the president is expected to touch on an array ...

Read More

Forging fresh cyber security talent FORGING FRESH CYBER SECURITY TALENT

blog article

Feb 05, 2019

Data breaches, smaller or otherwise, are making the headlines increasingly often. Alleged failed Holiday Season deliveries are one of many popular methods cyber criminals use. Scammers would send people phishing emails – which were on fraudsters’ top 10 list for 2018 – or otherwise...

Read More

Cybersecurity: FBI, Europol and HPE cybercrime fighters unite CYBERSECURITY: FBI, EUROPOL AND HPE CYBERCRIME FIGHTERS UNITE

video

Feb 05, 2019

Discover the cybersecurity reality of 2019 where there are two kinds of businesses, those who don’t know they’ve been compromised and those who do. Learn how to get more proactive by building compute resources with security embedded.

Read More

 How to Securely Erase Different SSDs: NVMe, PCIe and More HOW TO SECURELY ERASE DIFFERENT SSDS: NVME, PCIE AND MORE

whitepaper

Feb 05, 2019

Flash-based memories, like solid state drives (SSDs), are more difficult to completely and permanently erase than magnetic hard disk drives (HDDs), posing a challenge for many data centers. And, as older generation SSDs, such as Fusion-io PCIe cards and newer generation SSDs, such as NVMes, are reac...

Read More

Do You Have a Ransomware Strategy in Place? DO YOU HAVE A RANSOMWARE STRATEGY IN PLACE?

blog article

Feb 04, 2019

Imagine opening your work laptop and seeing a ransom note: All of your data has been encrypted and you have one hour to make a payment in Bitcoin before the price increases. If you don’t make a payment within one day, all of your files will be deleted or posted online for everyone to see. What...

Read More

What to Know About the HITRUST RightStart Program WHAT TO KNOW ABOUT THE HITRUST RIGHTSTART PROGRAM

blog article

Feb 04, 2019

In an ideal world, every organization would place a high importance on information security, regardless of its maturity level, annual revenue, or contractual obligations. Unfortunately, we don’t live in an ideal world. Many companies—especially new companies—simply don’t have...

Read More

Cybersecurity Documentation: The Best Defense Is a Good Offense CYBERSECURITY DOCUMENTATION: THE BEST DEFENSE IS A GOOD OFFENSE

blog article

Feb 04, 2019

Most people do not regard their cybersecurity and privacy documentation as a proactive security measure. On the contrary, many oftentimes view documentation as a passive effort that offers little protection to a company, generally an afterthought that must be addressed to appease compliance efforts....

Read More

How IBM’s hyper-realistic Cyber Tactical Operations Center is simulating cyberattacks HOW IBM’S HYPER-REALISTIC CYBER TACTICAL OPERATIONS CENTER IS SIMULATING CYBERATTACKS

video

Feb 04, 2019

In this video we speak to Caleb Barlow, Vice President of IBM Security, about their new mobile cyber security centre, the IBM X-Force Command Cyber Tactical Operations Center (C-TOC), built on the back of an 18-wheeler tractor-trailer truck. Caleb explains how the vehicle was built both to serve as ...

Read More

5 Best Practices for Data Breach Prevention in 2019 5 BEST PRACTICES FOR DATA BREACH PREVENTION IN 2019

blog article

Feb 04, 2019

In today’s digital economy an increasing volume of information is collected and data is turning not only into a more valuable, but also into a more vulnerable resource. For businesses it has become a key input for growth, differentiation and for maintaining competitiveness. With data’s e...

Read More

Attacks on SCADA Systems Highlight the Need for Effective Cybersecurity ATTACKS ON SCADA SYSTEMS HIGHLIGHT THE NEED FOR EFFECTIVE CYBERSECURITY

blog article

Feb 04, 2019

In December 2015, more than 200,000 Ukrainians found themselves without power during a blackout cause by a cyberattack launched from within the Russian Federation. The attack was carried out by a spear-phishing campaign that was used to install malware on energy company computers. The malware, dubbe...

Read More

Manage Emerging Cybersecurity Risks by Rallying Around Mutual Concerns MANAGE EMERGING CYBERSECURITY RISKS BY RALLYING AROUND MUTUAL CONCERNS

blog article

Feb 04, 2019

Global risks are intensifying but the collective will to tackle them appears to be lacking. — The World Economic Forum’s “Global Risks Report 2019”. With the start of a new calendar year, chief information security officers (CISOs) are looking for ways to set the tone for the...

Read More

Employees are Cyber Secure in Theory, But Not in Practice EMPLOYEES ARE CYBER SECURE IN THEORY, BUT NOT IN PRACTICE

infographic

Feb 04, 2019

Across the world, cybersecurity has moved from the shadows to center stage, due to increasing malware attacks and the soaring cost of resultant damages [predicted to rise to $6 trillion annually by 2021]. It’s no surprise therefore that Forbes predicts that cybersecurity is a top business prio...

Read More

HARMAN Automotive Technologies: Providing Secure Solutions through the Automotive Operations Center HARMAN AUTOMOTIVE TECHNOLOGIES: PROVIDING SECURE SOLUTIONS THROUGH THE AUTOMOTIVE OPERATIONS CENTER

video

Feb 01, 2019

Connectivity enables transformation but not without its risks. Sales of connected cars continue to grow and will reach an estimated 380 million vehicles by 2020. Protecting this increasingly complex connected car ecosystem can be a difficult task. Backed by extensive experience in traditional IT sec...

Read More

Data Protection Must be the Number One Enterprise Focus in 2019 DATA PROTECTION MUST BE THE NUMBER ONE ENTERPRISE FOCUS IN 2019

blog article

Feb 01, 2019

Sensitive data protection continues to gain priority for many enterprises, especially from the C-suite perspective. The rise of privacy regulations such as the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) have increased the urgency to manage sensitive data &md...

Read More

GDPR-compliant organisations reaping the benefits, study finds GDPR-COMPLIANT ORGANISATIONS REAPING THE BENEFITS, STUDY FINDS

blog article

Feb 01, 2019

GDPR-compliant organisations reaping the benefits, study finds Luke Irwin  1st February 2019. Organisations that meet the requirements of the GDPR (General Data Protection Regulation) experience a wide variety of benefits, according to a new Cisco report. The 2019 Data Privacy Benchmark Study d...

Read More

Drive Innovation With Your Security Strategy in 2019 DRIVE INNOVATION WITH YOUR SECURITY STRATEGY IN 2019

blog article

Feb 01, 2019

It’s hard to keep New Year’s resolutions. According to U.S. News & World Report, nearly 80 percent of them fail by the second week of February — not because the intent is off or the motivation is gone, but simply because the status quo is easier. Change requires discomfort and ...

Read More

Data Breach Fatigue Makes Every Day Feel Like Groundhog Day DATA BREACH FATIGUE MAKES EVERY DAY FEEL LIKE GROUNDHOG DAY

blog article

Feb 01, 2019

The constant string of data breaches isn’t what I’d call funny, but it does make me think about one of my favorite cinematic comedies. The film “Groundhog Day” stars Bill Murray as a grumpy weatherman who travels to the little town of Punxsutawney, Pennsylvania, where a famou...

Read More

Can Security Teams Tame Today’s Cloud Complexity? CAN SECURITY TEAMS TAME TODAY’S CLOUD COMPLEXITY?

blog article

Feb 01, 2019

The promise was that cloud computing would simplify enterprise business-technology. Enterprise users would be able to focus on their applications and services while leaving the deeper security issues associated with infrastructure and secure delivery and management of applications to the cloud provi...

Read More

Learning from the Equifax Data Breach: Understanding the Details of One of the Largest Cyber Attacks of All Time LEARNING FROM THE EQUIFAX DATA BREACH: UNDERSTANDING THE DETAILS OF ONE OF THE LARGEST CYBER ATTACKS OF ALL TIME

blog article

Jan 31, 2019

148 million consumers were affected by the Equifax Data Breach in 2017, more than half of all American adults. The US House of Representatives recently published an extensive report that allows the public to see what happened throughout the attack step by step, the techniques the attackers used to p...

Read More

Buying Email and Web Security Has Gotten Harder BUYING EMAIL AND WEB SECURITY HAS GOTTEN HARDER

blog article

Jan 31, 2019

Has the success of Microsoft Office 365 exacerbated the already complex task of purchasing email and web security? New Buyer’s Guides give a framework and provide a checklist to get it right. Over the last few years, the way businesses use technology has undergone a complete transformation, dr...

Read More

How to Defend Against Motivated and Sophisticated Cyberattackers HOW TO DEFEND AGAINST MOTIVATED AND SOPHISTICATED CYBERATTACKERS

blog article

Jan 31, 2019

They make our most treasured stories so much more interesting. As human beings we’re complex, so we love to see our villains portrayed with layers. We crave a visceral, relatable depiction to send a shiver up the spine. I’d point you in the direction of Anthony Hopkins’ unflinching...

Read More

Why is cyber security important to utility companies & where does mobile fit in? WHY IS CYBER SECURITY IMPORTANT TO UTILITY COMPANIES & WHERE DOES MOBILE FIT IN?

blog article

Jan 31, 2019

It’s never a long wait until the next data breach hits the headlines. Recently, companies such as Whole Foods, Macy’s and British Airways have all suffered data breaches. For the utilities industry, a data breach could have serious consequences — not only for the company under atta...

Read More

UK Enterprises to Compete for £70m in Government Cybersecurity Challenge UK ENTERPRISES TO COMPETE FOR £70M IN GOVERNMENT CYBERSECURITY CHALLENGE

blog article

Jan 31, 2019

After 40 percent of UK businesses reported data breaches or security incidents in the past year, the government wants to completely “design out” complex cyber risks and attacks. To achieve this and strengthen national infrastructure and consumer security, officials plan to issue an impre...

Read More

6 Best Cybersecurity Podcasts to Follow in 2019 6 BEST CYBERSECURITY PODCASTS TO FOLLOW IN 2019

blog article

Jan 31, 2019

Keeping up with the security industry and latest trends can be daunting, and you don’t always have time in your day to read your favorite news sources or blogs to stay up to speed. That’s where podcasts come in. There are some great security podcasts out there that discuss security news,...

Read More

What is Session Hijacking Attack and how to prevent them? WHAT IS SESSION HIJACKING ATTACK AND HOW TO PREVENT THEM?

blog article

Jan 31, 2019

Session hijacking is a web attack carried out by a cybercriminal to steal valuable data or information. It works based on the principle of computer sessions and the cybercriminals makes use of the active sessions. In order to better understand how a session attack happens, it is important to know wh...

Read More

Guidance Notes on Cybersecurity GUIDANCE NOTES ON CYBERSECURITY

whitepaper

Jan 30, 2019

The financial services industry is undergoing a digital transformation, introducing innovative products, services and organisational forms. Yet, while recent technological advancements such as distributed ledger technology foster innovation within the financial services industry, they also introduce...

Read More

Penetration Testing to check for exploitable vulnerabilities PENETRATION TESTING TO CHECK FOR EXPLOITABLE VULNERABILITIES

infographic

Jan 30, 2019

Explaining step by step how a penetration test, or pen-test, helps measure the security of an organization’s IT infrastructure by attempting safe exploitation of vulnerabilities. Know how a penetration test works towards ensuring better data security; understand the different steps involved, f...

Read More

Building a Cybersecurity Talent Pipeline One Coding Challenge at a Time BUILDING A CYBERSECURITY TALENT PIPELINE ONE CODING CHALLENGE AT A TIME

blog article

Jan 30, 2019

Like many technology companies, Webroot is constantly on the hunt for a diverse pool of engineering and technical cybersecurity talent. According to Jon Oltsik, senior principal analyst with Enterprise Security Group, a cybersecurity skills deficit holds the top position for problematic skills in ES...

Read More

Supporting the UK in becoming a leading global player in cybersecurity SUPPORTING THE UK IN BECOMING A LEADING GLOBAL PLAYER IN CYBERSECURITY

blog article

Jan 30, 2019

By the turn of 2019, Arm technologies had shipped in more than 130 billion silicon chips, making the Arm architecture the most widely-deployed advanced instruction set ever. It’s a constant source of pride, especially for me as chief Arm architect, as there really isn’t a sector – ...

Read More

Nest Cameras Hacked Again. What Can Users Do? NEST CAMERAS HACKED AGAIN. WHAT CAN USERS DO?

blog article

Jan 30, 2019

Nest owners simply can’t get a break from hackers highlighting their security vulnerabilities, as breaches grow more common. After a family in California suffered a War of the Worlds-type episode, being “informed” over Nest that a missile attack from North Korea was imminent, a fam...

Read More

Analyzing a new stealer written in Golang ANALYZING A NEW STEALER WRITTEN IN GOLANG

blog article

Jan 30, 2019

Golang (Go) is a relatively new programming language, and it is not common to find malware written in it. However, new variants written in Go are slowly emerging, presenting a challenge to malware analysts. Applications written in this language are bulky and look much different under a debugger from...

Read More

Securing Cyber Space SECURING CYBER SPACE

video

Jan 30, 2019

In a world of 24/7 connectivity, widely available broadband internet and a vastly expanding network of connected devices have brought undeniable benefits to individuals and organizations all around the world. But unless we protect the data we exchange, it remains vulnerable to security threats and c...

Read More

Computer Worm Definition and Types. How to Prevent them? COMPUTER WORM DEFINITION AND TYPES. HOW TO PREVENT THEM?

blog article

Jan 30, 2019

Computer Worm. A computer worm is a type of malware program which infects other systems by making multiple copies of itself and spreading itself onto other computers within the network. Worms exploit certain parts of the operating system that are not visible to the user. The infection is only notice...

Read More

Mobile App Development: Maintaining an Environment of Data Integrity and Security MOBILE APP DEVELOPMENT: MAINTAINING AN ENVIRONMENT OF DATA INTEGRITY AND SECURITY

blog article

Jan 30, 2019

According to statistics that measured from the third quarter of 2016 to the first quarter of 2018, there were more than 1,400 new mobile iOS applications released daily through the Apple App Store. During this same timeframe, the Google Play Store added more than 6,100 android apps per day. Judging ...

Read More

How Artificial Intelligence Can Be Used Maliciously in Cybersecurity HOW ARTIFICIAL INTELLIGENCE CAN BE USED MALICIOUSLY IN CYBERSECURITY

blog article

Jan 30, 2019

Cybersecurity has become the foremost focus in the realm of technology. Unfortunately, it is readily apparent that it’s impossible for the field to keep up with the continued development of malware and cyber-attack methods. Frighteningly, those who prefer to use their skills maliciously have f...

Read More

Change Your Password Day: How to breakup with your password CHANGE YOUR PASSWORD DAY: HOW TO BREAKUP WITH YOUR PASSWORD

blog article

Jan 29, 2019

Do you have that one great password that you love? It’s your go-to when creating a new account. You love it because it’s reliable and usually tied to a fond memory like the street you grew up on, or your childhood pet. Problem is, your favorite password is putting you at risk. For many, ...

Read More

Balancing Security and Usability in Today’s Mobile World BALANCING SECURITY AND USABILITY IN TODAY’S MOBILE WORLD

whitepaper

Jan 29, 2019

Maintaining compliance with data privacy and security regulations—GDPR, CCPA, HIPAA, PSD2, PCI-DSS, GLBA, SOX, NERC-CIP and more—is top of mind for CIOs in 2019. The issues of privacy and security compliance affect ALL enterprise industries today. Security and privacy audits can be disru...

Read More

Apple’s FaceTime privacy bug allowed possible spying APPLE’S FACETIME PRIVACY BUG ALLOWED POSSIBLE SPYING

blog article

Jan 29, 2019

Social media caught fire yesterday as the news of a new Apple bug spread. It seemed that there was a flaw in FaceTime that allowed you to place a call to someone, but listen in on their microphone if they didn’t pick up. Worse, as the news spread, it turned out that there was also a way to cap...

Read More

VeryMal Mac Attack Hides Data Within a Picture VERYMAL MAC ATTACK HIDES DATA WITHIN A PICTURE

blog article

Jan 29, 2019

A recent malware distribution campaign dubbed "VeryMal" leverages an ancient technique called steganography—the hiding of secret information in plain sight—to distribute Mac malware. The VeryMal campaign was caught distributing OSX/Shlayer, which was originally discovered by In...

Read More

Enveil Founder and CEO Ellison Anne Williams on How the Data Security Company Innovates ENVEIL FOUNDER AND CEO ELLISON ANNE WILLIAMS ON HOW THE DATA SECURITY COMPANY INNOVATES

video

Jan 29, 2019

Based in the Washington, D.C. metro area, Enveil is a data security company that focuses on protecting Data in Use. In the words of CEO and Founder Ellison Anne Williams, the company is "an application that will deploy in any kind of environment to secure the data when it's being used or pr...

Read More

Ensuring Strong Cyber Security at the Edge ENSURING STRONG CYBER SECURITY AT THE EDGE

blog article

Jan 29, 2019

We’re hearing more and more about edge computing, and it will likely continue to be a focal point within IT as the Internet of Things (IoT) continues to gain momentum. A key question for organizations looking to the edge: What are the cyber security implications? With edge computing, computati...

Read More

Changing the Game with People-Centric Cybersecurity CHANGING THE GAME WITH PEOPLE-CENTRIC CYBERSECURITY

video

Jan 28, 2019

The cloud has spawned a universe of connected devices. Digital transformation is changing the way we work and play. AI, deep learning and automation are opening new frontiers in cybersecurity and innovation. But at Proofpoint, we’re getting behind something truly radical: people. That’s ...

Read More

Health Sector Coordinating Council HEALTH SECTOR COORDINATING COUNCIL

infographic

Jan 28, 2019

95% of health care institutions confirm being targeted for some form of cyberattack. $5.5+ billion. security breach costs in the health care industry every year. There is a. 62% increase in number of connected medical devices in 5 years which is expected to accelerate. There are over device manufact...

Read More

WordPress Sites Hit With a Zero-Day WORDPRESS SITES HIT WITH A ZERO-DAY

blog article

Jan 28, 2019

WordPress sites using the Total Donations plugin were hit with a zero-day attack due to multiple design flaws in the code. The Wordfence Threat Intelligence team found several critical vulnerabilities in the plugin on January 16th. All known versions up to 2.0.5 were affected in the attack. Cybercri...

Read More

Japanese government to hack into citizens’ IoT devices as part of ’survey’ JAPANESE GOVERNMENT TO HACK INTO CITIZENS’ IOT DEVICES AS PART OF ’SURVEY’

blog article

Jan 28, 2019

Japan has announced plans to deploy intentional cyber-attacks against its own citizens, citing fears that foreign hackers might try to hack the 2020 Summer Olympics in Tokyo. The initiative has the backing of law after the government passed an amendment on Friday last week. Under the supervision of ...

Read More

Government CIOs to Focus Technology Investments on Data Analytics and Cybersecurity in 2019, Gartner Says GOVERNMENT CIOS TO FOCUS TECHNOLOGY INVESTMENTS ON DATA ANALYTICS AND CYBERSECURITY IN 2019, GARTNER SAYS

blog article

Jan 28, 2019

Chief Information Officers in government are recognizing the importance of investing in game-changing technologies, including artificial intelligence, machine learning, analytics and blockchain. Spending on cybersecurity is projected to continue to rise as the government recognizes its role as the s...

Read More

Onapsis Puts the Process of Security to Work for Oracle E-Business Suite ONAPSIS PUTS THE PROCESS OF SECURITY TO WORK FOR ORACLE E-BUSINESS SUITE

blog article

Jan 28, 2019

IT security is not just a set of products and tools arranged in a manner to protect different layers of the enterprise technology stack. It is a process. Security is only created by you, your teams and your people following processes. I recently had the opportunity to tell this story in an interview...

Read More

Important Healthcare Cybersecurity Statistics All Clinicians Should Know IMPORTANT HEALTHCARE CYBERSECURITY STATISTICS ALL CLINICIANS SHOULD KNOW

infographic

Jan 27, 2019

Healthcare technology is growing exponentially as clinicians realize the value of connectivity. But with this advancement comes new opportunities for cybercriminals. In 2017, there was a total of 477 healthcare breaches that impacted approximately 5.6 million patient records.1. On average, the healt...

Read More

FireEye Warns of a New Method Used by Hackers Conducting RDP Attacks FIREEYE WARNS OF A NEW METHOD USED BY HACKERS CONDUCTING RDP ATTACKS

blog article

Jan 27, 2019

According to a recent report by a cybersecurity company, FireEye, hackers who choose to conduct RDP (Remote Desktop Protocol) attacks are seemingly using a new method to avoid detection and protective measures. Researchers warn that hackers have started increasingly using network tunneling, as well ...

Read More

User of the world’s biggest DDoS-for-hire website? Police say they’re coming after you USER OF THE WORLD’S BIGGEST DDOS-FOR-HIRE WEBSITE? POLICE SAY THEY’RE COMING AFTER YOU

blog article

Jan 27, 2019

When police shut down the notorious website webstresser.org last year and arrested its administrators, a clear message was sent to the site’s 151,000 users: you’re next. Until its takedown, webstresser.org was believed to the world’s biggest marketplace for the hiring of distribute...

Read More

Millions of Mortgage and Loan Documents Leaked MILLIONS OF MORTGAGE AND LOAN DOCUMENTS LEAKED

blog article

Jan 26, 2019

Millions of sensitive financial documents were exposed by unprotected servers from the biggest banks in the U.S. These documents went back a decade and include highly sensitive information that revealed financials information of customers. The server contained documents regarding loan and mortgage a...

Read More

DHS Issues Emergency Directive DHS ISSUES EMERGENCY DIRECTIVE

blog article

Jan 26, 2019

The Department of Homeland Security (DHS) issued an emergency warning in an effort to protect federal domains from DNS hijacking campaigns. DHS has listed ‘required actions’ for government agencies to complete with ten days. This warning was issued after a series of DNS hijacking attacks...

Read More

Cyber Threats to the Bioengineering Supply Chain CYBER THREATS TO THE BIOENGINEERING SUPPLY CHAIN

whitepaper

Jan 25, 2019

The Bioengineering supply chain begins with the acquisition of either a physical genetic sample or an existing data record, which could be downloaded from a repository such as the National Center for Biotechnology Information Genbank FTP website. This data is sequenced, stored, analyzed and dissemin...

Read More

WHAT THE GOVERNMENT SHUTDOWN OF 2019 MEANT FOR OUR COLLECTIVE CYBERSECURITY WHAT THE GOVERNMENT SHUTDOWN OF 2019 MEANT FOR OUR COLLECTIVE CYBERSECURITY

blog article

Jan 25, 2019

After five weeks, the partial U.S. government shutdown of 2019 just came to a close. In its wake comes a pinch of American labor and a delay in federal employees receiving their salaries. Additionally, transportation security and other vital federal services exhibited the strain of the prolonged imp...

Read More

BOTNETS: When IOT Goes Rogue BOTNETS: WHEN IOT GOES ROGUE

blog article

Jan 25, 2019

WHAT ARE IoT DEVICES? In a world thriving on interconnectivity, one big development over the last 10 years is not just the invention of IoT devices, but the availability of those devices.  Not only do they extend internet connectivity beyond the standard desktop or laptop, they’ve been de...

Read More

Sustainable Cybersecurity for Industrial IoT SUSTAINABLE CYBERSECURITY FOR INDUSTRIAL IOT

whitepaper

Jan 25, 2019

The nature of Internet of Things (IoT) devices and the scale of their use is what makes securing them so hard. IoT devices emerged for industrial controls two decades ago and then expanded rapidly into business and consumer technologies. The first IoT devices had important but limited capabilities. ...

Read More

How CDW’s Threat Check Finds Hidden Cybersecurity Problems HOW CDW’S THREAT CHECK FINDS HIDDEN CYBERSECURITY PROBLEMS

blog article

Jan 25, 2019

Last fall, CDW helped one of its clients — the director of information security for a midsized energy firm in the Midwest — deal with a situation that had him frustrated and looking for some advice. He knew that his firm was behind the curve in adopting security technology, putting it at...

Read More

The Cybersecurity Ecosystem Playbook THE CYBERSECURITY ECOSYSTEM PLAYBOOK

infographic

Jan 25, 2019

The saying “defense wins championships” doesn’t just apply to sports. It’s just as true when it comes to your organization’s cybersecurity strategy. Follow this playbook to make your cybersecurity strategy a winning one with true infrastructure integration and automatio...

Read More

Cybersecurity Maturity Assessment CYBERSECURITY MATURITY ASSESSMENT

whitepaper

Jan 25, 2019

Measure and Improve your Cybersecurity Approach A service enabling companies to assess, verify and improve cybersecurity across an enterprise and with third-party partners. “The Cybersecurity Framework may become the de facto standard and may impact legal definitions and enforcement guidelines...

Read More

Malware Security Basics MALWARE SECURITY BASICS

video

Jan 25, 2019

Malware is any software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. We're discussing the different types of malware and how to protect yourself from a malware attack.

Read More

Sly criminals package ransomware with malicious ransom note SLY CRIMINALS PACKAGE RANSOMWARE WITH MALICIOUS RANSOM NOTE

blog article

Jan 25, 2019

Ransomware continues to show signs of evolution. From a simple screen locker to a highly-sophisticated data locker, ransomware has now become a mainstream name, even if (historically), it has been around far longer than we want to look back. Although the criminals behind ransomware campaigns are obs...

Read More

Apple Products Targeted by Malware Hiding in Online Images APPLE PRODUCTS TARGETED BY MALWARE HIDING IN ONLINE IMAGES

blog article

Jan 25, 2019

While the number of online threats has been noticed to be on the rise multiple times in recent years, new reports claim that Apple product users are starting to experience them in larger quantities as well. A recent report published by a cybersecurity company Confidant claims so as well after the co...

Read More

Empowering DSOs to secure the Smart Grid EMPOWERING DSOS TO SECURE THE SMART GRID

whitepaper

Jan 25, 2019

3 powerful agents of change: digitalization, decarbonization and decentralization As the world’s growing need for energy meets the power of the Internet of Things, the traditional energy marketplace is rapidly transforming. Millions of meters and energy assets are connected and digitized each ...

Read More

Security Operations Center: A Quick Start Guide SECURITY OPERATIONS CENTER: A QUICK START GUIDE

blog article

Jan 24, 2019

Cybersecurity threats are becoming more common, more dangerous and more difficult to detect and mitigate. According to the Ponemon Institute 2018 Cost of Data Breaches study, organizations take 266 days on average to detect a breach, and over a month to contain it. Companies of all sizes need a form...

Read More

Stages of common cyber attacks STAGES OF COMMON CYBER ATTACKS

infographic

Jan 24, 2019

UK National Cyber Security Centre (NCSC) has issued a paper and an infographic summarizing the key stages of common cyber attacks, in a bid to help individuals and companies to better defend amid the rising cyber threat. The attacker is effectively probing defences for weaknesses that, if exploitabl...

Read More

From the core to the edge: 7 reasons you need security at the edge FROM THE CORE TO THE EDGE: 7 REASONS YOU NEED SECURITY AT THE EDGE

whitepaper

Jan 24, 2019

Security at the edge is an approach to defending your business, your customers — all of your users — from security threats by deploying defense measures closer to the point of attack and as far away from your assets (your people, applications, or infrastructure) as possible. The edge is ...

Read More

Understanding the Types of Cyber Threats on the Rise in 2019 UNDERSTANDING THE TYPES OF CYBER THREATS ON THE RISE IN 2019

blog article

Jan 24, 2019

Keeping your IT environment safe means ensuring your finger is on the pulse of the latest threats in cyber-security. However, while there are always the latest zero-day threats and new attack vectors, each year we see some fundamental repeats. Often attackers find it easy to penetrate networks that ...

Read More

Cyber Resilience in the Electricity Ecosystem: Principles and Guidance for Boards CYBER RESILIENCE IN THE ELECTRICITY ECOSYSTEM: PRINCIPLES AND GUIDANCE FOR BOARDS

whitepaper

Jan 24, 2019

Cyber risk is business risk. In the electricity industry, cyber risk is also an ecosystem-wide risk. Cyber resilience is a challenge for all organizations, but it is of particular importance for the electricity ecosystem. A large-scale blackout would have socioeconomic ramifications for households, ...

Read More

6 KEY RISK MANAGEMENT METRICS FOR CONTROLLING CYBER SECURITY 6 KEY RISK MANAGEMENT METRICS FOR CONTROLLING CYBER SECURITY

whitepaper

Jan 24, 2019

The risk of high impact cyber-related breaches continues to be high on the agenda of organisations working across the financial services sector. The FCA’s recent publication of findings from a report on Cyber and Technology Resilience, has communicated a warning that there is “no immedia...

Read More

CHALLENGES TO SECURITY IN SPACE CHALLENGES TO SECURITY IN SPACE

whitepaper

Jan 24, 2019

Space-based capabilities provide integral support to military, commercial, and civilian applications. Longstanding technological and cost barriers to space are falling, enabling more countries and commercial firms to participate in satellite construction, space launch, space exploration, and human s...

Read More

SECURITY-AS-A-SERVICE HAS ARRIVED SECURITY-AS-A-SERVICE HAS ARRIVED

whitepaper

Jan 24, 2019

Finding the most effective and affordable way to secure your environment is not a simple choice. Between the changing topography of the cyberthreat landscape, the continual increase in security events and incidents; the shortage of skilled cybersecurity professionals; and, let’s face it, the p...

Read More

The AMIGOs of Cloud Computing and How They Impact IT and Security Teams THE AMIGOS OF CLOUD COMPUTING AND HOW THEY IMPACT IT AND SECURITY TEAMS

blog article

Jan 24, 2019

Amazon, Microsoft, IBM, Google, and Oracle’s IaaS (Infrastructure as a Service) divisions are growing rapidly – so how does this impact in-house IT and security? It’s difficult to go through a typical day at the office without encountering cloud services with every click of the mou...

Read More

Improved Fallout EK comes back after short hiatus IMPROVED FALLOUT EK COMES BACK AFTER SHORT HIATUS

blog article

Jan 24, 2019

After a short hiatus in early January, the Fallout exploit kit is back in business again with some new features for the new year. During its absence, we noticed an increase in RIG EK campaigns, perhaps to fill that temporary void. Fallout EK is distributed via malvertising chains (one of them we tra...

Read More

Spear-Phishing: The Smart Malware SPEAR-PHISHING: THE SMART MALWARE

blog article

Jan 24, 2019

Protecting your organization from phishing has never been more important. In this blog, I examine a particularly smart phishing mechanism called spear-phishing, which is becoming increasingly popular, mainly because it’s irresistibly clickable. And that is because it is expertly fine-tuned to ...

Read More

GandCrab Ransomware along with Monero Miner and Spammer GANDCRAB RANSOMWARE ALONG WITH MONERO MINER AND SPAMMER

blog article

Jan 24, 2019

Recently we saw a new campaign through spam mail attachment- zip file. It contains JavaScript file which delivers a bundle of GandCrab Ransomware, Monero miner and Spammer. This bundle of multiple malware variants is nothing new, it is common for ransomware to be paired with miner and spammer. This ...

Read More

SAP Security Notes 2018: Lessons Learned and a Look to What SAP SECURITY NOTES 2018: LESSONS LEARNED AND A LOOK TO WHAT'S AHEAD IN 2019

blog article

Jan 24, 2019

2019 has just begun, but the year is already looking busy in the ERP security world. We’ve decided to put together this blog post as a two-part analysis: the Onapsis Research Labs’ recently completed wrap-up of the SAP Security Notes for 2018 and the World Economic Forum’s Global R...

Read More

Predictions for 2019: Cybersecurity skills shortages are getting worse PREDICTIONS FOR 2019: CYBERSECURITY SKILLS SHORTAGES ARE GETTING WORSE

blog article

Jan 23, 2019

Where will this year’s big cyber security storm come from? What issues are currently keeping information security managers awake at night? December and January is the time when commentators, software vendors and industry insiders tell us what they think is going to happen over the next 12 mont...

Read More

Oklahoma Department of Securities Exposes 3TB of Data OKLAHOMA DEPARTMENT OF SECURITIES EXPOSES 3TB OF DATA

blog article

Jan 23, 2019

The Oklahoma Department of Securities Commission (ODS) disclosed of a huge data leak last week. Many of the files dating back decades included details of FBI investigations, social security numbers, names of AIDS patients, and credentials for remote access to computers. Researchers at UpGaurd first ...

Read More

What is Red, Blue and Purple Teaming? WHAT IS RED, BLUE AND PURPLE TEAMING?

blog article

Jan 23, 2019

Chances are you’ve read our piece on penetration testing and want to get into the field. It’s certainly exciting and full of intrigue. Now that you’re going to go for it, it is very important that you know the different sub divisions in it. Those areas are red, blue and purple. Eac...

Read More

Are You Ready for the Next Attack? 5 Tweaks to Your Incident Response Plan ARE YOU READY FOR THE NEXT ATTACK? 5 TWEAKS TO YOUR INCIDENT RESPONSE PLAN

blog article

Jan 23, 2019

IT security professionals have to deal with preventing and managing a variety of network security risks in their daily work, including cybercrime, the compromise of sensitive data, and service outages. The first line of defense is always prevention, and a slew of tools are used to help with this, in...

Read More

Security in Cloud Privileged Remote Access SECURITY IN CLOUD PRIVILEGED REMOTE ACCESS

whitepaper

Jan 23, 2019

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to your organization. BeyondTrust can help your organization stay secure and compliant, while improving the efficiency and success of your organization with a better...

Read More

Cyber Threat Intelligence and security level maintenance: an essential combination CYBER THREAT INTELLIGENCE AND SECURITY LEVEL MAINTENANCE: AN ESSENTIAL COMBINATION

blog article

Jan 23, 2019

The internet, system networks and information systems have become a real battleground, with every operator having to tackle rapidly growing and progressive cyber threats in a context where attackers have a clear advantage over defenders. In the best-case scenario, an information system will be imple...

Read More

Trojan Horse: Definition and How to Prevent this Virus TROJAN HORSE: DEFINITION AND HOW TO PREVENT THIS VIRUS

blog article

Jan 23, 2019

A Trojan horse is a type of malware often disguised as legitimate software. Unlike computer worms and viruses, Trojans are not able to self-replicate. Hackers and cyber-thieves who try to gain access to a user’s system use Trojans. Users fall for some form of social engineering and accidentall...

Read More

Maintaining regulatory compliance and cyber security MAINTAINING REGULATORY COMPLIANCE AND CYBER SECURITY

infographic

Jan 23, 2019

As data is becoming the new health care currency, protecting it will be key. Clinical innovations, digital interconnectivity, and market complexity is heightening the need for new government policies, regulatory oversight, and risk management in health care Cybersecurity currently heads the list of ...

Read More

Penetration (Pen) Testing for SMBs PENETRATION (PEN) TESTING FOR SMBS

blog article

Jan 22, 2019

Security jargon can be very confusing. Scanning, Pen Tests, Red Team Exercises and now Purple Teaming. It is easy to understand why companies under- or over- spend or simply choose not to test their systems. What’s the difference and which is right for your business? What is a Pen Test? A Pen ...

Read More

Auto-Adapting to the Needs of Industrial Cybersecurity 4.0 AUTO-ADAPTING TO THE NEEDS OF INDUSTRIAL CYBERSECURITY 4.0

blog article

Jan 22, 2019

Cybersecurity touches every aspect of our lives, work, and even our cities. The scope and breadth of cyber-attacks are growing in both size and complexity. In terms of size, a report recently demonstrated that Distributed Denial of Service (DDoS) attacks have been increasing, on average, by 500%. In...

Read More

ICS MALWARE SANDBOX ICS MALWARE SANDBOX

whitepaper

Jan 22, 2019

Industrial Control System (ICS) and IIoT networks require specialized security capabilities because traditional IT sandboxes cannot “explode” or run ICS malware. Traditional IT malware sandboxes provide an environment in which malware is allowed to roam free so that its behavior and payl...

Read More

Strengthen your data privacy practices STRENGTHEN YOUR DATA PRIVACY PRACTICES

blog article

Jan 22, 2019

Your business, whatever its size, most likely processes and maintains information every day. At least annually, take time to review your data privacy practices to reinforce your information security and to reassess your cyber protection. Free government resources are available to help protect your c...

Read More

Reducing Cyber Risk: 5 Tweaks to Your Incident Response Plan REDUCING CYBER RISK: 5 TWEAKS TO YOUR INCIDENT RESPONSE PLAN

blog article

Jan 22, 2019

An incident response plan is a crucial set of instructions designed to help your IT department—security team at larger companies—properly deal with the slew of network security incidents that can hamper your business at any given moment. Such incidents include (but are not limited to) ra...

Read More

Advanced Information Security Features for Microsoft Office 365 ADVANCED INFORMATION SECURITY FEATURES FOR MICROSOFT OFFICE 365

blog article

Jan 22, 2019

In the last few years, Microsoft Office 365 (MO365) has eclipsed all other cloud providers to emerge as the most widely used enterprise cloud service and the latest survey data shows that adoption of MO365 is still increasing. It is not just impressive in its adoption rates, Microsoft has also been ...

Read More

Top Cybersecurity Threats Right Now TOP CYBERSECURITY THREATS RIGHT NOW

blog article

Jan 21, 2019

Bar none, cybersecurity has to be a major consideration for every business owner or manager in business today. The prevalence of people looking to rip your company off has never been higher; and that is the truth for nearly every company that uses the Internet for anything. Today, we take a look at ...

Read More

What Is SIEM And How To Choose The Right Tool WHAT IS SIEM AND HOW TO CHOOSE THE RIGHT TOOL

blog article

Jan 21, 2019

Understanding, Selecting and Using SIEM. One of the hurdles faced by organizations regarding cybersecurity isn’t just establishing protective measures. It’s also managing the sheer deluge of information regarding security events occurring on any given day. Because of the volume and compl...

Read More

COMPREHENSIVE SECURITY WITH THE FORTIGATE ENTERPRISE PROTECTION BUNDLE COMPREHENSIVE SECURITY WITH THE FORTIGATE ENTERPRISE PROTECTION BUNDLE

whitepaper

Jan 21, 2019

Organizations of all sizes face growing complexity in both networking and the threat landscape. Multi-cloud deployments and Internet-of-Things (IoT) devices expand the attack surface, and disparate point solutions deployed to address new threat vectors often do not integrate with existing infrastruc...

Read More

Check Point Maestro – LightBoard Series - Security of hyperscale technical deep dive CHECK POINT MAESTRO – LIGHTBOARD SERIES - SECURITY OF HYPERSCALE TECHNICAL DEEP DIVE

video

Jan 21, 2019

Check Point Maestro – Security of Hyperscale Technical Deep dive. Maestro’s architecture is designed to secure networks both large and small, by orchestrating multiple security gateways into one unified security system. It allows our customers to seamlessly increase their security soluti...

Read More

Northern New Mexico College improves campus cybersecurity with Avast NORTHERN NEW MEXICO COLLEGE IMPROVES CAMPUS CYBERSECURITY WITH AVAST

blog article

Jan 21, 2019

Gains better visibility of cybersecurity health, improves threat protection with Avast Business Antivirus and management console. The College. Northern New Mexico College is known as the most affordable and diverse four-year college in New Mexico. With campuses in Española and El Rito, the co...

Read More

Google fined $57M under GDPR GOOGLE FINED $57M UNDER GDPR

blog article

Jan 21, 2019

New European standards go harder on data collectors to protect user privacy. The Commissione nationale de l’informatique et des libertés (CNIL) is an independent French committee dedicated to upholding its country’s commitment to the General Data Protection Regulation (GDPR), a ne...

Read More

Could your texts be leaked? COULD YOUR TEXTS BE LEAKED?

blog article

Jan 21, 2019

Text leaks can happen to anyone using SMS, but you can avoid it with end-to-end encryption. At a time when our digital world can hold the keys to our success or failure, tight security around anything and everything we send out to the internet, or even through the internet, is essential. As data bre...

Read More

40 Question Guide 40 QUESTION GUIDE

whitepaper

Jan 21, 2019

Every organization--and every vendor--is unique. Thus, many circumstances will warrant the creation of customized security questionnaires. We suggest using industry-accepted best practices as a starting point for your assessment. Our goal with this guide is to help you get started with the creation ...

Read More

A CIO’s Guide for Reducing Security Anxiety A CIO’S GUIDE FOR REDUCING SECURITY ANXIETY

whitepaper

Jan 21, 2019

As a chief information officer, you know you can’t outsource risk. Yet every year, cyber risk demands more and more time from the already-busy CIO. In this guide, we’ll walk through the following: Why cybersecurity benchmarking is difficult for the modern CIO. Different methods of benchmarking you m...

Read More

Important cybersecurity statistics for 2019 IMPORTANT CYBERSECURITY STATISTICS FOR 2019

blog article

Jan 20, 2019

Digital economy is growing everywhere in the world. Technology is changing our livelihoods in unprecedented ways. We cannot imagine life without internet or without using technology in our day-to-day chores. It has certainly altered the nature’s way of evolution, but it also means that there i...

Read More

Alan Woodward’s Top 10 Cybersecurity Predictions for 2019 ALAN WOODWARD’S TOP 10 CYBERSECURITY PREDICTIONS FOR 2019

blog article

Jan 19, 2019

Alan Woodward is a British computer scientist and visiting professor at the University of Surrey. He is a specialist in computer security with particular expertise in covert communications, forensic computing and image/signal processing. Professor Woodward is a Fellow of the Institute of Physics, a ...

Read More

Security Bug Exposed Private Tweets for Years SECURITY BUG EXPOSED PRIVATE TWEETS FOR YEARS

blog article

Jan 19, 2019

Twitter discovered a bug in the system that made users’ private tweets public for over four years. This vulnerability occurred to the Android Twitter app. User’s using the IOS app or the Web to use Twitter were not affected by the vulnerability. The social media site posted to Twitter&rs...

Read More

Network & Security Operations Dreaded Four-Letter Word NETWORK & SECURITY OPERATIONS DREADED FOUR-LETTER WORD

infographic

Jan 19, 2019

Enterprise Network & Security Teams dread the word MORE. More attacks. More vulnerabilities. More devices. More traffic. More work. In response, best-in-class teams are focusing on tightening up security and reducing (or eliminating) manual activities through automation. The 2018 Verizon Data Br...

Read More

Why network-level access is critical for attackers WHY NETWORK-LEVEL ACCESS IS CRITICAL FOR ATTACKERS

blog article

Jan 19, 2019

In recent months, we’ve seen a new trend where malware is used to load and distribute other types of threats like ransomware, trojans, backdoors etc. Malware distribution as a service. One recent example of this was when attackers used the Emotet malware family as a distributor to circulate hi...

Read More

PROTECTING INDUSTRIAL CONTROL SYSTEMS AND SCADA NETWORKS PROTECTING INDUSTRIAL CONTROL SYSTEMS AND SCADA NETWORKS

whitepaper

Jan 18, 2019

Starting with the Industrial Revolution in 18th-Century Manchester, the manufacturing industry has typically undergone a revolution every hundred years. In an age of ever increasing technological advancement, though, times are changing at a faster pace, as we see the era of controller-based automati...

Read More

What is PCI DSS and why do I need it? WHAT IS PCI DSS AND WHY DO I NEED IT?

blog article

Jan 18, 2019

PCI DSS is an incredibly important compliance standard for those processing card payments. It stands for Payment Card Industry Data Security Standard. Whilst that doesn’t exactly roll off the tongue, it is a very resilient set of standard requirements that aims to make a business more secure. ...

Read More

The cyber threat against the Danish maritime sector THE CYBER THREAT AGAINST THE DANISH MARITIME SECTOR

whitepaper

Jan 18, 2019

Threat assessment: The cyber threat against the Danish maritime sector. This threat assessment outlines the cyber threats facing the Danish maritime sector. The Danish maritime sector is of vital importance to the functioning, stability, and economy of the Danish society. The purpose of this assessm...

Read More

Cyber War Games and the Role of the Purple Team CYBER WAR GAMES AND THE ROLE OF THE PURPLE TEAM

whitepaper

Jan 18, 2019

With the continuous emergence of new cybersecurity threats, organizations across all industries are striving to modernize their defenses and bolster cyber resiliency. One of the leading research firms Cybersecurity Ventures forecasts that cyber crime damage will cost the world $6 trillion annually b...

Read More

Improvements to SiteCheck Website Scanne IMPROVEMENTS TO SITECHECK WEBSITE SCANNE

blog article

Jan 18, 2019

SiteCheck is Sucuri’s free website malware and security scanner offered to anyone who wants to scan their websites for malware and blacklist status. Last year, we improved SiteCheck’s speed and reliability. Today, we are excited to share the latest upgrades that makes SiteCheck even bett...

Read More

Infoblox Applies Machine Learning to DNS for a Data Gold Mine INFOBLOX APPLIES MACHINE LEARNING TO DNS FOR A DATA GOLD MINE

video

Jan 18, 2019

Infoblox products use machine learning to give users visibility into network activity and IoT devices for better cybersecurity. Infoblox delivers appliance-based solutions for business-critical DNS, DHCP, and IP Address Management (DDI) and Network Automation. Over 7,700 global enterprises and servi...

Read More

43% of Enterprises Not Ready to Say Goodbye to Windows 7 43% OF ENTERPRISES NOT READY TO SAY GOODBYE TO WINDOWS 7

blog article

Jan 18, 2019

2020 will bring the end of Windows 7, following Microsoft’s announcement that it will no longer offer support and updates for the operating system starting January 14, 2020. But companies appear to have had a good run with it and are not yet ready to say goodbye, a Kollective survey of 1,000 U...

Read More

3 Ways App Development Companies Can Improve Cyber Security Processes 3 WAYS APP DEVELOPMENT COMPANIES CAN IMPROVE CYBER SECURITY PROCESSES

blog article

Jan 18, 2019

The modern world is addicted to the use of mobile devices. Virtually every activity or task handled electronically can be performed with a mobile device, including: shopping, banking, entertainment, and even controlling other devices in the workplace, shop, and home. No doubt, app development compan...

Read More

IPS Security: How Active Security Saves Time and Stops Attacks in their Tracks IPS SECURITY: HOW ACTIVE SECURITY SAVES TIME AND STOPS ATTACKS IN THEIR TRACKS

blog article

Jan 17, 2019

What is IPS Security? An intrusion prevention system (IPS) is a network security technology that monitors network traffic to detect anomalies in traffic flow. IPS security systems intercept network traffic and can quickly prevent malicious activity by dropping packets or resetting connections. IDS v...

Read More

A Deep Dive into Point of Sale Security A DEEP DIVE INTO POINT OF SALE SECURITY

blog article

Jan 17, 2019

Many businesses think of their Point of Sale (POS) systems as an extension of a cashier behind a sales desk. But with multiple risk factors to consider, such as network connectivity, open ports, internet access and communication with the most sensitive data a company handles, POS solutions are more ...

Read More

cyber security trends and expectations CYBER SECURITY TRENDS AND EXPECTATIONS

infographic

Jan 17, 2019

2018 was the year of large-scale data breaches as visualised in the Cyberseer Infographic: 2018 Breach Highlights. So, what can we expect to see in the cyber security space in the coming year? 2019 is guaranteed to be filled with new attack techniques. As you think about how to protect your organisa...

Read More

Nanocore RAT Malware – How to Remove this Virus from Infecting NANOCORE RAT MALWARE – HOW TO REMOVE THIS VIRUS FROM INFECTING

blog article

Jan 17, 2019

Nanocore is a remote access Trojan virus otherwise known as RAT Malware which is used in both targeted and non-targeted attacks. Ever since malware engineers created it, RATs have aided online criminals in launching attacks even on mobile devices for financial gain, espionage or for something more s...

Read More

5 Cyber Security Threats Facing Enterprises in 2019 5 CYBER SECURITY THREATS FACING ENTERPRISES IN 2019

blog article

Jan 17, 2019

The cyber threat atmosphere is becoming more perilous every day. A recent survey by the World Economic Forum revealed the number-one concern of executives in advanced economies is cyber-attacks. Here are the top 5 cyber security threats companies can anticipate to contend with in 2019. Phishing Sche...

Read More

TOP 3 BUSINESS CYBER SECURITY TRENDS TO WATCH FOR IN 2019 TOP 3 BUSINESS CYBER SECURITY TRENDS TO WATCH FOR IN 2019

blog article

Jan 17, 2019

Technology has integrated itself into just about every business. New innovations have created opportunities for businesses to operate faster and more efficiently than ever before. No matter the industry, businesses need to use technology to not only stay competitive, but also survive. Unfortunately,...

Read More

Too Much and Not Enough: Why Cybersecurity Is IT’s Top Challenge for 2019 TOO MUCH AND NOT ENOUGH: WHY CYBERSECURITY IS IT’S TOP CHALLENGE FOR 2019

blog article

Jan 17, 2019

One in four servers at the average enterprise is not fully up to date with the latest security and software patches, according to INAP’S new survey, The State of IT Infrastructure Management. And that’s not all: A majority of IT pros believe that the time it takes their team to address c...

Read More

Validating Your Microsoft Azure Cloud Security VALIDATING YOUR MICROSOFT AZURE CLOUD SECURITY

blog article

Jan 17, 2019

As organizations continue to adopt the cloud and manage a hybrid cloud environment, it’s important to recognize how securing your Microsoft Azure cloud environment is different than securing your data center, and then learning the steps you need to take to secure your infrastructure. To begin,...

Read More

BenefitMall Hit by Months-Long Data Breach BENEFITMALL HIT BY MONTHS-LONG DATA BREACH

blog article

Jan 17, 2019

The Dallas-based payroll firm BenefitMall announced on January 4 that nearly 112,000 customers may have had their personal information exposed during a four-month long data breach. The breach was discovered on October 11, when the company realized that several internal email accounts had been compro...

Read More

Effective Data Security When Recycling Corporate E-Waste EFFECTIVE DATA SECURITY WHEN RECYCLING CORPORATE E-WASTE

blog article

Jan 17, 2019

In today's progressively digital world, data security is just as important as its physical counterpart. Sensitive data stored in servers, laptops, and any other form of e-waste can be compromised any time there's an attack by a malicious entity. Sensitive data can be any of the following: Tr...

Read More

Avoiding Critical Security Risk Analysis Mistakes AVOIDING CRITICAL SECURITY RISK ANALYSIS MISTAKES

blog article

Jan 17, 2019

Healthcare organizations and their business associates must be careful to avoid making mistakes with their HIPAA security risk analysis in case they ever undergo a compliance review or breach investigation by federal regulators, says privacy attorney Adam Greene. “What I see a lot of – a...

Read More

The U.S. Government Blaming Cyber Attacks on Russia May Cost One Business $100 Million THE U.S. GOVERNMENT BLAMING CYBER ATTACKS ON RUSSIA MAY COST ONE BUSINESS $100 MILLION

blog article

Jan 17, 2019

Governments attributing cyberattacks to specific countries usually ends in nothing more than a line in a news story. But sometimes these kinds of claims can have unforeseen consequences. The $100 Million insurance coverage lawsuit between Mondelez, the owner of brands such as Oreos and Nabisco, and ...

Read More

Is it Dangerous to Rely Too Heavily on Predictive Analytics for Fighting Ransomware? IS IT DANGEROUS TO RELY TOO HEAVILY ON PREDICTIVE ANALYTICS FOR FIGHTING RANSOMWARE?

blog article

Jan 17, 2019

Ransomware is a rising threat to businesses all over the world. Between 2016 and 2017, the number of ransomware incidents increased by 350%. The FBI now estimates that there are 4,000 ransomware attacks every day. Digital security experts are desperately looking for new ways to thwart these attacks....

Read More

Cyber security Small Business Guide CYBER SECURITY SMALL BUSINESS GUIDE

infographic

Jan 17, 2019

A cyber security guide for small business owners. An informative infographic by the UK National Cyber Security Centre (NCSC) summarizes five simple but key steps for small business owners, to protect their organizations from cyber threat, and therefore save time, money and ensure business reputation...

Read More

CYBER INSURANCE PERHAPS ISN’T THE ANSWER CYBER INSURANCE PERHAPS ISN’T THE ANSWER

blog article

Jan 16, 2019

In June 2017, a ransomware cyber attack spread through Europe and the US affecting companies such as advertising giant WWP, law firm DLA Piper, Danish shipping and transport giant AP Moller Maersk and Mondelez, a multinational confectionery, food and beverage company. The attack, known as NotPetya, ...

Read More

Google security whitepaper GOOGLE SECURITY WHITEPAPER

whitepaper

Jan 16, 2019

Traditionally, organizations have looked to the public cloud for cost savings, or to augment private data center capacity. However, organizations are now primarily looking to the public cloud for security, realizing that providers can invest more in people and processes to deliver secure infrastruct...

Read More

Keep Your Eye on These 3 Key Cybersecurity Trends for 2019 KEEP YOUR EYE ON THESE 3 KEY CYBERSECURITY TRENDS FOR 2019

blog article

Jan 16, 2019

Effective security requires an organization to know where its data resides and how it’s being used, especially when that data is migrated to the cloud. When you lose sight of these factors, you lose control of security. A company I work with recently encountered a situation that highlights the...

Read More

How Akamai Augments Your Security Practice to Mitigate the OWASP Top 10 Risks HOW AKAMAI AUGMENTS YOUR SECURITY PRACTICE TO MITIGATE THE OWASP TOP 10 RISKS

whitepaper

Jan 16, 2019

The OWASP Top 10 provides a list of the most common types of vulnerabilities often seen in web applications. To call out a common misperception often perpetuated by security vendors, the OWASP Top 10 does not provide a checklist of attack vectors that can be simply blocked by a web application firew...

Read More

What would a cyber attack look like in the real world? WHAT WOULD A CYBER ATTACK LOOK LIKE IN THE REAL WORLD?

video

Jan 16, 2019

Hackers and their scams live behind keyboards. Invisible and faceless. If cyber crime happened in the physical world, this is how it would look. Stay one step ahead with Hiscox small business insurance.

Read More

The Advanced Persistent Threat files: APT10 THE ADVANCED PERSISTENT THREAT FILES: APT10

blog article

Jan 16, 2019

We’ve heard a lot about Advanced Persistent Threats (APTs) over the past few years. As a refresher, APTs are prolonged, aimed attacks on specific targets with the intention to compromise their systems and gain information from or about that target. While the targets may be anyone or anything&m...

Read More

The Acquired Breach: How to Spot Cyber Risk in Your Acquisition THE ACQUIRED BREACH: HOW TO SPOT CYBER RISK IN YOUR ACQUISITION

blog article

Jan 16, 2019

Your company just acquired another business and things are great. Your market cap is growing, shareholders are happy, and teams are working hard. Then, you get a call that makes your stomach turn. Your team has uncovered an ongoing breach in the company you just acquired. Your world changes immediat...

Read More

The 2019 State of Password and Authentication Security Behaviors Report THE 2019 STATE OF PASSWORD AND AUTHENTICATION SECURITY BEHAVIORS REPORT

whitepaper

Jan 16, 2019

There are a growing number of security breaches happening daily to both individuals and businesses. As a result, organizations and online services have shifted efforts in recent years to help educate employees and end users on proper password hygiene, two-factor authentication, signs of a phishing s...

Read More

NCSC Cross Domain Solutions Industry Pilot NCSC CROSS DOMAIN SOLUTIONS INDUSTRY PILOT

blog article

Jan 16, 2019

Will I ever be able to safely connect my IT system to other IT systems that I don't own, and probably don't trust? This key question is one that the NCSC is asked frequently. We know that there is a growing need and diversity of reasons for wanting to connect different computer networks toge...

Read More

Building a cyber security super team BUILDING A CYBER SECURITY SUPER TEAM

blog article

Jan 16, 2019

Tom Mullen, O2’s Head of cyber security, considers the global growth in cybercrime and the skills shortage that is affecting every business. The cybercrime epidemic. Cybercrime is big business. And it’s growing rapidly, becoming a threat to every organisation regardless of size, industry...

Read More

The Evolution of Cyber Security Protection THE EVOLUTION OF CYBER SECURITY PROTECTION

blog article

Jan 16, 2019

Both cybercriminals and the means to defend against them have evolved significantly in recent years. Looking back over the last thirty years of cybercrime reveals the scale of that change, and highlights the importance of strong online security for businesses of all shapes and sizes. While cybersecu...

Read More

Top 3 Cyberattacks Targeting Proxy Servers TOP 3 CYBERATTACKS TARGETING PROXY SERVERS

blog article

Jan 16, 2019

Today, many organizations are now realizing that DDoS defense is critical to maintaining an exceptional customer experience. Why? Because nothing diminishes load times or impacts the end user’s experience more than a cyberattack. As a facilitator of access to content and networks, proxy server...

Read More

Citrix CISO Stan Black: What it takes to win Cybersecurity Pro of the Year CITRIX CISO STAN BLACK: WHAT IT TAKES TO WIN CYBERSECURITY PRO OF THE YEAR

blog article

Jan 16, 2019

Stan Black’s organization at Citrix stops 56 billion unique attacks each quarter. As Chief Security and Information Officer, Stan has simplified IT and security at Citrix to focus on threat prevention and to ensure a better user experience. Keep reading to learn about his organization, what se...

Read More

INSIGHT: Cybersecurity Attacks, Prevention Call for Attorneys, Rapid Response Teams INSIGHT: CYBERSECURITY ATTACKS, PREVENTION CALL FOR ATTORNEYS, RAPID RESPONSE TEAMS

blog article

Jan 16, 2019

As an ever-increasing number of organizations of any size and in any industry can attest, cybersecurity incidents and breaches can leave significant organizational damage and business disruption in their wake. It is critical, therefore, to have experts in the relevant areas identified and standing b...

Read More

Modern Ransomware Goes After Data Backups MODERN RANSOMWARE GOES AFTER DATA BACKUPS

blog article

Jan 16, 2019

Ransomware is using a variety of methods to reduce or nullify the effectiveness of data backups, writes Maria Korolov at CSO. Restoring from a backup is one of the best strategies that organizations can use to recover from a ransomware attack, so it’s obvious why attackers would want to target...

Read More

Data Loss Prevention — Policies, Best Practices, and Evaluating DLP Software DATA LOSS PREVENTION — POLICIES, BEST PRACTICES, AND EVALUATING DLP SOFTWARE

blog article

Jan 15, 2019

What is DLP? Data loss prevention (DLP) is an approach that seeks to protect business information. It prevents end-users from moving key information outside the network. DLP also refers to tools that enable a network administrator to monitor data accessed and shared by end users. Trends Driving DLP ...

Read More

How to Protect Your Office 365 Email Users from Phishing HOW TO PROTECT YOUR OFFICE 365 EMAIL USERS FROM PHISHING

blog article

Jan 15, 2019

Phishing emails targeting Office 365 customers are the top source of security breaches, according to survey data. In cased you missed it, in 2018 phishing officially the top concern for IT and security managers who have deployed Office 365 at their companies, having eked past ransomware according to...

Read More

What We’ve Learned from the Evolving IT Landscape and Where Cybersecurity is Headed in 2019 WHAT WE’VE LEARNED FROM THE EVOLVING IT LANDSCAPE AND WHERE CYBERSECURITY IS HEADED IN 2019

blog article

Jan 15, 2019

The new year is always a good time for reflection. At Circadence, we look back on the dynamic IT landscape and ever-evolving threats to understand where CISOs and security leaders can direct their attention in 2019 and prioritize new security practices. To learn more, we tapped into our own cybersec...

Read More

Opinion: AL and ML choices can dramatically impact data security OPINION: AL AND ML CHOICES CAN DRAMATICALLY IMPACT DATA SECURITY

blog article

Jan 15, 2019

As networks have advanced in complexity, so have the tools and tactics of cybercriminals. Organizations increase their cybersecurity budgets and teams, yet breaches keep occurring. In the fight for stronger security, vendors are offering up AI and machine learning as a Holy Grail. But do these techn...

Read More

Understanding Zero-Day Attacks UNDERSTANDING ZERO-DAY ATTACKS

blog article

Jan 15, 2019

The Rise of Zero-Day Exploits and Attacks. Part of forming an effective cybersecurity strategy means understanding the threats that can impact your organization. One form of threat that is on the rise and steadily evolving in complexity and danger is a zero-day attack, also referred to as a zero-day...

Read More

Learning from the SingHealth cyberattack and strengthening our systems LEARNING FROM THE SINGHEALTH CYBERATTACK AND STRENGTHENING OUR SYSTEMS

video

Jan 15, 2019

Minister Iswaran addressed queries on the public attribution of the SingHealth cyberattack in Parliament on 15 January 2019. He spoke about how the findings and recommendations of the Committee of Inquiry were released in full to the public, save for sensitive information on patient confidentiality ...

Read More

Shifting to DevSecOps, with Software Security Testing Built In SHIFTING TO DEVSECOPS, WITH SOFTWARE SECURITY TESTING BUILT IN

blog article

Jan 15, 2019

Many organizations today are in the process of transitioning to a DevOps-centric approach, but don’t want to leave security behind. In order to build security in from the beginning of their software development process, it’s essential to enhance your security posture by integrating appli...

Read More

Fortinet Network Security Academy FORTINET NETWORK SECURITY ACADEMY

video

Jan 15, 2019

The Fortinet Network Security Academy (FNSA) provides industry-recognized Fortinet training and certification opportunities to students around the world. The academy collaborates with academic institutions, non-profit agencies, and veteran programs to provide a framework for students to become part ...

Read More

Establishing a council for the cyber security profession ESTABLISHING A COUNCIL FOR THE CYBER SECURITY PROFESSION

blog article

Jan 15, 2019

Back in July I talked about the work we had been doing with colleagues in DCMS to bring greater cohesion to the cyber security profession in the UK.  There was an excellent response to the consultation (which you can read here), which reinforced the direction of travel to establish a Cyber Secu...

Read More

Jennifer Kady Reviews IBM Security Line-Up at HIMSS 2019 JENNIFER KADY REVIEWS IBM SECURITY LINE-UP AT HIMSS 2019

video

Jan 15, 2019

In this video, Jennifer Kady, Director of IBM Security Solutions, spotlights seven key IBM Security speaking sessions at HIMSS19. Our sessions at the event will show you how to: protect the Internet of Medical Things, garner best practices from a cyber-range experience and bolster unified endpoint p...

Read More

Minister Gan encourages IHiS to press on, recover and rebuild MINISTER GAN ENCOURAGES IHIS TO PRESS ON, RECOVER AND REBUILD

video

Jan 15, 2019

Minister for Health Gan Kim Yong spoke on the support for IHiS (Integrated Health Information System) and their staff as they learn from the cyberattack. He shared that the public healthcare family was in full support of IHiS as they recover, rebuild, and implement the Committee of Inquiry's rec...

Read More

Building up cybersecurity defences in public healthcare BUILDING UP CYBERSECURITY DEFENCES IN PUBLIC HEALTHCARE

video

Jan 15, 2019

Minister for Health Gan Kim Yong shared how public healthcare agencies will learn from the SingHealth data breach and prioritise cybersecurity initiatives. The Ministry of Health, IHiS, as well as the healthcare clusters will report their progress on these initiatives to a Healthcare IT Steering Com...

Read More

Findings of our survey show that cyber awareness training is badly needed for organizations FINDINGS OF OUR SURVEY SHOW THAT CYBER AWARENESS TRAINING IS BADLY NEEDED FOR ORGANIZATIONS

blog article

Jan 15, 2019

Employees are the weakest link in your security chain. Studies have found that over 90% of all cyber breaches happen because of human error. Even with the best of intentions, sometimes their actions can lead to major cybersecurity faux pas. But, how much of it is because of poor behavior or bad deci...

Read More

Does Malware Have Citizenship? DOES MALWARE HAVE CITIZENSHIP?

blog article

Jan 14, 2019

In talks with information security professionals at security conferences, user group events, and customer sites, Chester Wisniewski frequently fields questions about country-based blocking as a network defense tactic. Though he couldn’t find any published data to confirm his assumptions, &ldqu...

Read More

SEC Chairman Jay Clayton Discusses Cybersecurity SEC CHAIRMAN JAY CLAYTON DISCUSSES CYBERSECURITY

video

Jan 14, 2019

On December 6 at the Harmonie Club in New York, Jay Clayton, chairman of the Securities and Exchange Commission, delivered the keynote speech of a SIPA-hosted panel discussion among financial-sector leaders and influencers.

Read More

Cyber Threats In The Banking Industry CYBER THREATS IN THE BANKING INDUSTRY

blog article

Jan 14, 2019

Cybersecurity breaches continue to grow in both frequency and sophistication for all industries, and the financial sector is particularly vulnerable. In mid-2018, ITSP Magazine reported that financial services firms fall victim to cybersecurity attacks 300 times more frequently than businesses in ot...

Read More

Fighting the Evolution of Malware FIGHTING THE EVOLUTION OF MALWARE

blog article

Jan 14, 2019

Malware is becoming increasingly destructive. Below is a short history of this trend, along with steps organizations can take to combat it. We begin with Mirai that, in the summer of 2016, was responsible for the largest DDoS attack in history. It was built using millions of vulnerable IoT devices a...

Read More

Government shutdown impacts .gov websites, puts Americans in danger GOVERNMENT SHUTDOWN IMPACTS .GOV WEBSITES, PUTS AMERICANS IN DANGER

blog article

Jan 14, 2019

If you are in the United States, then you likely already know that we are on our 24th day of a government shutdown. While it is considered a “partial” shutdown, there are still plenty of government workers who are furloughed, which impacts the services they run—both online and off....

Read More

SAS® Software Security Framework: Engineering Secure Products SAS® SOFTWARE SECURITY FRAMEWORK: ENGINEERING SECURE PRODUCTS

whitepaper

Jan 13, 2019

SAS builds quality software that is secure and privacy-preserving. Our products are built to be resistant to misuse and known cybersecurity threats. SAS guides its architects and developers based on our software security framework (see Figure 1). At the highest level of the framework, we have define...

Read More

AI Seen as Taking Increasingly Lead Role in Fight against Cyber Threats AI SEEN AS TAKING INCREASINGLY LEAD ROLE IN FIGHT AGAINST CYBER THREATS

blog article

Jan 13, 2019

The business world has been slow to incorporate AI as a security measure but that’s going to change in 2019. More than 25 years ago, the worldwide web was likened to the wild west – a virtual frontier lined with black hats gunning to spread viruses that latched onto computers, erase thei...

Read More

CyberFirst Girls Competition 2019 - a chance to shine CYBERFIRST GIRLS COMPETITION 2019 - A CHANCE TO SHINE

blog article

Jan 11, 2019

In 2017, when we developed the idea of holding a competition to encourage more young girls to study GCSE computer science, I don’t think we appreciated the huge interest that it would generate and the fantastic talent that it would uncover. In hindsight, we shouldn’t have been surprised ...

Read More

The Human Factor of Cyber Security THE HUMAN FACTOR OF CYBER SECURITY

blog article

Jan 11, 2019

Tom Mullen, O2’s Head of Cyber Security, considers the human aspect of cyber security. We read about cyber-attacks disrupting businesses on an almost daily basis. And they are becoming more sophisticated. Today, cyber security breaches can often be attributed to the domain of organised crime, ...

Read More

F-Secure Cyber Security Services captures security award F-SECURE CYBER SECURITY SERVICES CAPTURES SECURITY AWARD

blog article

Jan 11, 2019

The Finnish cyber security company was deemed to be best in class by the Finnish Security Awards in the Future Category from among three finalists. Also in this category were the Ministry of Employment and the Economy AI technology and The Technical Research Center of Finland’s (VTT) vehicle t...

Read More

What does a Cyber Security Analyst do? WHAT DOES A CYBER SECURITY ANALYST DO?

video

Jan 11, 2019

The front line of a cyber attack is behind a screen not on the street; you can’t see when or where it’s coming from. It’s Inmarsat Cyber Security Analyst James Weston’s job to protect our networks, services and customers from the increasingly sophisticated nature of cyber att...

Read More

Security at Slack SECURITY AT SLACK

whitepaper

Jan 11, 2019

Slack’s mission is to make people’s working lives simpler, more pleasant, and more productive. We believe that we need to make your data secure, and that protecting it is one of our most important responsibilities. We’re committed to being transparent about our security practices a...

Read More

What’s the Answer to the Vulnerability Overload Problem? Key Findings from ESG’s Cyber Risk Management Survey WHAT’S THE ANSWER TO THE VULNERABILITY OVERLOAD PROBLEM? KEY FINDINGS FROM ESG’S CYBER RISK MANAGEMENT SURVEY

whitepaper

Jan 11, 2019

Cyber risk management is demanding work. Vulnerabilities are growing, threat actors are smarter and pressure from the executive team is intensifying. What used to be a side IT conversation is now a top business priority. You finally have the full attention of the C-suite and board – but, do yo...

Read More

5 CYBERSECURITY TRENDS FOR 2019 5 CYBERSECURITY TRENDS FOR 2019

blog article

Jan 11, 2019

As we kick off 2019, we are excited to bring you our 3rd Annual “STEALTHbits’ Experts Predictions”. This has been such a crowd pleaser that we just had to keep it going! Like the last few years, we made our way around the office with left over holiday cookie bribes to get the voice...

Read More

The Evolution of Malware Identification THE EVOLUTION OF MALWARE IDENTIFICATION

blog article

Jan 11, 2019

Code is what allows website owners to customize their websites and make it unique. However, sometimes malware can sneak into that code, resulting in a potentially harmful impact to unsuspecting users. Using today’s techniques, how would you distinguish which code is good and which code is bad?...

Read More

DOING YOUR PART FOR A SAFER INTERNET DOING YOUR PART FOR A SAFER INTERNET

blog article

Jan 10, 2019

February 5th is Safer Internet Day, an international effort aimed at making our world wide web safer for every kind of user. This year’s theme, “Together for a better internet”, focuses on creating a better internet for all users. Whether it’s children playing a game or doing...

Read More

AI IN CYBERSECURITY: THE IDC AI INNOVATORS REPORT AND WHAT IT MEANS FOR SECURITY PRACTITIONERS AI IN CYBERSECURITY: THE IDC AI INNOVATORS REPORT AND WHAT IT MEANS FOR SECURITY PRACTITIONERS

blog article

Jan 10, 2019

Back in 2017, Cybereason CSO Sam Curry and CTO Yonatan Striem-Amit spoke to a crowded room at the RSA Conference about the hype and hope of AI and Machine Learning. Fast forward a year later, where Cybereason was recently named an IDC Innovator in the IDC Innovators: AI Intelligence-Infused Security...

Read More

Security Leadership Series: Take a Partnership Approach to Cybersecurity SECURITY LEADERSHIP SERIES: TAKE A PARTNERSHIP APPROACH TO CYBERSECURITY

blog article

Jan 10, 2019

Unfortunately, some cybersecurity professionals approach their work with an “us against the world” mentality. They’re constantly frustrated because others within their organization don’t seem to understand why cybersecurity is important. They feel like they are always having ...

Read More

6 Standout Device Control Features in Endpoint Protector 6 STANDOUT DEVICE CONTROL FEATURES IN ENDPOINT PROTECTOR

blog article

Jan 10, 2019

With the rise of Bring-Your-Own-Device (BYOD) policies and the proliferation of personal devices, organizations often risk losing data due to employee negligence or malicious intentions. After all, no matter how secure a company network is, the moment an employee transfers sensitive information onto...

Read More

10 QUICK TIPS TO SECURE YOUR IOT ENVIRONMENT 10 QUICK TIPS TO SECURE YOUR IOT ENVIRONMENT

infographic

Jan 10, 2019

Robust Authentication. Authentication that is robust and effective is Security 101 for the IoT. Make sure that you change default passwords and manage hard-coded passwords appropriately across your IoT network. Encryption and PKI. Encryption is a fundamental method to protect data at rest and in tra...

Read More

The Phishing Decision Tree THE PHISHING DECISION TREE

infographic

Jan 10, 2019

If you're looking for a Security Awareness infographic that employees might actually look at, we've found one for you. Security Awareness company Wombat (which was acquired last year by Proofpoint) came up with the most clever and comprehensive security awareness infographic we've seen.

Read More

Cyber immunity for energy infrastructures CYBER IMMUNITY FOR ENERGY INFRASTRUCTURES

whitepaper

Jan 10, 2019

Energy infrastructures are at serious risk As investments in the renewable energy industry rose rapidly in the last decade, utilities have become a popular target for cyber criminals. In fact, thanks to digitalization and increased interconnectivity, the huge amount of data coming from wind turbines...

Read More

OpSec: A Vital Part of Any Cybersecurity Program OPSEC: A VITAL PART OF ANY CYBERSECURITY PROGRAM

blog article

Jan 10, 2019

We all have something to hide. Even though humans are social beings, there are some things we want to keep to ourselves, and it’s been like that since the beginning of humankind. In the digital world, the format in which those secrets are kept is what we keep in focus, in contrast to the &rsqu...

Read More

VMware Edge and IoT Solutions VMWARE EDGE AND IOT SOLUTIONS

video

Jan 10, 2019

We’ve broadened our internet of things (IoT) and edge computing strategy with a new product portfolio called VMware Edge. The portfolio includes solutions that allow you to take control of the Edge with a simplified, secure, scalable digital foundation built on proven and trusted VMware techno...

Read More

DEPLOYING PERVASIVE SECURITY WITH AWS TRANSIT GATEWAY AND FORTINET CLOUD SERVICES HUB DEPLOYING PERVASIVE SECURITY WITH AWS TRANSIT GATEWAY AND FORTINET CLOUD SERVICES HUB

whitepaper

Jan 10, 2019

Most AWS deployments have evolved from a single virtual private cloud (VPC) to multiple VPCs spread across several regions. The Fortinet Transit VPC solution supports organizations that have storage and compute infrastructures spread across on-premises data centers and Amazon Web Services (AWS) VPCs...

Read More

Cyber Insurance Premiums | Echoworx Talking Security Ep. 2 CYBER INSURANCE PREMIUMS | ECHOWORX TALKING SECURITY EP. 2

video

Jan 10, 2019

Cyber insurance is beginning to become the norm for most business working in highly-regulated industries. But with underwriters still sketching out what exactly cyber insurance is and how premiums are calculated – is it better to invest in proactive cybersecurity measures, like encryption, or ...

Read More

A Nasty Trick: From Credential Theft Malware to Business Disruption A NASTY TRICK: FROM CREDENTIAL THEFT MALWARE TO BUSINESS DISRUPTION

blog article

Jan 10, 2019

FireEye is tracking a set of financially-motivated activity referred to as TEMP.MixMaster that involves the interactive deployment of Ryuk ransomware following TrickBot malware infections. These operations have been active since at least December 2017, with a notable uptick in the latter half of 201...

Read More

GoodData Corporation Security Whitepaper 2019 GOODDATA CORPORATION SECURITY WHITEPAPER 2019

whitepaper

Jan 09, 2019

This whitepaper is organized into three sections, starting with the executive overview. After the overview, the section titled “GoodData platform security” explains the security measures applied to the GoodData platform and provides guidance for GoodData customers on the security concept...

Read More

Revisiting the 2018 Threat Forecast REVISITING THE 2018 THREAT FORECAST

blog article

Jan 09, 2019

In the 2017 Annual Threat Report, the eSentire Threat Intelligence team documented a series of scenarios that could potentially occur though 2018. The likelihood of each forecast scenario increased or decreased according specific indicator events occurring. The 2017 report also contained a trend ana...

Read More

Ransomware displaced by cryptojacking as the most trending cyberthreat but it is not dead yet RANSOMWARE DISPLACED BY CRYPTOJACKING AS THE MOST TRENDING CYBERTHREAT BUT IT IS NOT DEAD YET

blog article

Jan 09, 2019

For those of you who have experienced the worst of Ransomware attacks in the form of WannaCry and Petya and believe that the worst is over; you never know what may await you on the other side of this New Year. While the recent threat analysis reports by Quick Heal Security, Labs suggest a significan...

Read More

Hysolate Revolutionizes Privileged Access Workstations HYSOLATE REVOLUTIONIZES PRIVILEGED ACCESS WORKSTATIONS

whitepaper

Jan 09, 2019

Privileged Access Workstations (PAWs) are challenging to implement. Hysolate delivers a brand new approach to PAW implementation that is secure-by-design, boosts admin productivity, and enables IT flexibility. THE CHALLENGE. Cyber attackers most commonly seek out one person in an organization: IT ad...

Read More

Kaspersky Threat Intelligence KASPERSKY THREAT INTELLIGENCE

whitepaper

Jan 09, 2019

Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats is a massive undertaking. Enterprises across all sectors are facing a shortage of the up-to-the-minute, relevant data they need to help them manage the risks associated with IT security threats. Threat Intellige...

Read More

Good password security: the perfect New Year’s resolution for your business and employees GOOD PASSWORD SECURITY: THE PERFECT NEW YEAR’S RESOLUTION FOR YOUR BUSINESS AND EMPLOYEES

blog article

Jan 09, 2019

The New Year’s resolutions we stick to have a few things in common: they’re realistic, focused, and have clear benefits. That’s why improving company-wide password habits is a great resolution for 2019. According to the most recent data from Verizon, over 70% of employees reuse pas...

Read More

Cyber Security Marketing Tactics That Actually Work CYBER SECURITY MARKETING TACTICS THAT ACTUALLY WORK

blog article

Jan 09, 2019

Whether you want to attribute it to the rise of interconnected devices in the IoT revolution or just the growing instances of cybercrime, the cyber security industry has seen immense growth in recent years and shows no signs of stopping. In fact, according to a Cybersecurity Market Report published ...

Read More

Achieve Data Security with Strong Internal and External Perimeters ACHIEVE DATA SECURITY WITH STRONG INTERNAL AND EXTERNAL PERIMETERS

blog article

Jan 09, 2019

Securing your organization’s most sensitive content is analogous to securing a busy office building. If you’re in charge of security in an office building, you must protect your tenants amid a constant flux of employees and visitors. You must keep the building, its employees, and their p...

Read More

Opinion How to drive home the Importance of data security with company stakeholders OPINION HOW TO DRIVE HOME THE IMPORTANCE OF DATA SECURITY WITH COMPANY STAKEHOLDERS

blog article

Jan 09, 2019

For the modern business, there are few topics more important than data security. Without a proper appreciation for data security and all that it entails, you’ll find your business falling behind. But getting all of your employees and company stakeholders on board can prove to be a major challe...

Read More

What is Hybris Computer Worm? WHAT IS HYBRIS COMPUTER WORM?

blog article

Jan 09, 2019

Hybris Worm is a type of malware (computer worm) that multiplies by automatically replicating itsef. This type of computer worm has the capability to multiply not just within an infected system but also expanding to other systems that are connected to the same network. The mode of infection within t...

Read More

New Year, New Threats: 4 Cybersecurity Predictions For 2019 NEW YEAR, NEW THREATS: 4 CYBERSECURITY PREDICTIONS FOR 2019

blog article

Jan 09, 2019

The new year has always been an important marker for cybersecurity professionals – just think back to Y2K and the widespread concern that every piece of technology might stop working at midnight on January 1, 2000. After a tough 2018, marked by extensive spam communication via both email and t...

Read More

How To Guide: Meeting Today HOW TO GUIDE: MEETING TODAY'S CRITICAL COMPLIANCE AND SECURITY REQUIREMENTS WITH DOCUSIGN

whitepaper

Jan 09, 2019

Learn how DocuSign is your trusted source for meeting today’s rigorous security and compliance requirements and can help you: Comply with global security standards Meet industry specific regulations Improve security Follow existing corporate standards and procedures Provide visibility into all tran...

Read More

Operation Aurora – 2010’s Major Breach by Chinese Hackers OPERATION AURORA – 2010’S MAJOR BREACH BY CHINESE HACKERS

blog article

Jan 08, 2019

As security practitioners and history buffs, we’re intrigued by the history of cybersecurity. So much so, we built a calendar around it this year. Each month of the History of Cybersecurity 2019 Calendar features a significant date in cybersecurity history, along with a related trivia question...

Read More

Privileged Access Management Compliance Through the Eyes of an Auditor PRIVILEGED ACCESS MANAGEMENT COMPLIANCE THROUGH THE EYES OF AN AUDITOR

blog article

Jan 08, 2019

Compliance audits are a stressful, time-consuming effort for many companies. In the Lockdown blog, we often talk about the tools and processes customers use to prepare for both internal and external information security audits. This time we thought we’d turn the tables and speak directly to an...

Read More

Measuring Cybersecurity Success MEASURING CYBERSECURITY SUCCESS

blog article

Jan 08, 2019

Many CISOs struggle to build a compelling business narrative around their cybersecurity efforts. So when they stand before C-execs or board members, they turn to quantitative measures to craft a basic blocking-and-tackling story (check out how many suspicious connections our firewalls blocked last q...

Read More

Ryuk ransomware attacks businesses over the holidays RYUK RANSOMWARE ATTACKS BUSINESSES OVER THE HOLIDAYS

blog article

Jan 08, 2019

While families gathered for food and merriment on Christmas Eve, most businesses slumbered. Nothing was stirring, not even a mouse—or so they thought. For those at Tribune Publishing and Data Resolution, however, a silent attack was slowly spreading through their networks, encrypting data and ...

Read More

Scheduled Network Maintenance: How Does It Affect Your Customer’s Business SCHEDULED NETWORK MAINTENANCE: HOW DOES IT AFFECT YOUR CUSTOMER’S BUSINESS

blog article

Jan 08, 2019

As a managed services provider (MSP) it is your responsibility to manage and maintain not only the endpoints on your clients’ networks but also the networks themselves. This may not be terribly important for very small businesses, especially if they are just starting out. However, as your clie...

Read More

Tips on Cybersecurity Vendor Risk Management for the Board of Directors TIPS ON CYBERSECURITY VENDOR RISK MANAGEMENT FOR THE BOARD OF DIRECTORS

blog article

Jan 08, 2019

Think about your vendors. Each one presents a unique risk to you. Whether it’s a risk to information security or the availability of your company’s product or service, all vendor services come with a specific level of risk. In the current technological environment, vendors are not only h...

Read More

2019 Global Health Care Outlook 2019 GLOBAL HEALTH CARE OUTLOOK

infographic

Jan 08, 2019

Global health care spending continues to increase dramatically. is projected to reach $10.059 trillion by 2022. Factors impacting health care costs. life expectancy continues to climb—number of people aged over 65 globally is more than 668 million, or 11.6%, of the total global population. win...

Read More

SAP Security Notes January ‘19: First Critical Note for SAP Cloud Connector and Mobile Patching SAP SECURITY NOTES JANUARY ‘19: FIRST CRITICAL NOTE FOR SAP CLOUD CONNECTOR AND MOBILE PATCHING

blog article

Jan 08, 2019

Today is the first SAP Security Patch Day for 2019 and 18 security notes were released, including one that was published during the month after the last Patch Day. This month, several platforms that are not usually part of the Patch Day have Security Notes published, including SAP Cloud Connector an...

Read More

Securing finance: Cybersecurity SECURING FINANCE: CYBERSECURITY

video

Jan 08, 2019

Cyber security is a significant risk for many organisations; one that needs to be managed appropriately. Having the right policies and procedures in place is essential in this connected world.  While organisations differ according to the work that they do, this page provides some practical guid...

Read More

IoT Cybersecurity Challenges and Solutions IOT CYBERSECURITY CHALLENGES AND SOLUTIONS

blog article

Jan 08, 2019

The Internet of Things (IoT) is simply an interconnected array of electronic devices that are linked by the Internet, through which they can transmit and receive data. The original “thing” was a Coca Cola vending machine that was able to report back to HQ how many bottles of soda were le...

Read More

Considering Cyber Insurance in the Aftermath of the NotPetya Attack CONSIDERING CYBER INSURANCE IN THE AFTERMATH OF THE NOTPETYA ATTACK

blog article

Jan 07, 2019

It’s been 18 months since June 2017 when the Petya/NotPetya cyber attacks fell on businesses around the globe, resulting in a dramatic loss of income and intense business disruption. Has cyber insurance limited the fallout for the victims of the ransomware attacks, and should proactive busines...

Read More

MICROSOFT EXCHANGE SERVER VULNERABLE TO EXPLOIT FROM A SIMPLE EMAIL MICROSOFT EXCHANGE SERVER VULNERABLE TO EXPLOIT FROM A SIMPLE EMAIL

blog article

Jan 07, 2019

The remote code execution vulnerabilities (CVE-2019-0547 and CVE-2019-0586), according to Microsoft, exist in Microsoft Exchange software when the software fails to properly handle objects in memory. They can be exploited by merely sending an email to a vulnerable server. An attacker who successfull...

Read More

Here are some predictions for the new year HERE ARE SOME PREDICTIONS FOR THE NEW YEAR

blog article

Jan 07, 2019

Happy New Year! As we finish singing “Auld Lang Syne” with a champagne toast to close out 2018, it is time to look to 2019 with excitement. But, before you make a few New Year’s resolutions, it would be best if you took a step back to analyze a few predictions and trends that may i...

Read More

New Year – Mastering Privacy and Data Security in 2019 NEW YEAR – MASTERING PRIVACY AND DATA SECURITY IN 2019

blog article

Jan 07, 2019

Privacy Compliance & Data Security - A Fox Rothschild Blog. 2019 presents businesses with new cybersecurity and privacy challenges: rapid advances in technology, sophisticated new cyberattacks and stricter privacy regulations here and around the world, just to name a few. Businesses that fail to...

Read More

Introducing the Defender INTRODUCING THE DEFENDER'S DIGEST

blog article

Jan 07, 2019

With cyberattackers actively targeting SAP and Oracle ERP systems and more organizations experiencing breaches, the ERP cybersecurity industry is constantly changing. Staying up to date with best practices can be a struggle. Onapsis would like to introduce the Defender’s Digest, a new monthly ...

Read More

The Difference Between Data Privacy and Data Security THE DIFFERENCE BETWEEN DATA PRIVACY AND DATA SECURITY

blog article

Jan 07, 2019

Repeat after me, data security is not privacy. Privacy is also not data security. These two terms are often used interchangeably, but there are distinct differences as well as similarities. Yes, data security and privacy have a common goal to protect sensitive data. But they have very different appr...

Read More

Assystem expertise in cybersecurity ASSYSTEM EXPERTISE IN CYBERSECURITY

video

Jan 07, 2019

This video explains all the parameters to take into account to be prepared for any cyberattack. Assystem offers a great expertise in cybersecurity and propose to its customers the best solution according to their systems, the nature of the risks and the economical background.

Read More

This Era Strongly Demands for Advanced Security Solutions – Let’s See Why THIS ERA STRONGLY DEMANDS FOR ADVANCED SECURITY SOLUTIONS – LET’S SEE WHY

blog article

Jan 07, 2019

In today era of 2019, companies are turning towards advanced security solutions because of the surging in data breaches. Lots of updation and intelligence systems are required in monitoring products for malware protection and to perform auto defensive actions. This post is going to aware readers tha...

Read More

VPN vs Antivirus: Which is a Bigger Cyber Security Market and Which Does Your Company Need? VPN VS ANTIVIRUS: WHICH IS A BIGGER CYBER SECURITY MARKET AND WHICH DOES YOUR COMPANY NEED?

blog article

Jan 07, 2019

With cyber security being the rage these days, choosing out of the many programs that are popping up with the promise of offering optimal protection becomes a dilemma. Even more, the choice between picking out a recommended antivirus and sticking with the more traditional way of protecting your comp...

Read More

3 Top Cybersecurity Stocks to Buy in 2019 3 TOP CYBERSECURITY STOCKS TO BUY IN 2019

blog article

Jan 07, 2019

Okta (NASDAQ:OKTA) is the leading provider of enterprise identity-management services. More than 5,600 businesses rely on Okta to manage and secure the digital access rights to their network. Think passwords, login processes, and employee on- and off-boarding procedures. Okta makes all this simpler ...

Read More

How To Pick A Data Backup Method For Your Enterprise HOW TO PICK A DATA BACKUP METHOD FOR YOUR ENTERPRISE

blog article

Jan 07, 2019

The digital age is all about data security and privacy, but that doesn’t mean businesses and private individuals have much of a clue when it comes to properly back up their information. Despite the fact that finding the right data backup method isn’t always a breeze, it doesn’t hav...

Read More

How to Improve Blockchain Security HOW TO IMPROVE BLOCKCHAIN SECURITY

blog article

Jan 07, 2019

In 2014, Mt. Gox, one of the largest cryptocurrency exchanges (managing approximately 70% of all transactions in Bitcoin) had been the victim of successful hacking attempts for a period of three years, and Mt. Gox’s customers lost 750,000 Bitcoins. Bitcoin lost over a third of its value when t...

Read More

WEST VIRGINIA CYBERSECURITY Workforce Strategic Initiative Report WEST VIRGINIA CYBERSECURITY WORKFORCE STRATEGIC INITIATIVE REPORT

whitepaper

Jan 05, 2019

TechConnect West Virginia has been the driving force behind the West Virginia Cybersecurity Workforce Strategic Initiative. TCWV is a non-profit coalition committed to the advancement of the innovation economy in West Virginia, focused on four technology sectors: advanced energy, chemicals and advan...

Read More

NEXT GENERATION OF SMART HOME NEXT GENERATION OF SMART HOME

whitepaper

Jan 04, 2019

In the 2011 report, Cisco claimed that IoT is about to change ourselves and everything that we know to be true6. This was a clear indication of a hype that typically surrounds introduction of a new technology. Today the forecasts and discussions on IoT seem to be more conservative. For instance, in ...

Read More

Cloud cyber security required by 70% of firms CLOUD CYBER SECURITY REQUIRED BY 70% OF FIRMS

blog article

Jan 04, 2019

Cloud computing has transformed the way small to medium sized (SME) companies purchase and use IT services in the last five years. It is estimated that 70% of all firms in the US and Europe use at least one business-critical cloud application. The cloud delivers simplified IT management, remote acce...

Read More

THE UK THE UK'S BIGGEST DATA BREACH FINES 2018

infographic

Jan 04, 2019

The ICO (Information Commissioner's Office) issued the most - and largest - fines ever in 2018, including: 11 fines totaling £1,290,000 to organisations for serious security failures. + 11 fines totaling. £138,000 to UK charities for unlawfully processing personal data in the 12 mont...

Read More

Legal Industry Cyber Threats LEGAL INDUSTRY CYBER THREATS

infographic

Jan 04, 2019

WHAT ATTACKERS WANT. Corporate intelligence, confidential data, medical records, intellectual property, M&A intelligence, reputation damage. ATTACK TYPES. Ransomware, malware, phishing/spear-phishing, hacktivism. MAJOR ATTACKS. The Panama Papers, DLA Piper, Appleby, Cravath, Swaine & Moore, ...

Read More

 Psychology of Workplace Collaboration PSYCHOLOGY OF WORKPLACE COLLABORATION

whitepaper

Jan 04, 2019

In today's ever-changing workplace, companies are challenged to keep up with mobile employees and constant connectivity. Does your team have what it needs to stay innovative and inspired? This eBook addresses how organisational psychology can help you understand what your teams need.

Read More

 Trendwatch: The 5 Essentials of Unified Communications TRENDWATCH: THE 5 ESSENTIALS OF UNIFIED COMMUNICATIONS

whitepaper

Jan 04, 2019

Companies can build a strong foundation of communication by making it easier for individuals to access the information they need, and for teams to connect more easily. Technology plays a critical role in this process because diverse teams work across multiple locations, use a range of devices and ha...

Read More

 Crash Course in Upgrading to Windows 10 CRASH COURSE IN UPGRADING TO WINDOWS 10

whitepaper

Jan 04, 2019

You’ve made the right decision to upgrade your business to Windows 10. We know that company-wide deployments are never easy, which is why we’ve put together this to help you take the next step. Download the “Crash Course in Upgrading to Windows 10” eBook to find out how to streamline the process. Di...

Read More

 6 Steps to a Holistic Security Strategy 6 STEPS TO A HOLISTIC SECURITY STRATEGY

whitepaper

Jan 04, 2019

Did you know that the average company has 75 different security products? It's no surprise; modern security needs are multifaceted and many enterprise organizations are operating so quickly that they don’t have the time to put together comprehensive security strategies. But to be successful, organiz...

Read More

 Zes Stappen voor een Holistische Beveiligingsstrategie ZES STAPPEN VOOR EEN HOLISTISCHE BEVEILIGINGSSTRATEGIE

whitepaper

Jan 04, 2019

Wist je dat een gemiddelde organisatie 75 verschillende beveiligingsproducten heeft? Het is geen verrassing, moderne beveiligingsbehoeften zijn veelzijdig en veel bedrijfsorganisaties werken zo snel dat ze geen tijd hebben om uitgebreide beveiligingsstrategieën op te zetten. Maar om succesvol te zij...

Read More

What’s the Difference Between a High Interaction Honeypot and a Low Interaction Honeypot? WHAT’S THE DIFFERENCE BETWEEN A HIGH INTERACTION HONEYPOT AND A LOW INTERACTION HONEYPOT?

blog article

Jan 03, 2019

A honeypot is a decoy system that is intentionally insecure, used to detect and alert on an attacker’s malicious activity. A smart honeypot solution can divert hackers from your real data center, and also allow you to learn about their behavior in greater detail, without any disruption to your...

Read More

LOLBINS AND TROJANS: HOW THE RAMNIT TROJAN SPREADS VIA SLOAD IN A CYBERATTACK LOLBINS AND TROJANS: HOW THE RAMNIT TROJAN SPREADS VIA SLOAD IN A CYBERATTACK

blog article

Jan 03, 2019

Cybereason’s Nocturnus and Active Hunting Service are two teams dedicated to easily detect threats on demand and proactively seek out malicious activity. The Ramnit Trojan research is a result of the Cybereason platform's capabilities presenting themselves during a threat hunting demonstra...

Read More

Software Security Predictions: What to Watch for in 2019 SOFTWARE SECURITY PREDICTIONS: WHAT TO WATCH FOR IN 2019

blog article

Jan 03, 2019

Security breaches regularly made headlines in 2018, while advancements in DevOps, application security testing tools, artificial intelligence, machine learning, cloud adoption, and the Internet of Things raced forward. 2019 promises to be another busy year in technology and digital transformation, b...

Read More

5 BUSINESS SECURITY QUESTIONS ASKED AND ANSWERED 5 BUSINESS SECURITY QUESTIONS ASKED AND ANSWERED

blog article

Jan 03, 2019

Operating a business security system can be challenging, especially for new users. As a business owner, you don’t have a lot of extra time to troubleshoot your system. To prevent your security solution from taking away from valuable business operations, we’ve answered five fundamental qu...

Read More

A Security Analysis of Radio Remote Controllers for Industrial Applications A SECURITY ANALYSIS OF RADIO REMOTE CONTROLLERS FOR INDUSTRIAL APPLICATIONS

whitepaper

Jan 03, 2019

TREND MICRO LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all situations and may not reflect the most curr...

Read More

The Surprising Role Of AI In Cybercrime THE SURPRISING ROLE OF AI IN CYBERCRIME

blog article

Jan 03, 2019

Artificial Intelligence (AI), or machine learning, is changing the technological landscape. As computers “learn” and make smarter “decisions”, response times become faster and efficiency and productivity increase. In the world of cybersecurity, AI is playing a more active rol...

Read More

Making – And Keeping – Your Cybersecurity Resolution MAKING – AND KEEPING – YOUR CYBERSECURITY RESOLUTION

blog article

Jan 03, 2019

We all know the drill by now: the beginning of the year is a fresh start, and the perfect time to set a goal. 40% of Americans make a New Year’s resolution each year, and whether that’s sticking to a budget, finding a new hobby, or getting more exercise, they don’t waste a minute m...

Read More

A Passage to Penetration Testing A PASSAGE TO PENETRATION TESTING

whitepaper

Jan 03, 2019

What Is Penetration Testing? A penetration test or ‘pen test’ is the process of evaluating the security infrastructure within a controlled environment to safely attack, identify, penetrate and exploit vulnerabilities. These vulnerabilities may exist in network, applications, database, pr...

Read More

Hackers Hijack Chromecast Devices and Smart TVs via Exposed UPnP HACKERS HIJACK CHROMECAST DEVICES AND SMART TVS VIA EXPOSED UPNP

blog article

Jan 03, 2019

A pair of hackers has launched a campaign that displays rogue messages on people’s smart TVs encouraging them to subscribe to a popular YouTube channel. The attack doesn’t seem to be malicious and is part of a larger campaign to promote PewDiePie, the YouTube channel with the largest num...

Read More

Click2Gov breaches show the power of zero-days CLICK2GOV BREACHES SHOW THE POWER OF ZERO-DAYS

blog article

Jan 03, 2019

Just about every organization, including the biggest of all—government at all levels—encourages you to pay your bills online. You know the pitch: It’s easy! It’s quick! It’s convenient! It saves paper! And, they also say, it’s safe and secure! Except when it isn&r...

Read More

Is Your Cybersecurity Level Capable of Standing in Multi-Cloud Infrastructures Future? IS YOUR CYBERSECURITY LEVEL CAPABLE OF STANDING IN MULTI-CLOUD INFRASTRUCTURES FUTURE?

blog article

Jan 03, 2019

The popular advantages of working on a multi-cloud infrastructure are – Cloud service provider flexibility, optimized workloads, no cloud vendor lock-in, and cost efficiency. Someone said that “multi-clouds expand the attack surface area and raise the total number of Cybersecurity holes ...

Read More

Security trends to pay attention to in 2019 and beyond SECURITY TRENDS TO PAY ATTENTION TO IN 2019 AND BEYOND

blog article

Jan 03, 2019

Software security requires good hygiene and constant diligence to protect your organization and users from known threats; it also requires working proactively to identify and address emerging risks. Here at Google Cloud, we help you do both. We build products that make security easy—from autom...

Read More

The 4 stages of cyber resilience THE 4 STAGES OF CYBER RESILIENCE

blog article

Jan 03, 2019

Until recently, organisations often spent almost all of their information security budget on prevention, effectively taking an all-or-nothing approach to the threat of data breaches. They either repelled the attack or faced the consequences head-on. However, with data breaches becoming more common a...

Read More

The Future of Cybersecurity – A 2019 Outlook THE FUTURE OF CYBERSECURITY – A 2019 OUTLOOK

blog article

Jan 03, 2019

From the record-breaking number of data breaches to the implementation of the General Data Protection Regulation (GDPR), 2018 will certainly go down as a memorable year for the cybersecurity industry. And there have been plenty of learnings for both the industry and organisations, too. Despite havin...

Read More

Biggest Data Breaches Of The 21st Century BIGGEST DATA BREACHES OF THE 21ST CENTURY

infographic

Jan 02, 2019

Did you know it takes an average of 191 days for a company to realize there’s been a data breach? That’s according to a high-profile study conducted by the Ponemon Institute for IBM Security. This slow response is detrimental to business. It especially puts small businesses in a vulnerab...

Read More

WHAT DOES THE GDPR MEAN FOR GLOBAL DATA PROTECTION? WHAT DOES THE GDPR MEAN FOR GLOBAL DATA PROTECTION?

infographic

Jan 02, 2019

GDPR enforcement started last year, bringing with it some key changes for enterprise data protection efforts around the world. The GDPR may be the strictest and most far-reaching data protection regulation ever passed, imposing tight data protection requirements and heavy penalties for non-complianc...

Read More

Small Cybersecurity Tips & Tricks That Small Industries Should Have SMALL CYBERSECURITY TIPS & TRICKS THAT SMALL INDUSTRIES SHOULD HAVE

blog article

Jan 02, 2019

The blog is going to represent small cybersecurity tips that a small business should have to grow their business in CyberWorld. These cybersecurity tips are helpful because they provide strong security without spending any finance. What percentage of small US-based firms has suffered from cyberattac...

Read More

The new landscape of pre-installed mobile malware: malicious code within THE NEW LANDSCAPE OF PRE-INSTALLED MOBILE MALWARE: MALICIOUS CODE WITHIN

blog article

Jan 02, 2019

Here’s a scary thought: Mobile devices may soon come with pre-installed malware on required system apps. While it might sound like a grim foretelling, pre-installed mobile malware is an unfortunate reality of the future. In the past, we’ve seen pre-installed malware with the notorious Ad...

Read More

OSINT Framework: The Perfect Cybersecurity Intel Gathering Tool OSINT FRAMEWORK: THE PERFECT CYBERSECURITY INTEL GATHERING TOOL

blog article

Jan 02, 2019

Intel and reconnaissance are among the first steps taken in any cybersecurity research effort, and as we’ve seen in our previous post, OSINT plays a big role in data collection. So what is OSINT? While there are tons of public resources for getting information about any individual or organizat...

Read More

Common Exploits Found in a Penetration Test COMMON EXPLOITS FOUND IN A PENETRATION TEST

blog article

Jan 02, 2019

How to Remediate Vulnerabilities to Secure Your Business. Let’s imagine that your company just completed a penetration test and you are left with an assessment report from the vendor with a list of exploits and vulnerabilities to remediate. You are trying to get a full understanding of the rep...

Read More

The Changing Landscape of Automated Attacks on Web and Mobile Apps THE CHANGING LANDSCAPE OF AUTOMATED ATTACKS ON WEB AND MOBILE APPS

blog article

Jan 02, 2019

In recent years, we have witnessed an unprecedented surge in automated attacks targeting online businesses. These attacks are aimed at validating stolen payment card details, scraping content, taking over accounts and sometimes even slowing down the target website. In the last post, I had highlighte...

Read More

New Windows Zero-day Bug Allows Deleting Arbitrary Files NEW WINDOWS ZERO-DAY BUG ALLOWS DELETING ARBITRARY FILES

blog article

Jan 02, 2019

A security researcher released exploit code for an unpatched bug in Windows that could allow an attacker with limited privileges to delete system files. Exploiting the bug requires winning a race condition on the machine, so a successful exploit can take some time as it will retry until it succeeds,...

Read More

Cyber Security in 2019 CYBER SECURITY IN 2019

infographic

Jan 02, 2019

With a new year of cyber threats ahead of us, what are the cyber security trends and activities most likely to affect your organisation? As 2019 gets underway, plenty of people are sharing their predictions for the year ahead. While there are plenty of unknowns ahead for the public sector, not least...

Read More

Various steps involved in Implementing a Cyber Kill Chain VARIOUS STEPS INVOLVED IN IMPLEMENTING A CYBER KILL CHAIN

blog article

Jan 02, 2019

We are living in a world where everything is networked together, from online transactions to government infrastructure, and therefore, network protection will no longer be an optional extra. Today, cyber-attack has become an international issue, as high-profile infringements have caused many problem...

Read More

ENHANCING HCE MOBILE PAYMENTS WITH TEEs ENHANCING HCE MOBILE PAYMENTS WITH TEES

whitepaper

Jan 01, 2019

This white paper explains the use of Trusted Execution Environments (TEEs) in the context of HCE mobile payments and explores why companies deploying HCE mobile payment solutions should consider using TEEs to enable a higher level of security and to minimize the possibility of attacks. Dejamobile, i...

Read More

Threats Report McAfee Labs December 2018 THREATS REPORT MCAFEE LABS DECEMBER 2018

infographic

Dec 31, 2018

Inside the Digital Underworld. In Q3, we examined how markets are changing on the dark web as well as the hot topics and commodities in underground hacker forums. Underground Hacker Forums. Niche Markets With the takedown of some high-profile dark web markets in 2017, vendors are moving away from la...

Read More

Darktrace Discoveries 2018 Real-World Threats Identified by Cyber AI DARKTRACE DISCOVERIES 2018 REAL-WORLD THREATS IDENTIFIED BY CYBER AI

whitepaper

Dec 31, 2018

Cyber-attacks in 2018 are increasingly moving at machinespeeds, encrypting or compromising machines within seconds. Strained security teams simply cannot keep pace, and struggle to respond fast enough. As attackers learn to move at unprecedented speeds, we have also seen AI become a fundamental ally...

Read More

GAIN BACK THE TRUST IN YOUR NETWORK GAIN BACK THE TRUST IN YOUR NETWORK

whitepaper

Dec 31, 2018

INTRODUCING BLUE RIDGE NETWORKS’ TECHNOLOGY Blue Ridge Networks’ LinkGuard platform represents a best-in-class capability to protect the critical assets of commercial and government customers from increasingly destructive and costly cyber-attacks. Able to support a wide range of architec...

Read More

Managed Endpoint Defense Powered by CB Defense MANAGED ENDPOINT DEFENSE POWERED BY CB DEFENSE

infographic

Dec 29, 2018

THE CHALLENGE. Endpoints are among the most popular targets for sophisticated threat actors. Hackers know they can bypass traditional antivirus solutions while avoiding detection and establishing control. 64%. of organizations had endpoint attacks that successfully compromised assets and/or infrastr...

Read More

CYBERSECURITY TRENDS 2019: Privacy and Intrusion in the Global Village CYBERSECURITY TRENDS 2019: PRIVACY AND INTRUSION IN THE GLOBAL VILLAGE

whitepaper

Dec 29, 2018

For several years now, ESET experts from around the world have been contributing to our annual Trends report, which offers a brief review of the milestones reached in the world of cybersecurity and our predictions about possible attack scenarios and measures to counteract them in 2019. The basic sce...

Read More

Beware! Your website might be delivering Emotet malware BEWARE! YOUR WEBSITE MIGHT BE DELIVERING EMOTET MALWARE

blog article

Dec 29, 2018

In 2018, we saw a surge in Emotet activity. Emotet started as a banking trojan but this blog will shed light on how it has also become a “threat distributor”. We will also discuss server-side and client-side activity and how it spreads. Its self-propagation makes it all the more challeng...

Read More

5 Resolutions for Improving Your IT Security in 2019 5 RESOLUTIONS FOR IMPROVING YOUR IT SECURITY IN 2019

blog article

Dec 28, 2018

Protecting your organization’s key data is more important than ever. Data breaches are on the rise. The past year saw significant public attacks including the exposure of personal information of as many as 500 million worldwide guests of one hotel chain, the theft of millions of social media u...

Read More

Evolve Cyber Security Index ETF EVOLVE CYBER SECURITY INDEX ETF

whitepaper

Dec 28, 2018

MACROECONOMIC HIGHLIGHTS: Cyber security as a global arms race is a story that continues to grow. Investigation into Russian interference in the 2016 US election continues to draw headlines. Now the US finds itself facing off against other world powers. China is looking to narrow the gap with the US...

Read More

Manage Identities Across the Hybrid Cloud MANAGE IDENTITIES ACROSS THE HYBRID CLOUD

whitepaper

Dec 28, 2018

By consolidating identity management across all internal and external systems with Oracle Identity Cloud Service, our customers can easily and securely access a wide range of services with a single ID. Implementation was quick and easy, enabling us to provide new services faster and support growth.

Read More

Best 4 Tips to Be Used While Selecting A Third-Party Security Vendor BEST 4 TIPS TO BE USED WHILE SELECTING A THIRD-PARTY SECURITY VENDOR

blog article

Dec 28, 2018

Nowadays the business perimeter is fuzzier than ever with digital conversion of communication machines and growth in cloud computing. This digitization helped in opening up communications with an explored, and often worldwide, vendor network. Well, the latest mode of third-party security vendor mana...

Read More

2018: The Year of the Data Breach Tsunami 2018: THE YEAR OF THE DATA BREACH TSUNAMI

infographic

Dec 28, 2018

Our friends at Malwarebytes wrote: "It’s tough to remember all of the data breaches that happened in 2018. But when you look at the largest and most impactful ones that were reported throughout the year, it paints a grim picture about the state of data security today. The consequences of ...

Read More

state of the internet security CYBER ATTACK TRENDS AND THREAT LANDSCAPE STATE OF THE INTERNET SECURITY CYBER ATTACK TRENDS AND THREAT LANDSCAPE

whitepaper

Dec 28, 2018

Explosion of Automated Attacks in the Connected World. A White House study published in January of 2018 estimated that malicious cyber activity cost the U.S. economy between $57 billion and $109 billion in 20161 . An international report from the Center for Strategic and International Studies (CSIS)...

Read More

The New Mob is on the Internet THE NEW MOB IS ON THE INTERNET

blog article

Dec 28, 2018

According to the Secureworks State of Cybercrime Report 2018, the bulk of cybercrime-related damage around the globe is perpetrated by a small group of well-organized, dangerous, and covert criminal groups. What’s worse, the report shows that the boundary between a nation-state and cybercrimin...

Read More

White House Cybersecurity Strategy: The Essence WHITE HOUSE CYBERSECURITY STRATEGY: THE ESSENCE

blog article

Dec 28, 2018

The “National Cyber Strategy”, released recently by the White House, offers a broad blueprint for America’s approach to cybersecurity.  Let’s look its four “pillars”, and their key elements. 1. Protecting the American People, Homeland, and the American Way of...

Read More

Cyber Security and Privacy Threats & How We Fought Them | 2018 in Review CYBER SECURITY AND PRIVACY THREATS & HOW WE FOUGHT THEM | 2018 IN REVIEW

blog article

Dec 28, 2018

It was the best of years, it was the worst of years… Today we’re doing a recap of 2018. Treat yourself to a cup of hot drink, sit back, and enjoy our review of these past 12 months. What new cyber threats arose? How did internet community address them? What did KeepSolid VPN Unlimited d...

Read More

10 top security trends for 2019 10 TOP SECURITY TRENDS FOR 2019

infographic

Dec 27, 2018

Digital technologies deliver useful innovations, but they can also help criminals. Make sure you’re ready for new threats by staying on top of these 10 security trends anticipated by DXC Technology’s experts and partners. 1 Information security and operational risk coverage. Organization...

Read More

End of the Year 2018 And Its Time To Prepare For Cyber Security 2019 END OF THE YEAR 2018 AND ITS TIME TO PREPARE FOR CYBER SECURITY 2019

blog article

Dec 27, 2018

Soon after few days, we are going to step-in into a new year i.e., 2019. There is a well-said quote that ‘prevention is better than cure’. Therefore, here we came with this post to aware cloud users worldwide with the preventive measures to be taken for Cyber security 2019. It has been a...

Read More

Software Supply Chain Threats Are On The Rise SOFTWARE SUPPLY CHAIN THREATS ARE ON THE RISE

blog article

Dec 27, 2018

Large organizations in both the public and private sector routinely work with subcontractors for everything from the supply of manufactured components to the supply of custom computer code. For example, government agencies may contract with software development companies for the supply of code used ...

Read More

Security in Remote Support SECURITY IN REMOTE SUPPORT

whitepaper

Dec 27, 2018

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to your organization. BeyondTrust can help your support organization stay secure and compliant, while improving the efficiency and success of your organization with ...

Read More

Exploits on the Rise: SAP and Oracle EXPLOITS ON THE RISE: SAP AND ORACLE

blog article

Dec 27, 2018

Whatever role you play in ensuring your organization runs smoothly, the biggest risk to the business is not knowing the risks. ERP systems SAP and Oracle have seen a 100% increase in available public exploits over the last three years and a 160% increase in the activity and interest in ERP-specific ...

Read More

Security in the Privileged Remote Access Appliance SECURITY IN THE PRIVILEGED REMOTE ACCESS APPLIANCE

whitepaper

Dec 27, 2018

Security in BeyondTrust Privileged Remote Access (OnPremises) The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to your organization. BeyondTrust can help your organization stay secure and compliant, while improving...

Read More

A LOOK AHEAD 10 CYBER SECURITY PREDICTIONS FOR 2019 A LOOK AHEAD 10 CYBER SECURITY PREDICTIONS FOR 2019

whitepaper

Dec 27, 2018

2018 was a year of major cyberattacks, from all-too-common hacks, ransomware and phishing to new, sophisticated crypto-jacking. The year also brought dramatic privacy developments through enactment of the European General Protection Regulation (GDPR) and passage of the California Consumer Privacy Ac...

Read More

Five Ways to Increase Your Cyber Health in 2019 FIVE WAYS TO INCREASE YOUR CYBER HEALTH IN 2019

blog article

Dec 27, 2018

You are the Internet. It’s easy to get lost in the jargon, or the acronyms, or the fast-paced upgrades, but it doesn’t make it any less true. The Internet isn’t just a bunch of servers sitting in a dusty warehouse somewhere, or the flickering bars on the corner of your phone (which...

Read More

Top 5 Cybersecurity Priorities for 2019: Ponemon Study TOP 5 CYBERSECURITY PRIORITIES FOR 2019: PONEMON STUDY

blog article

Dec 27, 2018

We asked 2,410 IT and cybersecurity decision-makers in six countries to identify their top cybersecurity and governance priorities for the New Year. Here’s what we learned. What are your top cybersecurity concerns for 2019? Tenable commissioned Ponemon Institute to conduct a survey of 2,410 IT...

Read More

Compliance with Data Security and Privacy COMPLIANCE WITH DATA SECURITY AND PRIVACY

video

Dec 26, 2018

Daksh Singh, Head of Analytics, Aegon Life, talks about why it is vital for BFSI companies to comply with security and privacy while dealing with customer data. Your data is secure with us. Information security is indispensable to winning customer confidence in Financial Services industry. Lemnisk i...

Read More

The Top 5 Best DNS Servers for improving Online Privacy & Security THE TOP 5 BEST DNS SERVERS FOR IMPROVING ONLINE PRIVACY & SECURITY

blog article

Dec 25, 2018

We recently ran two Twitter polls to ask what you thought the best DNS servers were in terms of online privacy and security. ISPs (Internet Service Providers) generally offer DNS services to their customers, so when you don’t set up DNS servers on your computer or router, your DNS queries will...

Read More

6 Alternative Authentication Methods to Supersede Passwords 6 ALTERNATIVE AUTHENTICATION METHODS TO SUPERSEDE PASSWORDS

blog article

Dec 24, 2018

Back in 2004, Bill Gates said people would rely less and less on passwords, because “they just don’t meet the challenge.” And really, passwords, the world’s most common way of authentication, have been becoming obsolete over the past decade or so. Judging from numerous securi...

Read More

Adware Definition ADWARE DEFINITION

blog article

Dec 24, 2018

A software application that shows unsolicited advertisements while a program is running is termed as an adware. In most cases, the adware comes implanted inside a free software supported by advertisements. These ads start to show up in pop-up windows or on a toolbar on a computer or browser. Though ...

Read More

CYBER DEFENSE FOR SMBs CYBER DEFENSE FOR SMBS

whitepaper

Dec 21, 2018

Cyberattacks against small, medium, and large businesses are on the rise. Most likely, you just read about a major cyberattack within the last month. These days cyberattacks are pervasive, compared to just a decade ago, and cybercriminals do not confine themselves to attacking only large businesses....

Read More

All You Need to Know about the NIST Cybersecurity Framework ALL YOU NEED TO KNOW ABOUT THE NIST CYBERSECURITY FRAMEWORK

blog article

Dec 21, 2018

The last few years have transformed cybersecurity and data protection from niche concerns to major problems as both individuals and organizations suffered from an unprecedented wave of cyberattacks and data theft. Governments around the world have stepped up and have begun introducing legislation th...

Read More

Unmanaged Virtual Private Server: Keeping It Secure UNMANAGED VIRTUAL PRIVATE SERVER: KEEPING IT SECURE

blog article

Dec 21, 2018

Virtual Private Servers (VPS) is undoubtedly the future of web hosting. A VPS refers to a virtual machine or virtual server, installed on a computer that is simultaneously accessed by many end users or websites seems to be a dedicated server. Also referred to as a virtual dedicated server (VDS), the...

Read More

Cybersecurity Trends to Watch Out for in 2019 CYBERSECURITY TRENDS TO WATCH OUT FOR IN 2019

blog article

Dec 21, 2018

The cybersecurity landscape is in constant flux, keeping our team busy researching the newest threats to keep our customers safe. As the new year approaches, we asked our cybersecurity experts to predict which security trends will have the most impact in 2019 and what consumers should prepare for. C...

Read More

58% increase in companies affected by BEC attacks 58% INCREASE IN COMPANIES AFFECTED BY BEC ATTACKS

blog article

Dec 21, 2018

Data from Lloyds Bank has revealed a 58% increase in BEC (business email compromise) attacks in the year to date. It is important to note that the “true scale of the problem is likely to be much larger” as this is only reported fraud. Key findings. The average loss to a commercial custom...

Read More

CYBERX AND HIGHLIGHTS CYBERARK INTEGRATION CYBERX AND HIGHLIGHTS CYBERARK INTEGRATION

whitepaper

Dec 21, 2018

Reducing OT Risk from Unauthorized Remote Access. The March 2018 FBI/DHS alert clearly documented how threat actors are leveraging compromised remote access credentials to access critical infrastructure networks via remote desktop and VPN connections. By using trusted connections, this approach easi...

Read More

A Dynamic Duo: AWS & WP Engine A DYNAMIC DUO: AWS & WP ENGINE

whitepaper

Dec 21, 2018

WordPress at scale means two things: building an application or website that scales well for traffic growth or allocating additional infrastructure for planned and unplanned traffic spikes. At WP Engine, we leverage a modern technology stack to make sure our customers have the right tools for scalin...

Read More

THE MITRE ATT&CK FRAMEWORK: A GUIDE BY SECURITY EXPERTS THE MITRE ATT&CK FRAMEWORK: A GUIDE BY SECURITY EXPERTS

blog article

Dec 20, 2018

MITRE ATT&CK is a comprehensive knowledge base and complex framework of over 200 techniques that adversaries may use over the course of an attack. These include specific and general techniques, as well as concepts and background information on well-known adversary groups and their campaigns. One...

Read More

Cybersecurity at a glance CYBERSECURITY AT A GLANCE

infographic

Dec 20, 2018

Global challenges and opportunities. Close to $600 billion USD, nearly one percent of global GDP, is lost to cybercrime annually¹. Already more than 8.4 billion networked devices. By 2020, there will be 20.4 billion. Enterprise customers would invest in at least 70% more IoT devices if their co...

Read More

Edge-to-edge cybersecurity for manufacturers EDGE-TO-EDGE CYBERSECURITY FOR MANUFACTURERS

infographic

Dec 20, 2018

AT&T provides edge-to-edge technologies that help manufacturers implement, monitor, and eliminate network and system vulnerabilities. Current landscape 42% of manufacturers’ cyber security investments are driven by risk posture.* 20% By 2021, 20% of the largest manufacturers will depend on...

Read More

Join Allen Downs at IBM Think 2019 JOIN ALLEN DOWNS AT IBM THINK 2019

video

Dec 20, 2018

Join Allen Downs, Vice President, IBM Business Resiliency Services, and other IBM experts, industry analysts and clients at the Security & Resiliency campus at IBM Think 2019 to learn about new technologies and practices to mitigate cyber risks.

Read More

The Email Security Education Series: The Basics THE EMAIL SECURITY EDUCATION SERIES: THE BASICS

blog article

Dec 20, 2018

Your customers rely on email for their day-to-day business operations, and cybercriminals know this.  This is why some of the biggest online threats come from spam and email-borne malware. In fact, phishing and spear phishing represent the number one attack vector threatening business all over ...

Read More

Granular Security for Assessments in Financial Reporting Compliance GRANULAR SECURITY FOR ASSESSMENTS IN FINANCIAL REPORTING COMPLIANCE

whitepaper

Dec 20, 2018

Beginning with Release 13 Update 18C, data security for Financial Reporting Compliance assessments is no longer dependent on data security for other objects. In Financial Reporting Compliance, data security policies determine which items are available to users. The policies are mapped to roles, whic...

Read More

Data Security Compliance for NBFCs DATA SECURITY COMPLIANCE FOR NBFCS

blog article

Dec 20, 2018

Non-bank financial institutions (NBFIs) or non-bank financial companies (NBFCs) have been an integral part of the Indian financial system. These are financial institutions that do not have a banking license or regulated by an agency but can still carry out financial services ranging from asset finan...

Read More

Social Engineering Methods Used for Malware Distribution SOCIAL ENGINEERING METHODS USED FOR MALWARE DISTRIBUTION

blog article

Dec 20, 2018

Social engineering has been one of the most effective ways to spread malicious software lately. Whereas software vulnerabilities tend to be patched sooner or later, things don’t appear so promising when it comes to human “exploits.” For example, Microsoft has rolled out a patch tha...

Read More

Your checklist for responding to and reporting data breaches YOUR CHECKLIST FOR RESPONDING TO AND REPORTING DATA BREACHES

blog article

Dec 20, 2018

There is a lot you need to do after you discover a data breach, so it’s a good idea to keep a checklist. This will help you keep track of your progress during a hectic few days and ensure that you’ve done everything necessary to comply with the EU GDPR (General Data Protection Regulation...

Read More

3 cyber security takeaways from 2018 3 CYBER SECURITY TAKEAWAYS FROM 2018

blog article

Dec 20, 2018

2018 is coming to an end. And there’s been lots of big cyber security developments. Hotel hacks, the GDPR, low-level vulnerabilities and cold boot attacks all made headlines in the last year. Janne Kauhanen, host of F-Secure’s Cyber Security Sauna podcast, invited several F-Secure expert...

Read More

2018 in Review: The Top Four Takeaways in Security 2018 IN REVIEW: THE TOP FOUR TAKEAWAYS IN SECURITY

blog article

Dec 20, 2018

2018 in Review: The Top Four Takeaways in Security, and What Does it Mean for 2019? It’s hard to believe that 2018 is almost over. While many of us may remember 2018 as  “The Year of GDPR,” there were many other security developments and trends, many of which could affect our ...

Read More

Are security concerns holding you back from. EMBRACING THE CLOUD? ARE SECURITY CONCERNS HOLDING YOU BACK FROM. EMBRACING THE CLOUD?

infographic

Dec 20, 2018

In a recent survey, 150+ federal IT professionals said that their number one cloud challenge1 is expanding security measures to cover their cloud environments. If you’re an IT leader that’s hesitant to embrace the cloud due to security concerns, Force 3 can help. Security is a key concer...

Read More

SINGAPORE HEALTH SERVICE CYBER ATTACK LESSONS LEARNED SINGAPORE HEALTH SERVICE CYBER ATTACK LESSONS LEARNED

whitepaper

Dec 20, 2018

In the most recent cyber wake up call, the personal data of 1.5 million patients in Singapore has been hacked in the country’s largest cyber-attack, the Singaporean government announced recently. 160,000 of these patients, including Prime Minister Lee Hsien Loong, had their outpatient prescrip...

Read More

 Industrial and Critical Infrastructures Compliance With the NIS Cyber Security Framework INDUSTRIAL AND CRITICAL INFRASTRUCTURES COMPLIANCE WITH THE NIS CYBER SECURITY FRAMEWORK

whitepaper

Dec 20, 2018

European national security depends on the reliability and continuous operations of each nation’s critical infrastructure. The increasing complexity and connectivity of critical infrastructure systems are exposing them to cybersecurity threats which put their safety and reliability at risk. The Europ...

Read More

Adhering to NIST Cyber Security Framework with Indegy Security Suite ADHERING TO NIST CYBER SECURITY FRAMEWORK WITH INDEGY SECURITY SUITE

whitepaper

Dec 20, 2018

United States national security depends on the reliability and continuous operations of the nation's critical infrastructure. The increasing complexity and connectivity of critical infrastructure systems are exposing them to cybersecurity threats which put their safety and reliability at risk. The ...

Read More

NATIONAL STRATEGY FOR AVIATION SECURITY NATIONAL STRATEGY FOR AVIATION SECURITY

whitepaper

Dec 19, 2018

The threat landscape has changed significantly since NSPD-47/HSPD-16 directed the development of the NSAS. The past decade has seen the rise of emergent technologies, including cyber, unmanned aircraft, and spectrum-dependent systems that generate economic and social benefits, but also challenge the...

Read More

Kick-start your cloud security: the facts KICK-START YOUR CLOUD SECURITY: THE FACTS

infographic

Dec 19, 2018

43% Of businesses experienced a cyber security breach or attack in the past 12 months1. £3,100 The mean cost of each security breach, rising to £22,300 for larger businesses1. 1in 5 The proportion of businesses internal or external security training1. 27% The percentage of businesses wit...

Read More

The Role of Cyber Intelligence in Election Security THE ROLE OF CYBER INTELLIGENCE IN ELECTION SECURITY

blog article

Dec 19, 2018

Elections. Quite the hot-button issue these days. Step into the proverbial public square, or be invited behind closed doors, and you’ll find elections are being discussed with fervor. With all the extra attention, it’s important to note that more eyes will be on security than ever &ndash...

Read More

5 data breaches that could have been avoided in 2018 5 DATA BREACHES THAT COULD HAVE BEEN AVOIDED IN 2018

blog article

Dec 19, 2018

2018 has been a year of ups and downs for information security. We’ve seen the enforcement of the EU’s GDPR take full effect, bringing the importance of protecting sensitive data to the forefront of people’s minds, with practical steps being taken to ensure compliance. However, whi...

Read More

Smart Cities, Intelligent Transportation Controlling and Optimizing the Flow of Traffic SMART CITIES, INTELLIGENT TRANSPORTATION CONTROLLING AND OPTIMIZING THE FLOW OF TRAFFIC

whitepaper

Dec 19, 2018

City managers across the U.S. are looking for ways to better control traffic to reduce pressure on infrastructure, improve air quality, and make cities more livable. To that end, they are interweaving alternative modes of transportation, active traffic management, and connected vehicles into an inte...

Read More

Download for a data breach. How to avoid unwanted data acquisition in downloadable documents DOWNLOAD FOR A DATA BREACH. HOW TO AVOID UNWANTED DATA ACQUISITION IN DOWNLOADABLE DOCUMENTS

blog article

Dec 19, 2018

Downloading a document from websites and cloud collaboration applications is a common practice for many businesses. The finance department downloads an invoice, the HR department, a CV, and Business Development an RFP. While it’s often as common as replying to an email, employees often forget ...

Read More

WHAT’S GOING TO CHANGE IN CYBERSECURITY IN 2019 (AND WHAT WON’T) WHAT’S GOING TO CHANGE IN CYBERSECURITY IN 2019 (AND WHAT WON’T)

blog article

Dec 19, 2018

Many things in cybersecurity that should happen in 2019 won’t. Learn why. Every year, we reach December and industry experts share their predictions and tell the world what the biggest trends will be for the following year. In the security industry it’s hard to predict exactly what cyber...

Read More

GandCrab says, we will become back very soon GANDCRAB SAYS, WE WILL BECOME BACK VERY SOON

blog article

Dec 18, 2018

GandCrab has been in the wild since last week of January 2018. Over the period it kept learning from its mistakes and GandCrab’s agile development grabbed the attention of many security researchers. From moving its servers to Namecoin powered Top Level Domain (.BIT TLD) servers after the first...

Read More

DNS-Based Security – Who Are You Kidding? DNS-BASED SECURITY – WHO ARE YOU KIDDING?

blog article

Dec 18, 2018

The proliferation of unsecured devices in the home presents a lucrative target for cybercrime with ransomware and cryptojacking just two common monetization methods out of many. Consumer security is a massive $6.5B market and with the growth of connected appliances in the home, the security industry...

Read More

An Inside Look At The IPSec Tunnel AN INSIDE LOOK AT THE IPSEC TUNNEL

blog article

Dec 18, 2018

The Internet is an integral part of daily business for most organizations today, and along with this comes an inherent vulnerability to cyber attacks. In the face of growing incidents of cybercrime, enterprises struggle with the quandary of how to keep data secure while avoiding disruptions to daily...

Read More

What is Passive DNS? And Why Should You Use a Passive DNS API? WHAT IS PASSIVE DNS? AND WHY SHOULD YOU USE A PASSIVE DNS API?

blog article

Dec 18, 2018

Cybersecurity attacks and network threats are on the rise every year. Even if you’re not aware of it, the bad guys are always lurking in the background, looking for ways to attack your web server, DNS infrastructure and domain names. As seen in our Types of DNS Attacks blog post, the DNS syste...