RESOURCES


home.aspx
   
Cryptolocker- What Are They And How To Remove Them CRYPTOLOCKER- WHAT ARE THEY AND HOW TO REMOVE THEM

blog article

Jul 12, 2018

In today’s connected world, malware attacks are on the rise. The recent WannaCry ransomware attack which crippled thousands of business across the globe is a good example of the level and sophistication of such attacks. This highlights not only the need for better virus removal or malware remo...

Read More

Need help implementing ISO 27001? NEED HELP IMPLEMENTING ISO 27001?

blog article

Jul 11, 2018

ISO 27001 is the international standard that describes best practice for an ISMS (information security management system). Successful ISO 27001 implementation relies on commitment and support from top management, so we’ve put together a bundle to help you get that support. Why achieve ISO 2700...

Read More

How to protect Android Devices from Malware Attacks HOW TO PROTECT ANDROID DEVICES FROM MALWARE ATTACKS

blog article

Jul 11, 2018

Google is constantly enhancing features to render Playstore protection from these ever-evolving threats, however, there is no end to users, downloading an infected app. If your Android device is completely slow, or if it consumes too much data then you must be sure that you have downloaded a malicio...

Read More

What is a computer worm virus? How they infect and methods to remove them WHAT IS A COMPUTER WORM VIRUS? HOW THEY INFECT AND METHODS TO REMOVE THEM

blog article

Jul 10, 2018

What is a Computer Worm Virus. The term worm in computing refers to a malicious software whose main role is to infect computers, remain active on the infected system and self-replicate. A computer worm is programmed to duplicate rapidly and spread to uninfected computers. A user realizes the existen...

Read More

HOW ARE THE C-SUITE FAILING CYBER SECURITY? HOW ARE THE C-SUITE FAILING CYBER SECURITY?

infographic

Jul 09, 2018

Organisations need to protect themselves from cyber-related failures and errors, and malicious cyber-attacks. Too often, cyber risk is being managed solely by IT. However, the risks need to be recognised and addressed by the wider governance and risk management processes that involve other managemen...

Read More

Employee Security Awareness Training – Management Side EMPLOYEE SECURITY AWARENESS TRAINING – MANAGEMENT SIDE

blog article

Jul 09, 2018

As many organizations have learned to their regret, a policy for cybersecurity – however comprehensive, proactive, and technologically sound it may be – is doomed to failure if its terms aren’t adhered to by stakeholders of the enterprise, across the board. This emphasizes the need...

Read More

SISHUB SECURITY INTELLIGENT SYSTEMS whitepaper SISHUB SECURITY INTELLIGENT SYSTEMS WHITEPAPER

whitepaper

Jul 07, 2018

Informational security of states, companies, and private individuals has been becoming one of the most important areas of humanity’s everyday life. Lately, hacking attacks have become more exquisite, sophisticated, and well directed. Techniques are becoming more intricate, the number of attack...

Read More

June’s Most Wanted Malware: Banking Trojans Up 50% Among Threat Actors JUNE’S MOST WANTED MALWARE: BANKING TROJANS UP 50% AMONG THREAT ACTORS

blog article

Jul 05, 2018

Check Point’s latest Global Threat Index reveals that Trojan malware families enter Top 10 Most Wanted Ranking; Cryptomining Remains Tops on List. Over the past four months, banking Trojans have increased their global impact by 50 percent, as two Trojan malware families enter the latest Global...

Read More

CYBER SECURITY ERA TO FIGHT WITH THE ATTACK CYBER SECURITY ERA TO FIGHT WITH THE ATTACK

whitepaper

Jul 04, 2018

The increasing attack surface can easily be blamed on the number of IoT devices now being used. Some are built securely, but the majority are not. Despite more legislation being put in place to better secure IoT devices, more and more devices are interacting. The transition from closed networks to e...

Read More

What is Spyware and How To Protect Your PC WHAT IS SPYWARE AND HOW TO PROTECT YOUR PC

blog article

Jul 04, 2018

Spyware is a malicious software which is implanted by a hacker on victim’s computing device with the intention of stealing confidential information without the end user’s intent. The confidential information might include gathering PINs and credit card numbers, passwords, monitoring pass...

Read More

DISTRIBUTED SECURITY DIGITAL EDGE PLAYBOOK DISTRIBUTED SECURITY DIGITAL EDGE PLAYBOOK

whitepaper

Jul 03, 2018

This playbook outlines how industry leaders are distributing security to solve scale and integration challenges using interconnection and colocation (control points). This enables them to deliver new command and control capabilities as part of a broader digital edge strategy.

Read More

Breaches of Wellington’s utility department affects residents BREACHES OF WELLINGTON’S UTILITY DEPARTMENT AFFECTS RESIDENTS

blog article

Jul 03, 2018

Investigation of the breach. Residents were informed that utility bills paid by credit card between July 2017 and February 2018 could be at risk, with customer names, credit card numbers, and expiration dates potentially exposed. The breach forced Wellington to shut down its payment portal and launc...

Read More

Assessing Microsoft 365 security solutions using the NIST Cybersecurity Framework ASSESSING MICROSOFT 365 SECURITY SOLUTIONS USING THE NIST CYBERSECURITY FRAMEWORK

blog article

Jul 02, 2018

Microsoft 365 security solutions align to many cybersecurity protection standards. One widely-adopted standard is the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF). Developed for the US government, NIST CSF is now also used by governments and enterprises worldwide...

Read More

Big Idea: Instant Secured Traceable Transactions BIG IDEA: INSTANT SECURED TRACEABLE TRANSACTIONS

whitepaper

Jul 02, 2018

OiX AIMS TO BE A PLATFORM THAT TRANSFORMS MONOLITHIC TRADITIONAL EXCHANGE INFRASTRUCTURE INTO A BLOCKCHAIN-BASED, NEW AGE PLATFORM. This summary highlights selected information that is presented in greater detail elsewhere in this prospectus. This summary does not contain all of the information you ...

Read More

Qosmos Probe as a DPI Sensor for Threat Detection QOSMOS PROBE AS A DPI SENSOR FOR THREAT DETECTION

whitepaper

Jul 02, 2018

As cyber-attacks become increasingly sophisticated, threat analytics depend on accurate and detailed input from different sources. One key source of information is the network traffic itself: a probe (or sensor) using Deep Packet Inspection (DPI) provides real-time finegrained traffic visibility, wh...

Read More

Protecting the IT that Protects Your Supply Chain PROTECTING THE IT THAT PROTECTS YOUR SUPPLY CHAIN

whitepaper

Jul 02, 2018

Control your future, transform theirs ABB Ability™ Power Transformer. Digital natives like Kenny are growing up fast. So is the utilities sector. With changing energy sources and usage, reliable power is more important than ever – and this is exactly what the new ABB Ability™ Power...

Read More

Cybersecurity concerns ground drones in the military CYBERSECURITY CONCERNS GROUND DRONES IN THE MILITARY

blog article

Jul 02, 2018

The Department of Defense (DoD) has temporarily banned the purchase and use of commercial off-the-shelf drones because of cybersecurity risks. The Pentagon needs to plan to patch the cybersecurity vulnerabilities in unmanned aerial systems (UAS) and mitigate security risks before the ban is lifted. ...

Read More

6 Reasons Why Your PC Running Slow 6 REASONS WHY YOUR PC RUNNING SLOW

blog article

Jul 02, 2018

Is your computer running slow? Are you forced to quit half-way while trying to multi-task as the speed isn’t supportive enough? A few notable signs show that your computer is under a virus attack. So, install a robust anti-virus software and run a scan. If the anti-virus scan comes back clean ...

Read More

Unified security from the store to the cloud to the data center UNIFIED SECURITY FROM THE STORE TO THE CLOUD TO THE DATA CENTER

infographic

Jul 01, 2018

Retail Security should be your fi¬rst thought, not an afterthought. As hackers become more sophisticated and ruthless, Cisco is evolving right along with them with security solutions and services that are simple, open, automated and effective.

Read More

MAF whitepaper MAF WHITEPAPER

whitepaper

Jul 01, 2018

Legal Disclaimer, Risks, and Legal Considerations. You must read and consider the following “Legal Disclaimer, Risks, and Legal Considerations” section before: (1) making use of this Whitepaper and any and all information available on the website(s) of MAKEAFOLIO, INC. (the “Compan...

Read More

A BLOCKCHAIN-BASED MARKETPLACE FOR COMPUTER AND INTERNET NETWORK HARDWARE, SOFTWARE AND SERVICES A BLOCKCHAIN-BASED MARKETPLACE FOR COMPUTER AND INTERNET NETWORK HARDWARE, SOFTWARE AND SERVICES

whitepaper

Jul 01, 2018

The Internet is the global communication platform that enables all humans to connect, share and transact freely across the world. In the simplest of terms, the Internet is the ‘thing’ that connects us to everything and everybody, everywhere. The Internet comprises of software-driven netw...

Read More

Cyber Attack Trends CYBER ATTACK TRENDS

whitepaper

Jun 30, 2018

When it comes to the global cyber landscape, threats are ever evolving, keeping organizations, as well as the security community, constantly challenged. From taking advantage of the Blockchain trading systems to developing new attack methods in the thriving mobile arena, as well as adapting previous...

Read More

WPA3 Is a Major Missed Opportunity: Here’s Why WPA3 IS A MAJOR MISSED OPPORTUNITY: HERE’S WHY

blog article

Jun 30, 2018

Recently, the Wi-Fi Alliance officially announced details for the WPA3 security standard, which includes a brand-new protocol: the “Enhanced Open” network. While this new technology will represent an improvement to how open networks are done today, I believe that it’s a missed oppo...

Read More

Employee negligence named as biggest cybersecurity risk to US businesses EMPLOYEE NEGLIGENCE NAMED AS BIGGEST CYBERSECURITY RISK TO US BUSINESSES

blog article

Jun 29, 2018

New research from Shred-it’s 2018 State of the Industry Report has revealed that 84% of C-suites and 51% of small business owners have named employee negligence as one of the biggest information security risks to US businesses. Employee negligence was named as a top data breach concern. Key fi...

Read More

Fighting Cybercrime with Artificial Intelligence FIGHTING CYBERCRIME WITH ARTIFICIAL INTELLIGENCE

whitepaper

Jun 29, 2018

What We’re Up Against - RaaS in an Hour. 10.05-10.44pm Locate and setup a VPN service to hide your IP address. 10.44-10.58pm Connect to the Satan website on the Dark Web. 11.01pm Ransomware created using a simple dashboard Commission based fee structure – commission charged reduces depen...

Read More

Strategic Analysis June-July 2018 How to Deter in Cyberspace STRATEGIC ANALYSIS JUNE-JULY 2018 HOW TO DETER IN CYBERSPACE

whitepaper

Jun 29, 2018

Cyber-attacks are escalating in frequency, impact, and sophistication. State actors play an increasingly larger role in this escalating dynamic, as they use cyber-attacks both offensively and defensively. For example, North Korea has been linked to WannaCry, and Russia to NotPetya, two major cyber-a...

Read More

Complete Guide To Android App Permissions & How To Use Them Smartly COMPLETE GUIDE TO ANDROID APP PERMISSIONS & HOW TO USE THEM SMARTLY

blog article

Jun 29, 2018

While installing any app from Google Play, users come across the app permission request. For instance, the message prompted on the mobile screen reads, “Allow Messenger to send and view SMS messages? ” you may choose to deny or allow it, the choice is yours. But, it is essential to know ...

Read More

PROTECT AGAINST MALICIOUS DOCUMENT AND FILE DOWNLOADS PROTECT AGAINST MALICIOUS DOCUMENT AND FILE DOWNLOADS

whitepaper

Jun 28, 2018

Safely download and open documents and executable files from any website, including unknown and uncategorized sites. Defend against malicious downloads with verified native application performance and usability. Eliminate restrictive IT security policies that limit user access to downloaded files an...

Read More

Standing Together for Financial Industry Resilience STANDING TOGETHER FOR FINANCIAL INDUSTRY RESILIENCE

whitepaper

Jun 28, 2018

In November of 2017, the Securities Industry and Financial Markets Association (SIFMA), in conjunction with Norwich University Applied Research Institutes (NUARI) and SimSpace Corporation, hosted the fourth iteration of Quantum Dawn exercises, Quantum Dawn IV. The exercise provided a forum for parti...

Read More

Keep Your Data Out of the Shadows KEEP YOUR DATA OUT OF THE SHADOWS

infographic

Jun 28, 2018

Create safeguards for your enterprise while enabling visibility and control over the use of cloud apps. Confidently adopt cloud apps and avoid the perils of Shadow IT with an integrated cloud security solution from Optiv + Symantec CloudSOC. Optiv's trusted advisors will guide you through every ...

Read More

Capture Security Center: Knowledge, Visibility & Control of Your Cyber Security Ecosystem CAPTURE SECURITY CENTER: KNOWLEDGE, VISIBILITY & CONTROL OF YOUR CYBER SECURITY ECOSYSTEM

blog article

Jun 27, 2018

For many organizations, the fear of being targeted by cybercriminals runs deep, especially as news of the latest high-profile cyberattacks dominate the headlines. Managing security and responding to cyber risks and events are major issues organizations face on a daily basis. In May 2018 alone, the a...

Read More

Reintroducing the Cybersecurity Style Guide: V1.1 REINTRODUCING THE CYBERSECURITY STYLE GUIDE: V1.1

blog article

Jun 27, 2018

It’s been four months since we released Version 1 of the Style Guide to the public, and the response has been incredible. From the moment we published V1, we’ve continued to improve the guide internally. Through daily editorial work and engaging with users like you, we’ve expunged ...

Read More

Patching Human Error: Educating Your User Base on Cyber Security PATCHING HUMAN ERROR: EDUCATING YOUR USER BASE ON CYBER SECURITY

whitepaper

Jun 27, 2018

We provide: Market leader in cloud-based security. Next Generation Endpoint. Web Security (DNS Protection). Security Awareness Training. Mobile Security. BrightCloud Threat Intelligence Services. Proven: NextGen Behavior-based Endpoint Protection. BrightCloud Threat Intelligence Services used by 40+...

Read More

Best Free Spyware and Malware Removal Software BEST FREE SPYWARE AND MALWARE REMOVAL SOFTWARE

blog article

Jun 27, 2018

Nowadays spyware and malware come in different forms, and it is extremely difficult for an average user to distinguish legitimate software and malware or spyware. The spyware is the malicious software or program that transmits your personal information to a hacker without your knowledge. The spyware...

Read More

DECENTRALIZED THREAT INTELLIGENCE PLATFORM DECENTRALIZED THREAT INTELLIGENCE PLATFORM

whitepaper

Jun 26, 2018

The purpose of this Whitepaper is to present BitFence.io and the HNY Token to potential token holders in connection with the proposed token sale. The information set forth below may not be exhaustive and does not imply any elements of a contractual relationship. Its sole purpose is to provide releva...

Read More

The Connection Between Insider Threats and Data Loss Prevention THE CONNECTION BETWEEN INSIDER THREATS AND DATA LOSS PREVENTION

blog article

Jun 26, 2018

Historically, when a cybersecurity team looks to decrease the risk of data loss at their organization, they look towards Data Loss Prevention (DLP) technology. These tools are often hyped for their ability to tag, categorize, and control data movement, but in many cases where an organization has a D...

Read More

Chicago Public Schools data breach exposes thousands of students’ private information CHICAGO PUBLIC SCHOOLS DATA BREACH EXPOSES THOUSANDS OF STUDENTS’ PRIVATE INFORMATION

blog article

Jun 26, 2018

On June 15, 2018, an employee of Chicago Public Schools negligently emailed private student information to more than 3,700 families. The data of thousands of students were breached, including: Names. Email addresses. Phone numbers. Student IDs. A link to a spreadsheet containing the data was acciden...

Read More

5 Examples of Data & Information Misuse 5 EXAMPLES OF DATA & INFORMATION MISUSE

blog article

Jun 25, 2018

What is Data Misuse? Data misuse is the inappropriate use of data as defined when the data was initially collected. Misuse of information typically can be governed by laws and corporate cybersecurity policy. However, even with laws and policies in place, the potential for data misuse is growing. The...

Read More

Multiple data breaches at Dignity Health affect 60K+ MULTIPLE DATA BREACHES AT DIGNITY HEALTH AFFECT 60K+

blog article

Jun 25, 2018

On May 31, 2018, San Francisco-based Dignity Health reported a data breach affecting almost 56,000 patients to the Department of Health and Human Services (HHS). This was the third-largest data breach reported in May. Cause of breach. Due to an email sorting error by Dignity’s scheduling vendo...

Read More

What is Adware? Definition and Methods to Remove Them WHAT IS ADWARE? DEFINITION AND METHODS TO REMOVE THEM

blog article

Jun 22, 2018

An Adware is a software that displays unauthorized advertising download and displays pop-ups or banners on the program’s user-interface when the user is connected to the internet. This type of software, helps the developer generate revenue and recover the costs of the programming development b...

Read More

How to Confront an Insider Threat HOW TO CONFRONT AN INSIDER THREAT

blog article

Jun 22, 2018

So, you’ve successfully detected, and then investigated a potential insider threat. You’ve learned a great deal about that user (be it an employee or a third-party contractor), including who they are, what happened, when, where, and also why, thanks to the visibility given to you by your...

Read More

Handling cyber threats in 7 simple steps HANDLING CYBER THREATS IN 7 SIMPLE STEPS

blog article

Jun 22, 2018

Organisations need to be prepared to respond to a wide variety of cyber security incidents. Your biggest concern might be the threat of criminal hackers breaking into your systems, but you also need to know what to do if, say, an employee inadvertently or maliciously leaks data or your organisation ...

Read More

SkyFile Mail v10 Virus & Spam filter SKYFILE MAIL V10 VIRUS & SPAM FILTER

whitepaper

Jun 21, 2018

Our messaging services SkyFile Mail and SkyFile C include all the features needed to eliminate viruses and spam on the bases of typical properties (Blocked HELO, greylisting etc.). This is very important, as the number of spam/viruses is rising constantly. Viruses and spam represent more than 70% of...

Read More

How To Get Rid of a Computer Virus? HOW TO GET RID OF A COMPUTER VIRUS?

blog article

Jun 21, 2018

Computer viruses are those malicious programs that once they infect your machine will start causing immense havoc on your computer. You will have to watch out and alert yourself when your computer suddenly becomes slow taking extra time to boot, and also be alert when an unwanted pop-up appears whil...

Read More

Implement ISO 27001 on your current Windows system IMPLEMENT ISO 27001 ON YOUR CURRENT WINDOWS SYSTEM

blog article

Jun 21, 2018

ISO 27001 certification is considered among the top-ranking levels of accreditation for information security globally. It outlines best practice for an information security management system (ISMS), meaning that it has to be aligned with the organization’s business objectives and processes, as...

Read More

What’s causing the cyber-security skills gap? WHAT’S CAUSING THE CYBER-SECURITY SKILLS GAP?

blog article

Jun 21, 2018

The proliferation of next-gen technology into mainstream society has been a boon for consumers, entrepreneurs, and business owners alike. Between the rise of mobile computing, the Internet of Things (IoT), and modern social media, our society is more connected than ever before. But all of this techn...

Read More

Cyber-Warriors: The Front Line of Cybersecurity Defense CYBER-WARRIORS: THE FRONT LINE OF CYBERSECURITY DEFENSE

video

Jun 20, 2018

Learn the trifecta of skills the new generation of cyber-warriors needs to combat cybercrime, and how this emerging IT profession is populated by a “new collar” workforce. Learn more in the documentary Dark Web: Fighting Cybercrime.

Read More

RedTalk: Discover, Detect, and Respond to Cloud Security Incidents Using RQL REDTALK: DISCOVER, DETECT, AND RESPOND TO CLOUD SECURITY INCIDENTS USING RQL

video

Jun 20, 2018

RedTalk: Discover, Detect, and Respond to Cloud Security Incidents Using an Extensible Language called RedLock Query Language (RQL). In order to provide comprehensive security and operational visibility across AWS, Azure, and Google Cloud Platform (GCP) environments, the RedLock Cloud 360 platform i...

Read More

Effective Security for the Multicloud Era EFFECTIVE SECURITY FOR THE MULTICLOUD ERA

infographic

Jun 20, 2018

Welcome to the multicloud era - SaaS apps in the cloud, public and hybrid clouds hosting infrastructure, employees and branches accessing the cloud and internet from anywhere. 300,000 OAuth-connected SaaS apps discovered. 84% of companies will use multiple clouds. 84% of companies will use multiple ...

Read More

Why is the Lucrative Cybersecurity Field still Struggling to Hook Prospective Practitioners? WHY IS THE LUCRATIVE CYBERSECURITY FIELD STILL STRUGGLING TO HOOK PROSPECTIVE PRACTITIONERS?

blog article

Jun 20, 2018

The belief that the field of cybersecurity offers individuals job security and above average pay has become generally accepted in today’s interconnected world. These beliefs are bolstered by hard facts, such as those presented in ISACA’s annual State of Cybersecurity research, which reve...

Read More

4 Ways How To Prevent Android Virus On Your SmartPhone 4 WAYS HOW TO PREVENT ANDROID VIRUS ON YOUR SMARTPHONE

blog article

Jun 20, 2018

In recent times, Android viruses are on the rise globally. Hackers are spreading new variants of Android viruses to infect smartphones. Not only have we seen an increase in Android virus infections, but the level of sophistication of those viruses has also increased, as well. If you are searching fo...

Read More

Can You Hear The Digging? The Dangers of Mobile Mining CAN YOU HEAR THE DIGGING? THE DANGERS OF MOBILE MINING

blog article

Jun 20, 2018

Mobile malware focused cyber-criminals are fast adapters and tend to follow rising trends in order to reach a wider audience. Today’s current trend is cryptocurrencies. There are several ways in which cyber criminals are taking advantage of the current frenzy surrounding cryptocurrencies. Some...

Read More

Blocket Proactively Protects its Customers from Email Fraud and Phishing Attacks BLOCKET PROACTIVELY PROTECTS ITS CUSTOMERS FROM EMAIL FRAUD AND PHISHING ATTACKS

video

Jun 19, 2018

Blocket is the largest online classified marketplace in Sweden, with millions of visitors on their website each week. Blocket has a goal to build strong trust with their customers, who interact with their brand online. Focusing on email communications, Blocket partnered with CSC and Proofpoint to ce...

Read More

3 Reasons to Supplement a DLP with Insider Threat Management 3 REASONS TO SUPPLEMENT A DLP WITH INSIDER THREAT MANAGEMENT

blog article

Jun 19, 2018

Many organizations spend years investing significant resources into data loss prevention (DLP) tools designed to identify, classify, and monitor data, in an effort to prevent data exfiltration. Unfortunately, DLP tools alone aren’t stemming the consistent rise of insider threat-related inciden...

Read More

SamSam ransomware: controlled distribution for an elusive malware SAMSAM RANSOMWARE: CONTROLLED DISTRIBUTION FOR AN ELUSIVE MALWARE

blog article

Jun 19, 2018

SamSam ransomware has been involved in some high-profile attacks recently and remains a somewhat elusive malware. In its time being active, SamSam has gone through a slight evolution, adding more features and alterations into the mix. These changes do not necessarily make the ransomware more dangero...

Read More

How are contractors being evaluated on their DFARS cybersecurity measures? HOW ARE CONTRACTORS BEING EVALUATED ON THEIR DFARS CYBERSECURITY MEASURES?

blog article

Jun 19, 2018

The deadline for complying with the Defense Federal Acquisition Regulation Supplement (DFARS) was December 31, 2017. However, contractors struggled to understand what the information security requirements actually meant.  In response, the Department of Defense (DoD) provided guidance for &ldquo...

Read More

The Benefits of Real-Time Cyber Threat Intelligence THE BENEFITS OF REAL-TIME CYBER THREAT INTELLIGENCE

blog article

Jun 18, 2018

To protect their personnel, assets, and sensitive information from being compromised, hijacked, or stolen by malicious actors, organizations are often advised to adopt security best practices, and to deploy the latest in secure technologies. But these things can’t be pulled out of thin air or ...

Read More

How To Protect Your Android Smartphone from Ransomware HOW TO PROTECT YOUR ANDROID SMARTPHONE FROM RANSOMWARE

blog article

Jun 18, 2018

In recent times, ransomware attacks are on the rise globally. Hackers are spreading new variants of ransomware to infect smartphones. Not only have we seen an increase in ransomware attacks, but the level of sophistication in those attacks have also increased, as well. In this article, let’s d...

Read More

5 Tips To Protect Business From Ransomware 5 TIPS TO PROTECT BUSINESS FROM RANSOMWARE

blog article

Jun 15, 2018

Ransomware usually catches people off-guard. Most people do not worry about ransomware or any malware, but then they hit with malware. That is when they realize that backups are non-existence or way too out-of-date to use. At that point, depending on the situation their only option is to either wipe...

Read More

Talk to Watson about Cybersecurity TALK TO WATSON ABOUT CYBERSECURITY

video

Jun 15, 2018

Staying on top of new cyber security threats is challenging for an organization of any size. Learn from IBM Master Inventor Mike Spisak how Hayvn is helping bridge the gap with a natural language spoken interface for Watson for Cybersecurity.

Read More

When Ransomware Goes Mobile WHEN RANSOMWARE GOES MOBILE

blog article

Jun 15, 2018

In the past two years, the most significant trend in the malware world was the rise of ransomware. Recently, mobile malware followed the footsteps of PC malware, like it has done many times before, as several security vendors detected a sharp rise in the spread of mobile ransomware. According to ESE...

Read More

ISACA: Smart cities need to be made more secure ISACA: SMART CITIES NEED TO BE MADE MORE SECURE

blog article

Jun 15, 2018

Urban life is increasingly dictated by technology, but organizations aren’t doing enough to mitigate the risks that come with that, according to an ISACA® report. The survey of 2,000 cybersecurity professionals from across the globe focused on the challenges and opportunities of smart citi...

Read More

DoD predicts cost of fixing cyber vulnerabilities will surpass $250 million DOD PREDICTS COST OF FIXING CYBER VULNERABILITIES WILL SURPASS $250 MILLION

blog article

Jun 15, 2018

The rise of the Internet of Things (IoT) has increased the need for the Department of Defense (DoD) to strengthen its cybersecurity defenses – something already long overdue. The DoD estimates that it may have to spend more than $250 million over the next four years to mitigate existing vulner...

Read More

MRG Effitas Online Banking / Browser Security Certification Project – Q1 2018 MRG EFFITAS ONLINE BANKING / BROWSER SECURITY CERTIFICATION PROJECT – Q1 2018

whitepaper

Jun 14, 2018

MRG Effitas has published an Online Banking Browser Security Report every year for the last four years. Since 2013, that single report has been replaced by quarterly assessments. This report is the assessment for Q1 2018. Whilst this report sits in much the same space as our previous reports, it emp...

Read More

KSN Report: Ransomware and malicious cryptominers 2016-2018 KSN REPORT: RANSOMWARE AND MALICIOUS CRYPTOMINERS 2016-2018

whitepaper

Jun 14, 2018

Ransomware is not an unfamiliar threat. For the last few years it has been affecting the world of cybersecurity, infecting and blocking access to various devices or files and requiring users to pay a ransom (usually in Bitcoins or another widely used e-currency), if they want to regain access to the...

Read More

What Is An Antivirus Software How It Works And Detects? WHAT IS AN ANTIVIRUS SOFTWARE HOW IT WORKS AND DETECTS?

blog article

Jun 14, 2018

The malicious software arrives in different ways, often disguised in the form of software codes, scripts, active content, and other software that seems legitimate. The malware comes in two main forms, and they are the viruses and worms. Viruses. Nearly all viruses are assigned to an apparently harml...

Read More

Five network security threats and how to fight them FIVE NETWORK SECURITY THREATS AND HOW TO FIGHT THEM

whitepaper

Jun 14, 2018

What’s the cost of poor network security? Digital networks are now the backbone of every retail and hospitality operation. Every second of every day in-store voice and data networks are used to deliver a staggering level of business-critical data – from purchase transactions, stock data ...

Read More

Account Takeovers and Cloud Security, Part 3: The Anti-Phishing Solution ACCOUNT TAKEOVERS AND CLOUD SECURITY, PART 3: THE ANTI-PHISHING SOLUTION

blog article

Jun 14, 2018

Having already looked at the challenges of moving to the cloud, and how attackers gain control of a victim’s account, in this third and final post in our cloud security series, we will be looking at how an in depth approach to defense is required to prevent account takeovers. As discussed, the...

Read More

Coachable Moments: Insider Threats, Cloud Storage, & Working Remotely COACHABLE MOMENTS: INSIDER THREATS, CLOUD STORAGE, & WORKING REMOTELY

blog article

Jun 13, 2018

Insider threat management is about much more than ensuring you have the right technologies in place. It’s about the right mix of People, Processes, and Technology. Since people are at the center of all insider threats, having a strategy for ongoing cybersecurity awareness coaching and training...

Read More

VPNFilter malware still making waves VPNFILTER MALWARE STILL MAKING WAVES

blog article

Jun 13, 2018

Last month, a piece of malware called VPNFilter caused chaos for owners of MikroTik, Lynksys, TP-Link, and Netgear equipment. Roughly 500,000 devices worldwide fell victim, with the unwanted parasite able to listen to traffic, steal credentials, damage devices, and more. Until patches started to rol...

Read More

Firewall Management Maturity Stage 3: Advanced Firewall Management FIREWALL MANAGEMENT MATURITY STAGE 3: ADVANCED FIREWALL MANAGEMENT

blog article

Jun 13, 2018

The firewall technology evolution continues. Today finds us at a place where firewalls provide vast capabilities, in particular when it comes to gaining more visibility into the global threat landscape. One of the biggest challenges any organization faces is seeing threats outside of their environme...

Read More

Proposed SHIELD Act gains organizations’ support PROPOSED SHIELD ACT GAINS ORGANIZATIONS’ SUPPORT

blog article

Jun 13, 2018

The Stop Hacks and Improve Electronic Data Security (SHIELD) Act was introduced in November 2017 in response to the increasing number of data breaches and addresses major gaps in New York’s cybersecurity regulations. The SHIELD Act will impose fines of up to $5,000 per violation or $20 per ins...

Read More

Simple Tips To Prevent Ransomware Attack On Android Devices SIMPLE TIPS TO PREVENT RANSOMWARE ATTACK ON ANDROID DEVICES

blog article

Jun 12, 2018

Antivirus software has evolved over the years and so the malware attacks. In order to protect your computer from sophisticated cyber-attacks, you need best antivirus software. In recent times, ransomware attacks are on the rise globally. Hackers are spreading new variants of ransomware to infect sma...

Read More

DevOpsifying Network Security DEVOPSIFYING NETWORK SECURITY

blog article

Jun 12, 2018

DevOps is everywhere. Seems like it’s all people talk about. The best thing since sliced bread. So why is this concept/practice/philosophy/religion/cult becoming so popular in so many companies, big and small (even yours)? Truth is, in today’s fast-paced world, it actually makes a lot of...

Read More

Cybersecurity drills begin in NY CYBERSECURITY DRILLS BEGIN IN NY

blog article

Jun 12, 2018

Just months after the Facebook and Cambridge Analytica incident, in which users’ personal data was used to help Donald Trump’s election campaign, New York officials are conducting cybersecurity drills to test the state’s election system for vulnerabilities. About the cybersecurity ...

Read More

Data Backup and Encryption for Municipal Governments DATA BACKUP AND ENCRYPTION FOR MUNICIPAL GOVERNMENTS

blog article

Jun 12, 2018

For the last 20 months or so, we’ve worked with nearly 200 government municipalities on cyber loss control projects, now largely completed. Data security is a major concern for many municipal governments, so in this post—the third in our Cyber Security Foundation for Municipal Government...

Read More

The Atlanta Ransomware Attack Wasn’t as Bad as We Thought – It’s Worse THE ATLANTA RANSOMWARE ATTACK WASN’T AS BAD AS WE THOUGHT – IT’S WORSE

blog article

Jun 12, 2018

When the news broke about the massive ransomware attack on the city of Atlanta, the details seemed dire yet murky – we knew about court dates getting rescheduled, city job applications getting frozen, and computer systems going down for nearly a week. As the rubble began to clear, we’re ...

Read More

What is Domain Fronting? WHAT IS DOMAIN FRONTING?

blog article

Jun 11, 2018

A little-known software feature called domain fronting has become the central issue in a worldwide dilemma now facing internet users wishing to gain access to websites and online resources that their governments have deemed off-limits. Censorship of internet access and content has been very much in ...

Read More

Tips for safe summer travels: your cybersecurity checklist TIPS FOR SAFE SUMMER TRAVELS: YOUR CYBERSECURITY CHECKLIST

blog article

Jun 08, 2018

Summer is just around the corner in the Northern Hemisphere, and with it comes vacation plans for many. Those looking to take some time away from work and home are likely making plans to secure their home, have their pets taken care of, and tie up loose ends at work. But how about securing your devi...

Read More

The Insider Threat Level: GDPR Total Recall, The CIA Hoarder, and At-Risk Agencies THE INSIDER THREAT LEVEL: GDPR TOTAL RECALL, THE CIA HOARDER, AND AT-RISK AGENCIES

blog article

Jun 08, 2018

The Insider Threat Level series is here to keep you up-to-speed on the numerous examples of insider threat incidents, trends, and best practices caught in the news, so you can be more prepared for anything coming your way. This week, we’re taking a look at: an EU data leak that brings up fond ...

Read More

6 Ways to Speed Up Security Investigations 6 WAYS TO SPEED UP SECURITY INVESTIGATIONS

blog article

Jun 08, 2018

You log into your workstation to start your day, when you discover the bad news. Your organization is the latest to be hit by an insider threat caused data leak. Vital information is now streaming out to whomever wants it, and you have no idea what happened. What was leaked? When did it go out? Who ...

Read More

Trends & Challenges of CYBER SECURITY MANAGEMENT TRENDS & CHALLENGES OF CYBER SECURITY MANAGEMENT

infographic

Jun 07, 2018

CYBER THREATS ARE AMONG US. 58% Of companies took more than 24 hours to start remediation of the threat. 98% Of the cyber security industry experienced a significant cyber threat in the past three years. 96% Of IT Administrators say rate of security alerts increased over the past two years.

Read More

RiskIQ’s Q1 2018 Phishing Roundup and 2017 Recap: Phishing Declines, but Targets Increase RISKIQ’S Q1 2018 PHISHING ROUNDUP AND 2017 RECAP: PHISHING DECLINES, BUT TARGETS INCREASE

blog article

Jun 07, 2018

Phishing actors are always innovating and creating new methods to lure victims into gaining access to their financial information, PII, and user accounts. Understanding the latest phishing techniques and threat actor tendencies helps us position our customers to stay one step ahead of phishing threa...

Read More

Finding that one in a million: Addressing security alert overload by applying business context FINDING THAT ONE IN A MILLION: ADDRESSING SECURITY ALERT OVERLOAD BY APPLYING BUSINESS CONTEXT

blog article

Jun 06, 2018

How many security alerts does a security operation center (SOC) have to deal with during an average day?  New research from Imperva claims that 27% of IT professionals reported receiving more than 1 million alerts a day, and 55% received more than 10,000 a day – or nearly 7 per minute! To...

Read More

Concerns arise as South Carolina Passes the Insurance Industry’s first Cybersecurity Law CONCERNS ARISE AS SOUTH CAROLINA PASSES THE INSURANCE INDUSTRY’S FIRST CYBERSECURITY LAW

blog article

Jun 06, 2018

In May 2018, South Carolina became the first state to pass a cybersecurity insurance bill requiring insurers to establish and implement a cybersecurity program protecting companies and consumers from a data breach. The law created rules for South Carolina insurers, agents, and other licensed entitie...

Read More

Connecting the Universe through Blockchain CONNECTING THE UNIVERSE THROUGH BLOCKCHAIN

whitepaper

Jun 05, 2018

Mandala is a platform that will bring cryptocurrencies and blockchain assets to the masses through a beautifully designed user interface and easy to understand trading technology. Mandala is introducing a functional token, MDX, which will be used to help facilitate simple and more successful trades ...

Read More

Achieve ISO 27001 compliance with our DIY packages ACHIEVE ISO 27001 COMPLIANCE WITH OUR DIY PACKAGES

blog article

Jun 05, 2018

With the General Data Protection Regulation (GDPR) taking effect, it’s important to ensure that you’re taking the necessary steps towards GDPR compliance. ISO 27001 is the international standard that describes best practice for an information security management system (ISMS). Achieving ...

Read More

Linking Infrastructure from Phishing Data Exfiltrations LINKING INFRASTRUCTURE FROM PHISHING DATA EXFILTRATIONS

blog article

Jun 05, 2018

Phishing is still one of the most relentless and quickly evolving threats facing today’s businesses. At RiskIQ, we process tons of web-related threat data, including phishing incidents. From various sources, we receive URLs which may be indicative of phishing, examine the pages with our web-cr...

Read More

Form Follows Function: Why it is Important to Find Balance in Cybersecurity FORM FOLLOWS FUNCTION: WHY IT IS IMPORTANT TO FIND BALANCE IN CYBERSECURITY

blog article

Jun 05, 2018

What is balance? I often hear people talking about finding it, as though it were some object sitting on a shelf in a store. “There isn’t enough time in the day to do what I need to do,” or “I’ll get more sleep once I’m less busy” are common things that peopl...

Read More

Cyber insurance is booming, but it won’t protect you from GDPR fines CYBER INSURANCE IS BOOMING, BUT IT WON’T PROTECT YOU FROM GDPR FINES

blog article

Jun 04, 2018

The US is one of the biggest markets for cyber insurance, but you won’t be able to take out a policy protecting you from fines for breaches of the EU General Data Protection Regulation (GDPR). The law, which strengthens EU residents’ rights relating to their personal data, applies to all...

Read More

Defending Against Ransomware DEFENDING AGAINST RANSOMWARE

whitepaper

Jun 03, 2018

Ransomware is today’s number one security threat. The U.S. is still the country most affected by ransomware, followed by Japan, Italy, India, Germany, Netherlands, UK, Australia, Russia, and Canada. And now each version seems to be more powerful, destructive, and difficult to detect and elimin...

Read More

Data security and service continuity DATA SECURITY AND SERVICE CONTINUITY

whitepaper

Jun 03, 2018

Secure and resilient networks and systems Nuance® Healthcare customers understandably place a great deal of trust in us, and we are dedicated to earning it. Our focus is to expand customer confidence in the integrity of our solutions, whether it be a HITRUST® certified environment, solutions...

Read More

Legal Aspects of Cloud Computing: Cloud Security LEGAL ASPECTS OF CLOUD COMPUTING: CLOUD SECURITY

whitepaper

Jun 02, 2018

After GDPR. After the bow wave of GDPR readiness legal work in the run up to 25 May 2018, IT lawyers may be forgiven for thinking that the biggest change is now behind them. But the truth is that GDPR heralds rather than ends a period of change in IT law and regulation as business transforms through...

Read More

BE CYBER AWARE AT SEA PHISH & SHIPS BE CYBER AWARE AT SEA PHISH & SHIPS

whitepaper

Jun 02, 2018

Welcome to “Phish & Ships”, the maritime cyber security newsletter, keeping you up to date with the shipping and offshore industry initiative, “Be Cyber Aware At Sea”. Issue 19 is generously sponsored by Turrem Data Group Limited (TDG), an emerging expert player in the cy...

Read More

HighIoT The decentralized storage of IoT behavior profiles for protecting smart devices HIGHIOT THE DECENTRALIZED STORAGE OF IOT BEHAVIOR PROFILES FOR PROTECTING SMART DEVICES

whitepaper

Jun 01, 2018

The information set out below may not be exhaustive and doesn’t imply any elements of a contractual relationship or obligations. The sole purpose of this Whitepaper is to present HighIoT, the Akita device and HIT tokens to potential token holders in connection with the proposed token sale. Des...

Read More

ACCELERATE ISO 27001 COMPLIANCE WITH SIEM ACCELERATE ISO 27001 COMPLIANCE WITH SIEM

whitepaper

Jun 01, 2018

Accelerate ISO 27001 compliance with SIEM. For most organizations achieving ISO 27001 compliance is a challenging task, because of its broad scope. This SIEM and ISO 27001 mapping aim to show how Sentor’s SIEM solution LogSentry can accelerate ISO 27001 compliance. In order to accelerate ISO 2...

Read More

VCO TCO Solution Brief VCO TCO SOLUTION BRIEF

whitepaper

Jun 01, 2018

Communication service providers (CSPs) offer a variety of services to enterprises that complement basic network connectivity such as router, firewall, carrier-grade network address translation (CGNAT), session border controller (SBC), virtual private network (VPN), WAN traffic control, WAN accelerat...

Read More

Ignite USA 18 - The Application Framework in Action IGNITE USA 18 - THE APPLICATION FRAMEWORK IN ACTION

video

Jun 01, 2018

The latest cybersecurity innovations, ready right now. Gain immediate security value from apps developed by Palo Alto Networks®, an open ecosystem of trusted innovators, or your own team. Spend more time benefiting from these innovations – and less time provisioning and managing infrastruc...

Read More

The Truth is Out There, but the Threat Is Already Inside THE TRUTH IS OUT THERE, BUT THE THREAT IS ALREADY INSIDE

blog article

Jun 01, 2018

Despite what you may have heard, not all cybersecurity threats come from outside the firewall or beyond your building’s walls. Though we may “want to believe,” there are numerous opportunities for your employees or contractors to cause damage from within. These insider threats can ...

Read More

Symantec Email Security.cloud SYMANTEC EMAIL SECURITY.CLOUD

infographic

May 31, 2018

What is an Email Security.cloud subscription? Symantec Email Security.cloud is a comprehensive, cloud-based service that safeguards your email while strengthening the built-in security of cloud-based productivity tools such as Office 365 and G Suite. Using multi-layered detection technologies and in...

Read More

Best practices for simple, secure device management BEST PRACTICES FOR SIMPLE, SECURE DEVICE MANAGEMENT

whitepaper

May 31, 2018

Employee choice has become a cornerstone of modern IT strategy. By allowing people to choose the best devices for their needs, organizations can improve productivity, flexibility, and even job satisfaction. With the right strategy, IT can ensure the proper policies and technologies are in place to p...

Read More

Staff awareness of phishing STAFF AWARENESS OF PHISHING

blog article

May 31, 2018

What can you do to protect your organization from phishing? Anti-malware installed on your computers will stop some phishing attacks, but not all. It takes just one person to bring the whole business to a halt by falling for the bait. Phishing emails do have tell-tale signs, such as not-quite-correc...

Read More

What is Firewall and Types of Firewall WHAT IS FIREWALL AND TYPES OF FIREWALL

blog article

May 31, 2018

The Internet is a dangerous place filled with all kinds of security threats. Therefore, the moment your network – be it small or large – connects to the internet, it gets exposed to all kinds of security issues, unless it is protected by what is known as a firewall, which is responsible ...

Read More

Tim Hortons Malware Attack & Aftermath…Thoughts On National Doughnut Day! TIM HORTONS MALWARE ATTACK & AFTERMATH…THOUGHTS ON NATIONAL DOUGHNUT DAY!

blog article

May 31, 2018

Three months ago, Tim Hortons coffee and doughnut fast food restaurants reportedly suffered from a severe malware attack. The malware first struck the Tim Hortons point-of-sale (POS) terminals and brought-down cash registers at hundreds of franchises. In recent times, the number of targeted malware ...

Read More

RiskIQ’s Q1 Mobile Threat Landscape Report: Malicious Apps in Global App Stores Decline, but New Threats Lurk RISKIQ’S Q1 MOBILE THREAT LANDSCAPE REPORT: MALICIOUS APPS IN GLOBAL APP STORES DECLINE, BUT NEW THREATS LURK

blog article

May 30, 2018

In our Q1 2018 Mobile Threat Landscape Report, which analyzed 120 mobile app stores and more than two billion daily scanned resources, RiskIQ researchers found that malicious mobile apps continued to decline, despite the total number of apps we observed once again increasing. In fact, apps newly obs...

Read More

90% of employees risk data breaches when using removable devices 90% OF EMPLOYEES RISK DATA BREACHES WHEN USING REMOVABLE DEVICES

blog article

May 29, 2018

A new study has found that 90% of employees regularly transferred company data onto unencrypted and unauthorized USB devices, putting that information at risk of data breaches.  Dtex Systems’ report analyzed anonymous records of organizations across North and South America, Europe, and th...

Read More

Cities Must Do More to Modernize Technologic Infrastructure CITIES MUST DO MORE TO MODERNIZE TECHNOLOGIC INFRASTRUCTURE

blog article

May 28, 2018

Cities need to bolster their protection of critical infrastructure, which makes for attractive targets to increasingly sophisticated cybercriminals looking to inflict serious damage in large population centers. The volume of data created by cities and their device-loving inhabitants is exploding, ra...

Read More

Google will soon provide cybersecurity tools for upcoming election events GOOGLE WILL SOON PROVIDE CYBERSECURITY TOOLS FOR UPCOMING ELECTION EVENTS

blog article

May 25, 2018

After the 2016 presidential election was targeted by (purportedly Russian) criminal hackers, state and election officials are wary of further cyberattacks on this year’s midterm elections. On May 1, an election results website went down during midterm primaries in Knox County, Tennessee follow...

Read More

New VPNFilter malware targets at least 500K networking devices worldwide NEW VPNFILTER MALWARE TARGETS AT LEAST 500K NETWORKING DEVICES WORLDWIDE

blog article

May 23, 2018

For several months, Talos has been working with public- and private-sector threat intelligence partners and law enforcement in researching an advanced, likely state-sponsored or state-affiliated actor's widespread use of a sophisticated modular malware system we call "VPNFilter." We ha...

Read More

How To Get Rid Of Malware on Mac HOW TO GET RID OF MALWARE ON MAC

blog article

May 23, 2018

The modern-day malware is not easy to handle. Because there’s so many of them – adware, spyware, ransomware and more. And they just don’t affect Windows and Linux alone. Mac OS too are vulnerable. So if your using Mac and are of the thought that it won’t get affected, then yo...

Read More

Don’t fall into these hidden GDPR pitfalls DON’T FALL INTO THESE HIDDEN GDPR PITFALLS

blog article

May 22, 2018

With just weeks ahead of us, US companies are still unprepared for the EU’s General Data Protection Regulation (GDPR), according to Melissa – a global contact data quality and identity verification solutions provider. A survey conducted by NAPCO Research and Melissa requested feedback fr...

Read More

10 Tips to Reduce Common Vulnerabilities Exploited by Cybercriminals 10 TIPS TO REDUCE COMMON VULNERABILITIES EXPLOITED BY CYBERCRIMINALS

blog article

May 21, 2018

While it seems that today’s cybercriminals have a myriad of tricks and techniques at the ready to gain access to your network, the reality is that they are typically taking advantage of common vulnerabilities – such as unpatched software or default passwords – time and time again. ...

Read More

The Primary Factors Motivating Insider Threats THE PRIMARY FACTORS MOTIVATING INSIDER THREATS

blog article

May 21, 2018

There was once a time when the risk of an “insider threat” incident was relatively unknown, or simply not considered likely, within an organization. That time has quickly come and gone. With the rise in publicly-disclosed systems breaches and data leaks, along with the steady stream of s...

Read More

How to write a GDPR privacy notice HOW TO WRITE A GDPR PRIVACY NOTICE

blog article

May 21, 2018

If you’re just beginning your EU General Data Protection Regulation (GDPR)compliance journey, it’s unlikely you will be fully compliant by the time the Regulation is enforced on May 25, 2018. An integral part of your GDPR compliance project should be producing appropriate documentation, ...

Read More

What is a Virus Scanner? How do they work and protect your devices WHAT IS A VIRUS SCANNER? HOW DO THEY WORK AND PROTECT YOUR DEVICES

blog article

May 19, 2018

An anti-virus scanner is part and parcel of a free antivirus software, it scans a hard drive to detect malicious software in a computing device. Simply put, the goal-directed nature of a virus scanner software is to review and identify threats from viruses and programs. Anti virus scanner works in a...

Read More

Rootkit: What is Rootkit & it’s types? How to Detect it ROOTKIT: WHAT IS ROOTKIT & IT’S TYPES? HOW TO DETECT IT

blog article

May 18, 2018

In simple language, ‘rootkit’ is basically a software kit used to get to the root of the computer. In other words, a software kit used to gain admin access to the computer and thereby control it. Developed as a legitimate software to provide a ‘backdoor’ to software developer...

Read More

GDPR phishing scams target Apple and Airbnb customers GDPR PHISHING SCAMS TARGET APPLE AND AIRBNB CUSTOMERS

blog article

May 18, 2018

With just days until the EU General Data Protection Regulation (GDPR) is enforced, many organizations are updating their privacy policies and emailing customers to ensure they are aware of the changes. Cyber criminals are taking advantage of this through GDPR-related phishing scams. Apple and Airbnb...

Read More

Security Partnerships are Key to Increased Cybersecurity Maturity SECURITY PARTNERSHIPS ARE KEY TO INCREASED CYBERSECURITY MATURITY

blog article

May 17, 2018

Strong security partnerships will be key to a safer region as cybercriminals increasingly seek to compromise the growing digital infrastructure in META. The META region continues to be right at the forefront when it comes to developing and implementing technologies that are helping to shape the worl...

Read More

5 Top-Rated Antivirus Apps For Android 5 TOP-RATED ANTIVIRUS APPS FOR ANDROID

blog article

May 17, 2018

Despite Google’s immense efforts in securing Android; the widely-used operating system remains vulnerable to numerous online threats. The best way to steer clear of the threats is to install the best antivirus app for Android devices. Some of us may feel that there is no need to install a free...

Read More

UNCOVERING THE HARSH REALITIES OF ENDPOINT MANAGEMENT UNCOVERING THE HARSH REALITIES OF ENDPOINT MANAGEMENT

infographic

May 16, 2018

We surveyed 1,000 IT professionals about the security landscape and uncovered shocking business threats driving the need to make endpoint management a priority. Endpoint management tools simplify the IT management process and protect the organization by allowing a company to centrally manage, update...

Read More

The Best Anti-Virus Protection of 2018 – Top AV Protection Programs THE BEST ANTI-VIRUS PROTECTION OF 2018 – TOP AV PROTECTION PROGRAMS

blog article

May 16, 2018

Malware creators are nefarious to the point that they make fatal infections to extract your financial related information or keep your PC from working by any methods. What you require for a perfect virus protection is the best antivirus programming on your PC. Because of the fortunate stars, as the ...

Read More

4 Ways to Defend Against Pretexting Scams 4 WAYS TO DEFEND AGAINST PRETEXTING SCAMS

blog article

May 16, 2018

Contrary to belief, insider threats are not always employees looking to steal company data and information with malicious intent. Many instances of data exfiltration at the hands of insiders are the result of simple mistakes, such as responding to a pretexting email. These unintentional insider thre...

Read More

NIST seeks feedback on its updated Risk Management Framework NIST SEEKS FEEDBACK ON ITS UPDATED RISK MANAGEMENT FRAMEWORK

blog article

May 16, 2018

The National Institute of Standards and Technology (NIST) has released a draft of its update to the Risk Management Framework (RMF), designed to help federal agencies and companies safeguard their information systems from cyber threats. The update will help organizations respond appropriately to pri...

Read More

Bad Apps: Protect Your Smartphone from Mobile Malware BAD APPS: PROTECT YOUR SMARTPHONE FROM MOBILE MALWARE

blog article

May 15, 2018

Smartphone apps make life easier, more productive, and more entertaining. But can you trust every app you come across? Malicious mobile apps create easy access to your devices for Android and iOS malware to wreak havoc. And there are many untrusted and potentially dangerous apps lurking around in ap...

Read More

What’s the Difference between a Penetration Test and a Vulnerability Assessment? WHAT’S THE DIFFERENCE BETWEEN A PENETRATION TEST AND A VULNERABILITY ASSESSMENT?

blog article

May 14, 2018

In the world of cybersecurity, nothing is static. The cyber threat environment is dynamic and evolving. There are new vulnerabilities discovered on a daily basis. Attacks are getting more sophisticated – they’re getting more complex and flying under the radar of traditional detection tec...

Read More

Researchers use new technique to target Android phones RESEARCHERS USE NEW TECHNIQUE TO TARGET ANDROID PHONES

blog article

May 14, 2018

It appears that researchers have found a new way to hack smartphones. The technique is called ‘Rowhammer’, in which hackers manipulate the physical electric charge in memory chips, corrupting the data and even running specific code. The cyber attack is able to compromise fundamental comp...

Read More

The Cyber Security Skills Gap is Getting Wider THE CYBER SECURITY SKILLS GAP IS GETTING WIDER

blog article

May 14, 2018

For any cyber security specialist who’s due a pay review, recently published threat reports make worthwhile reading. The latest annual roundup from FireEye confirms the Cyber Security Skills Gap as one of the biggest risks facing businesses. Specialists in this area are dubbed a “scarce ...

Read More

Why Antivirus Protection for Android is Needed? WHY ANTIVIRUS PROTECTION FOR ANDROID IS NEEDED?

blog article

May 12, 2018

Smartphones have evolved much in the recent years. Today, smartphones are capable of doing things which can be done only by a computer, a few years back. Unfortunately, with more features added to smartphones with each OS upgrades, there is more opportunity for criminal hackers to infect them with m...

Read More

GDPR: 3 Ways to Protect Employees & Decrease Insider Threat Risk GDPR: 3 WAYS TO PROTECT EMPLOYEES & DECREASE INSIDER THREAT RISK

blog article

May 11, 2018

It might not seem like it, thanks to the added work it has created for organizations inside and outside of the EU, but the new GDPR compliance regulations were designed with the benefit of people in mind. The goal: “to protect all EU citizens from privacy and data breaches in an increasingly d...

Read More

Best Antivirus Protection Software 2018 BEST ANTIVIRUS PROTECTION SOFTWARE 2018

blog article

May 10, 2018

Malware authors are so nefarious that they create deadly viruses to uncover your financial data or prevent your PC from working by any means. What you require is the ideal antivirus software on your PC. Thanks to the lucky stars, as the giant leaders in the security industry, to deliver their best p...

Read More

NIST and automotive industry collaborate on new cybersecurity guidelines NIST AND AUTOMOTIVE INDUSTRY COLLABORATE ON NEW CYBERSECURITY GUIDELINES

blog article

May 09, 2018

Cybersecurity threats are on the rise. In response, the Automotive Industry Action Group (AIAG) has released the Cyber Security 3rd Party Information Security publication, which details cybersecurity guidelines for the automotive industry. The idea for the guidelines came about when a manufacturer a...

Read More

6 practical cybersecurity tips for SMEs 6 PRACTICAL CYBERSECURITY TIPS FOR SMES

blog article

May 07, 2018

Any business that employs fewer than 250 people can be categorized as a small and medium-sized enterprise (SME). There are more SMEs than there are corporations and overall, SMEs employ more people. SMEs serve as a driving force for competition and innovation in many economic sectors. Media coverage...

Read More

NIS Regulations – get our updated compliance guide NIS REGULATIONS – GET OUR UPDATED COMPLIANCE GUIDE

blog article

May 04, 2018

The EU Directive on security of network and information systems (NIS Directive) must be transposed into national law by 10 May 2018. The Directive requires operators of essential services (OES) and digital service providers (DSPs) to implement effective security measures appropriate to associated ri...

Read More

IBM X-Force Command Center: Optiv sees value in IBM Security Cyber Range IBM X-FORCE COMMAND CENTER: OPTIV SEES VALUE IN IBM SECURITY CYBER RANGE

video

May 03, 2018

Learn what to do when your organization experiences a cyber attack with expert training at the IBM X-Force Command Center in Cambridge, MA. This state-of-the-art cyber range offers a virtual environment in which to interact with real-world scenarios and train your security team, business leaders, an...

Read More

NetFlow-based DDoS Detection NETFLOW-BASED DDOS DETECTION

whitepaper

May 02, 2018

Distributed denial-of-service (DDoS) Detection solution developed by NetFlow Logic brings new early warning alerting capabilities allowing to stop DDoS attack before targeted network devices and servers are incapacitated. DDoS attacks are notoriously difficult to detect timely and defend against. Tr...

Read More

What is Computer Worm? How does it Spreads WHAT IS COMPUTER WORM? HOW DOES IT SPREADS

blog article

May 02, 2018

A computer worm is a type of malware which is intended for infecting vulnerable computers in a network. Computer worms tend to quickly replicate themselves and wiggle their way into poorly protected computers. Even today worms exist, the worm component of the dreaded Wanna Cry ransomware made it pos...

Read More

GDPR Guide for agencies, freelancers & website owners GDPR GUIDE FOR AGENCIES, FREELANCERS & WEBSITE OWNERS

whitepaper

May 01, 2018

With this free e-book we would like to assist agencies, freelancers, website owners and WooCommerce shop operators to get an easy access to the most important contents of the EU’s upcoming General Data Protection Regulation (EU GDPR). In addition, we will show you some practical case examples ...

Read More

UnityPoint Health email accounts compromised in phishing attack UNITYPOINT HEALTH EMAIL ACCOUNTS COMPROMISED IN PHISHING ATTACK

blog article

May 01, 2018

UnityPoint Health has revealed that several employee email accounts were subject to a phishing attack . Upon discovery of the incident on February 15, UnityPoint changed the passwords of the affected accounts and enrolled forensic specialists to investigate. Affected information included patient nam...

Read More

Combating the scourge of fileless attacks COMBATING THE SCOURGE OF FILELESS ATTACKS

infographic

Apr 28, 2018

What Is a Fileless Attack? A fileless attack achieves an infrastructure or data breach without writing files to the host system. By leveraging legitimate system resources for malicious purposes, fileless malware effectively hides from the vast majority of traditional threat detection methods.

Read More

When should an organization report a data breach? WHEN SHOULD AN ORGANIZATION REPORT A DATA BREACH?

blog article

Apr 27, 2018

From May 25, 2018, compliance with the EU General Data Protection Regulation(GDPR) will be mandatory for organizations that process EU residents’ personal information. The Regulation joins a number of US federal and state laws that hold organizations accountable for mitigating and managing inf...

Read More

Insider Threats Remain #1 Security Headache for Organizations, Research Shows INSIDER THREATS REMAIN #1 SECURITY HEADACHE FOR ORGANIZATIONS, RESEARCH SHOWS

blog article

Apr 27, 2018

Businesses cannot come up with a mitigation strategy to efficiently detect, identify and manage insider threats, according to research from the Ponemon Institute, so they risk the loss of critical confidential data and resources, network shutdown and reputational damage. In the past year, 159 organi...

Read More

Flawed routers with hardcoded passwords were manufactured by firm that posed “national security risk” to UK FLAWED ROUTERS WITH HARDCODED PASSWORDS WERE MANUFACTURED BY FIRM THAT POSED “NATIONAL SECURITY RISK” TO UK

blog article

Apr 27, 2018

Earlier this month the UK’s National Cyber Security Centre (NCSC) issued a warning to telecoms firms about the potential risks posed by devices manufactured by Chinese-state owned enterprise ZTE. “NCSC assess that the national security risks arising from the use of ZTE equipment or servi...

Read More

Safeguarding IT Infrastructure From Cyber Attacks Best Practices SAFEGUARDING IT INFRASTRUCTURE FROM CYBER ATTACKS BEST PRACTICES

infographic

Apr 26, 2018

Cyber-security is a major threat, with IBM estimating more than one billion personal records stolen every year. Here is a run-down of the best practices for protecting your IT infrastructure from cyber-attacks. Understand the Threats. Understand what makes the system vulnerable and take adequate cou...

Read More

GNYHA & CYBERSECURITY GNYHA & CYBERSECURITY

whitepaper

Apr 26, 2018

Overview: Cybersecurity in Healthcare. Overview: Cybersecurity concerns expand as industries modernize. Healthcare sector has gone digital, largely insecurely. Greater than 95% EHR utilization exposed to threats emanating from employees to sophisticated cybercriminals. $$ for PHI on the dark web. Ra...

Read More

5 ways to improve your information security 5 WAYS TO IMPROVE YOUR INFORMATION SECURITY

blog article

Apr 25, 2018

Organizations are always looking for ways to improve their security posture, but the process is often frustrating. As soon as they secure one weakness, cyber criminals find another one. But if you take a step back, you’ll notice that, as much as cyber criminals’ tactics evolve, they alwa...

Read More

Yahoo gets $35 million slap on wrist for failing to disclose colossal 2014 data breach YAHOO GETS $35 MILLION SLAP ON WRIST FOR FAILING TO DISCLOSE COLOSSAL 2014 DATA BREACH

blog article

Apr 25, 2018

In an ongoing investigation by the Securities and Exchange Commission, Yahoo (now Altaba) has been fined $35 million for failing to report a known data breach in two straight years of SEC filings. Publicly traded companies in the United States are required by law to disclose any mishaps that may imp...

Read More

NIST releases updated version of the Cybersecurity Framework NIST RELEASES UPDATED VERSION OF THE CYBERSECURITY FRAMEWORK

blog article

Apr 24, 2018

After circulating a draft in December and accepting feedback, on April 16, 2018, the US Department of Commerce’s National Institute of Standards and Technology (NIST) released version 1.1 of its Cybersecurity Framework (CSF). Formally titled “Framework for Improving Critical Infrastructu...

Read More

Diamond Certified Experts: Remote Security Applications DIAMOND CERTIFIED EXPERTS: REMOTE SECURITY APPLICATIONS

video

Apr 24, 2018

Host, Sarah Rutan: Thanks to innovations in security technology, it’s now possible for home and business owners to control their security systems via their mobile phones. To learn more, we’re in Oakland with Mike Salk of Reed Brothers Security, speaking on behalf of Diamond Certified Exp...

Read More

Why you shouldn’t ignore the NIS Directive WHY YOU SHOULDN’T IGNORE THE NIS DIRECTIVE

blog article

Apr 24, 2018

By 9 May 2018, the Directive on security of network and information systems (NIS Directive) will have been transposed into UK law. However, unlike the EU General Data Protection Regulation (GDPR) (GDPR), which organisations are currently scrambling to comply with, there is little commotion about the...

Read More

List of free GDPR resources LIST OF FREE GDPR RESOURCES

blog article

Apr 23, 2018

The General Data Protection Regulation (GDPR) will be enforced from May, requiring all organizations that handle EU residents’ data to abide by its strict terms. If yours is one of the millions of organizations that need to comply with the GDPR, then no doubt you are getting slightly hot under...

Read More

Capital IM Cyber Insurance CAPITAL IM CYBER INSURANCE

video

Apr 23, 2018

The risk a cyber attack presents to a business and how you can respond to that risk. This is a short video explaining all a business needs to know about cyber insurance and GDPR implications. For more information about Cyber Insurance products please contact your Capital IM representative or call us...

Read More

Cybersecurity Metrics Your Board of Directors Should Care About & Why CYBERSECURITY METRICS YOUR BOARD OF DIRECTORS SHOULD CARE ABOUT & WHY

blog article

Apr 23, 2018

Businesses today are going through an incredible digital transformation – moving to the cloud, embracing the Internet of Things (IoT), implementing automation, etc. – all at a lightning fast pace. This is opening them up to new and expanding cybersecurity threats that are difficult to ma...

Read More

Cybersecurity of smart medical devices, hospital networks is top priority for the FDA CYBERSECURITY OF SMART MEDICAL DEVICES, HOSPITAL NETWORKS IS TOP PRIORITY FOR THE FDA

blog article

Apr 20, 2018

Securing medical devices is a top priority after countless vulnerabilities have been detected in connected medical devices and hospital infrastructures. Not only are hospital networks exposed to remote hacker attacks and security breaches, but they also struggle with insider threats and major errors...

Read More

Women Underrepresented at RSAC - Let WOMEN UNDERREPRESENTED AT RSAC - LET'S DO SOMETHING ABOUT IT

blog article

Apr 20, 2018

Although I’m excited to be at the RSA Conference with my Morphisec colleagues, it reminds me of the impetus for starting our Women in Cybersecurity Scholarship. Of 28 keynote speakers at RSAC, only seven are women, and six of these were added at the last minute following a string of scathing t...

Read More

Best Free Anti-Spyware and Antivirus Removal Software BEST FREE ANTI-SPYWARE AND ANTIVIRUS REMOVAL SOFTWARE

blog article

Apr 19, 2018

Spyware is a type of malicious software that secretly monitors and collects user information from PCs without their knowledge. It can gather valuable information such as user passwords, credit card details, and other confidential information by secretly recording user’s keystrokes and web brow...

Read More

CYBERATTACKS RISING ACROSS THE GLOBE CYBERATTACKS RISING ACROSS THE GLOBE

infographic

Apr 18, 2018

EVERY REGION. EVERY INDUSTRY. AT EVERY OPPORTUNITY. Worldwide Cyberattacks in 2018. 299% INCREASE IN Ransomware Attacks. 128% INCREASE IN Malware Attacks. 283% INCREASE IN Encrypted Threats. 65% INCREASE IN Intrusion Attempts. Data gathered via the SonicWall Capture Labs Threat Network, which source...

Read More

THREAT INTELLIGENCE BRIEF: APRIL 18, 2018 THREAT INTELLIGENCE BRIEF: APRIL 18, 2018

blog article

Apr 18, 2018

“Great Western Railway urges online customers to update passwords after cyber-attack. The firm said hackers used an automated system to gain access to 1,000 customer accounts on its website and is taking action. While only a very small number of accounts have been affected by the attack, cyber...

Read More

Securing Your Organization SECURING YOUR ORGANIZATION'S HUMAN LAYER

blog article

Apr 18, 2018

In my time in the trenches, and in my previous role as a Gartner research analyst and industry advisor, I spent a LOT of time helping organizations across the world think through their cybersecurity programs. Much of this time was thinking through the defensive measures and how technology can assist...

Read More

Leonardo DRS LEONARDO DRS' MOSHER ON MFOCS, NETWORK SECURITY

video

Apr 18, 2018

Al Mosher, senior director for international strategy at Leonardo DRS Tactical Systems, discusses the company's Mounted Family of Computer Systems (or MFoCs), how it helps the US military meet SWaP-C -- short for size, weight, power and cost -- goals, network security and more during an April 20...

Read More

U.S. official warns of U.S. OFFICIAL WARNS OF 'UNINTENDED CONSEQUENCES' OF EUROPEAN DATA PRIVACY LAW

blog article

Apr 18, 2018

SAN FRANCISCO (Reuters) - U.S. Department of Homeland Security Secretary Kirstjen Nielsen warned on Tuesday that a European data privacy law taking effect next month may have “unintended consequences” that harm the United States’ ability to protect itself from cyber attacks. The Eu...

Read More

US, UK issue odd warning about Russian hackers US, UK ISSUE ODD WARNING ABOUT RUSSIAN HACKERS

blog article

Apr 17, 2018

The U.S. Department of Homeland Security (DHS), Federal Bureau of Investigation (FBI), and the UK’s National Cyber Security Centre (NCSC) have today issued a joint Technical Alert about malicious cyber activity carried out by the Russian government. To summarize the alert - It claims hackers t...

Read More

New York City to offer free cybersecurity tools to deter criminal hackers NEW YORK CITY TO OFFER FREE CYBERSECURITY TOOLS TO DETER CRIMINAL HACKERS

blog article

Apr 17, 2018

New York Mayor Bill de Blasio recently announced that, in an effort to improve cybersecurity, the city will be offering a free mobile app that warns users when suspicious activity is detected on their devices. The program, NYC Secure, is a pioneering cybersecurity initiative protecting New Yorkers o...

Read More

Cyber-nationalism in Cybersecurity Standards CYBER-NATIONALISM IN CYBERSECURITY STANDARDS

blog article

Apr 16, 2018

There are a variety of global standards that have been created to provide guidance to Industrial Control System (ICS) vendors and end users attempting to secure systems.  Examples include ISA/IEC 62443, and ISO/IEC 15408.  Many countries are utilizing these globally accepted standards to d...

Read More

The Cyber Threat Alliance – Stopping Attackers in their Tracks THE CYBER THREAT ALLIANCE – STOPPING ATTACKERS IN THEIR TRACKS

blog article

Apr 16, 2018

When you think about the future of threat intelligence, we can all agree that threats morph, constantly. Sophisticated new botnets, the increase in DDoS-as-a-Service tools, and the rise in cryptocurrency are creating an unpredictable environment where even novice attackers can demand ransoms, carry ...

Read More

Malware Protection Test Consumer Products MALWARE PROTECTION TEST CONSUMER PRODUCTS

whitepaper

Apr 13, 2018

The Malware Protection Test is an enhancement of the File Detection Test which was performed years ago. Due to the increased scope of the test, readers are advised to read the methodology described below. Please note that we do not recommend purchasing a product purely on the basis of one individual...

Read More

Arachas Cyber Risk ARACHAS CYBER RISK

video

Apr 12, 2018

The risk a cyber attack presents to a business and how you can respond to that risk. A short video explaining all a business needs to know about cyber insurance and GDPR implications. For more information about insuring your company from Cyber Attacks, talk to your Arachas Representative or call our...

Read More

Is blockchain the alchemy to DDoS attacks? IS BLOCKCHAIN THE ALCHEMY TO DDOS ATTACKS?

blog article

Apr 12, 2018

DDoS(Denial of Distributed Service) attack is a type of cyber attack that involves a large number of computers and huge volumes of traffic to overwhelm a server or network, slowing it or rendering it completely unresponsive. Victims of a DDoS attack consist of both the end targeted system and all sy...

Read More

Kick-start your career in information security management KICK-START YOUR CAREER IN INFORMATION SECURITY MANAGEMENT

blog article

Apr 12, 2018

Attendees will gain a solid understanding of risk management, technical controls, legal frameworks, physical security, international standards and business continuity, including. The concepts relating to information security management, including confidentiality, integrity and availability (CIA). vu...

Read More

The GDPR: What technical measures do you need to conduct? THE GDPR: WHAT TECHNICAL MEASURES DO YOU NEED TO CONDUCT?

blog article

Apr 12, 2018

Many organisations’ network security defences consist only of patch management and antivirus software. Those are essential, but so is reviewing configurations, third-party applications and hardware. This is what vulnerability scans do. A vulnerability scan is an automated process that finds an...

Read More

Securing Critical Infrastructure in the Wake of Unprecedented Cyber Threats SECURING CRITICAL INFRASTRUCTURE IN THE WAKE OF UNPRECEDENTED CYBER THREATS

blog article

Apr 11, 2018

Last year saw a worrying trend in the cybersecurity attack arena as critical infrastructure came under fire, with many suggesting in 2018 these attacks could escalate. Various defense departments warned of nation-state campaigns targeting operational technology (OT) within the energy sector and nucl...

Read More

The Role of Field Operations in GDPR Compliance THE ROLE OF FIELD OPERATIONS IN GDPR COMPLIANCE

video

Apr 11, 2018

Our Chief Operations Officer, Kevin Simzer, discussed how we ensure data protection and GDPR compliance for more than 500,000 commercial customers. Learn more by visiting: http://bit.ly/2HClIV2 The role is a formal one mandated by the GDPR — although not all companies automatically need to hav...

Read More

Cyber wars Trends and recent attacks CYBER WARS TRENDS AND RECENT ATTACKS

infographic

Apr 10, 2018

The more technology evolves, the more sophisticated the cyber attacks on corporations, government agencies, hospitals, and national interests. Here’s what we’ve learned about trends in cyber warfare, and a list of recent serious attacks. Ransomware Digital version of extortion: Malware t...

Read More

Why ISO 27001 is integral to data protection compliance WHY ISO 27001 IS INTEGRAL TO DATA PROTECTION COMPLIANCE

blog article

Apr 10, 2018

With the EU General Data Protection Regulation (GDPR)’s compliance deadline looming, any organisation that processes EU residents’ data will likely be investigating implementation options to help tackle its compliance project, if it hasn’t already done so. Supervisory authorities s...

Read More

How blockchain could solve the internet privacy problem HOW BLOCKCHAIN COULD SOLVE THE INTERNET PRIVACY PROBLEM

blog article

Apr 09, 2018

Blockchain, with its encrypted and immutable record, will eventually be used create universal digital identities, filled with information that only we will control and that will link back to the issuing banks, governments or even employers. Fintech firms, software makers, telecom providers and other...

Read More

A Brief History of Malware — Its Evolution and Impact A BRIEF HISTORY OF MALWARE — ITS EVOLUTION AND IMPACT

blog article

Apr 05, 2018

A brief look at the history of malware shows us that this malicious menace has been with us since the dawn of computing itself. According to Scientific American, the idea of a computer virus extends back to 1949, when early computer scientist John von Neumann wrote the “Theory and Organization...

Read More

The impact of regulations like GDPR on cybersecurity insurance THE IMPACT OF REGULATIONS LIKE GDPR ON CYBERSECURITY INSURANCE

video

Apr 05, 2018

Jenny Soubra, US head of cyber for Allianz Global Corporate & Specialty, talked with TechRepublic about what role cyber insurance plays when privacy regulations are put in place.

Read More

In Plain Sight: Why Military Veterans Are a Great Fit for Cybersecurity Careers IN PLAIN SIGHT: WHY MILITARY VETERANS ARE A GREAT FIT FOR CYBERSECURITY CAREERS

blog article

Apr 05, 2018

Cybersecurity is a major concern for businesses worldwide. Just look at the results from “The Third Annual Study on the Cyber Resilient Organization” by IBM and the Ponemon Institute: The 2018 study found 65 percent of security professionals believe the severity of cyberattacks has incre...

Read More

Crossing the watershed – digital skills crises will soon be history CROSSING THE WATERSHED – DIGITAL SKILLS CRISES WILL SOON BE HISTORY

blog article

Apr 04, 2018

There is no shortage of talent, only of employers who train that talent. Thirty years ago it took around 18 months turn a University Graduate into a competent analyst programmer. During that second year about 30% left for more money. Hence the reluctance to train and sporadic skills “crises&ld...

Read More

Topic: Security Threats from Virtual Machines - Enterprise Security Weekly #86 TOPIC: SECURITY THREATS FROM VIRTUAL MACHINES - ENTERPRISE SECURITY WEEKLY #86

video

Apr 04, 2018

Doug White, host of Secure Digital Life, comes on the show to talk about five, no six security threats from virtual machines! Full Show Notes: Visit for all the latest episodes! This week Doug white will join us for the show and talk about security threats from virtual machines after that we're ...

Read More

IBM X-Force Report: Fewer Records Breached in 2017 IBM X-FORCE REPORT: FEWER RECORDS BREACHED IN 2017

blog article

Apr 04, 2018

The 2018 IBM X-Force Threat Intelligence Index has found the number of records breached dropped nearly 25 percent in 2017, as cybercriminals shifted their focus on launching ransomware and destructive attacks that lock or destruct data unless the victim pays a ransom. Last year, more than 2.9 billio...

Read More

DETECT MORE THREATS WITH NEXT GENERATION ANTIVIRUS DETECT MORE THREATS WITH NEXT GENERATION ANTIVIRUS

infographic

Apr 03, 2018

WHEN COMPARING Q1 2018 TO Q1 2017, THE AVERAGE SONICWALL CUSTOMER FACED AN INCREASE OF.  15% more phishing attacks. 400% more encrypted attacks. 151% more malware attacks. 226% more ransomware attacks. WITH CAPTURE CLIENT YOU CAN. Continuously monitor your system for malicious behavior. Rollbac...

Read More

Handling Internal Cyber Threats HANDLING INTERNAL CYBER THREATS

video

Apr 03, 2018

Amanda Ryerse is a senior majoring in Electrical Engineering. She has a minor in Political Science. In this video, Amanda talks about her 2017 summer internship with Booz Allen Hamilton, an IT consulting firm based in DC that handles an array of difficult challenges such as defense and cyber securit...

Read More

Annual Cybersecurity Report: Impacts on Government ANNUAL CYBERSECURITY REPORT: IMPACTS ON GOVERNMENT

blog article

Apr 03, 2018

In our just released 2018 Annual Cybersecurity Report: Impacts on Government, we found that cyber attacks against agencies across the U.S. are increasing every day. From ransomware and distributed denial of service (DDoS) to IoT botnets and cryptojacking, the mix of threats are also becoming more le...

Read More

WHY CUSTOMER DATA SECURITY IS MORE IMPORTANT THAN EVER WHY CUSTOMER DATA SECURITY IS MORE IMPORTANT THAN EVER

infographic

Apr 03, 2018

What is the GDPR? When will the GDPR be implemented? What are the possible consequences? The General Data Protection Regulation (GDPR) will strengthen and unify data protection laws for individuals within the European Union and address the export of personal data outside the EU. Even organisations o...

Read More

Protective Layers – Cybersecurity for Healthcare PROTECTIVE LAYERS – CYBERSECURITY FOR HEALTHCARE

blog article

Apr 03, 2018

Layered defense is key to a successful Cybersecurity Strategy in Healthcare which starts with endpoint management. The number of internet connected (IoT) devices is exploding. In a healthcare setting, these “endpoint” devices not only provide significant new opportunities for improving p...

Read More

How CISMP can help your information security career HOW CISMP CAN HELP YOUR INFORMATION SECURITY CAREER

blog article

Apr 03, 2018

A career in information security management is very alluring: it’s rewarding, there’s a high demand for skilled professionals and it comes with a generous salary. All you need to do to get started is gain a Certificate in Information Security Management Principles (CISMP). CISMP provides...

Read More

What Changes Q1 Brought to Cybersecurity WHAT CHANGES Q1 BROUGHT TO CYBERSECURITY

blog article

Apr 02, 2018

So far, 2018 has brought a number of new trends to the cybersecurity space, some of which were predicted correctly and some were not. Mari Galloway, director of finance and communications at the Women's Society of Cyberjutsu looked at what Q1 brought us. The first quarter of 2018, what an intere...

Read More

OPM tells agencies how to respond to cyber workforce needs OPM TELLS AGENCIES HOW TO RESPOND TO CYBER WORKFORCE NEEDS

blog article

Apr 02, 2018

The Office of Personnel Management released updated guidance to help agencies identify and address critical cybersecurity workforce needs. The document sets out a series of timelines detailing how agencies should identify and classify high-value IT and cybersecurity positions before developing actio...

Read More

WHAT DOES A CYBER THREAT HUNTER DO? WHAT DOES A CYBER THREAT HUNTER DO?

blog article

Apr 02, 2018

Learn about what a cyber threat hunter does in Data Protection 101, our series on the fundamentals of information security. The cyber threat hunter role is becoming increasingly important in the modern enterprise, as companies strive to stay ahead of the latest threats and implement rapid response t...

Read More

CYBER SECURITY 2018 CYBER SECURITY 2018

whitepaper

Apr 01, 2018

Threat actors are more sophisticated, with more detailed knowledge not only about critical and proprietary control system components, but also about the actual physical process that is being controlled. Some threat actors are also increasingly able to demonstrate that they have access to extensive s...

Read More

SECURE Communications SECURE COMMUNICATIONS

whitepaper

Apr 01, 2018

CallTrackingMetrics’ (CTM’s) Security and Privacy Program follows a streamlined framework based on NIST 800-30 Rev. 1 guidance. The program was initially developed to adhere to the the Meaningful Use criteria and the HIPAA HITECH Express regulations. In early 2018, in addition to our HIP...

Read More

Treat Security Data With the Same Purpose as Financial Data TREAT SECURITY DATA WITH THE SAME PURPOSE AS FINANCIAL DATA

blog article

Mar 30, 2018

Data is a precious and vehemently defended resource within financial organizations. In most instances, financial data must be verified for accuracy and the results are well documented, retained and accessible for reference at any time. Additionally, scenarios that result in high profitability or lar...

Read More

State of Software Security: Checking the Pulse of the Healthcare Industry STATE OF SOFTWARE SECURITY: CHECKING THE PULSE OF THE HEALTHCARE INDUSTRY

blog article

Mar 30, 2018

Over the past year, our scans of thousands of applications and billions of lines of code found a widespread weakness in applications, which is a top target of cyber attackers. And when you zoom in from a big picture view down to a micro-level, there are a few industries that are struggling to keep u...

Read More

Healthcare Cybersecurity Vulnerabilities HEALTHCARE CYBERSECURITY VULNERABILITIES

blog article

Mar 29, 2018

Do you know where your healthcare system is vulnerable?  As new technology and innovation continue to emerge in healthcare, vulnerabilities aren’t falling behind and pop up everywhere.  So, what can you do? To protect your organizations, first of all, you need to be aware of the most...

Read More

Banks in Denial over Their Resilience to DDoS attacks BANKS IN DENIAL OVER THEIR RESILIENCE TO DDOS ATTACKS

blog article

Mar 28, 2018

Are retail and investment banks in denial about being adequately protected from the frequent advanced DDoS attacks they’re getting hit with today? It is mid-March 2018 – just three months into the year and 3 major banks have already been taken offline by DDoS attacks, making global headl...

Read More

Key Findings of 2018 Cyber Threat Report and How Government Can Respond KEY FINDINGS OF 2018 CYBER THREAT REPORT AND HOW GOVERNMENT CAN RESPOND

blog article

Mar 28, 2018

Symantec’s 2018 Internet Security Threat Report is here. Based on data collected by Symantec’s massive security infrastructure (the largest civilian threat collection network in the world), the report has become the de facto standard for giving enterprises and public organizations essent...

Read More

NIST Cybersecurity Framework Series Part 3: Detect NIST CYBERSECURITY FRAMEWORK SERIES PART 3: DETECT

blog article

Mar 28, 2018

Enterprise chief information security officers have their work cut out for them in the current threat landscape. As attack and infection strategies become more complex and difficult to predict, the business’s CISO must ensure that the organization’s most critical information assets and t...

Read More

Federal Contracts Report TM FEDERAL CONTRACTS REPORT TM

whitepaper

Mar 27, 2018

Defense industry factories now are targets for cyber-attacks, author Robert Metzger of Rogers Joseph O’Donnell writes. Through network-delivered or supply-chain attacks, adversaries can steal sensitive information and IP, cripple production, degrade product functionality or even destroy defens...

Read More

Push for Progress: Empowering Women in Cybersecurity With Voice, Vision and Innovation PUSH FOR PROGRESS: EMPOWERING WOMEN IN CYBERSECURITY WITH VOICE, VISION AND INNOVATION

blog article

Mar 27, 2018

International Women’s Day has come and gone, but that doesn’t mean the push for progress is over. All across the world — in industries far and wide — women were celebrated for their accomplishments on March 8. Here at IBM, women were asked to submit a video or photo to demons...

Read More

Atlanta Mayor states they know who is behind the cyber attack ATLANTA MAYOR STATES THEY KNOW WHO IS BEHIND THE CYBER ATTACK

video

Mar 26, 2018

The city is working with Secure Works, a private company to investigate the hack. The private contractor said the threat has been neutralized and they're working to get all systems back online.

Read More

2017 Consumer Mobile Security App Use 2017 CONSUMER MOBILE SECURITY APP USE

infographic

Mar 25, 2018

Keeper mobile survey finds security awareness is high, but use of security apps is lagging. Users approach security in a similar way as they do on their desktop computers. This can be a problem, given the unique vulnerability of a smartphone - the small computer that fits in your pocket. Today, near...

Read More

Strengthen Cybersecurity Through a United Industry STRENGTHEN CYBERSECURITY THROUGH A UNITED INDUSTRY

blog article

Mar 23, 2018

Every process requires detail, precision and collaboration. If all of the components of the process aren’t working together, it fails. And that can result in catastrophe. As an example, let’s consider a relatively simple machine and one of its primary components: the bicycle and, more sp...

Read More

A preview of the new NIST Cybersecurity Framework A PREVIEW OF THE NEW NIST CYBERSECURITY FRAMEWORK

blog article

Mar 23, 2018

The NIST Cybersecurity Framework has become the de facto set of guidelines for critical infrastructure organizations to assess information security risk and implement adequate cybersecurity measures to manage risk, while protecting consumer privacy. Since being published in February 2014, the framew...

Read More

How Container Technology Supports Application Security HOW CONTAINER TECHNOLOGY SUPPORTS APPLICATION SECURITY

video

Mar 23, 2018

Container technology not only lowers costs, but could improve security, says Dinesh Subhraveti, CTO and co-founder of AppOrbit. Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives.

Read More

Cyberattack on the city of Atlanta CYBERATTACK ON THE CITY OF ATLANTA

video

Mar 23, 2018

As a new work week begins, many are wondering if Atlanta is back to full speed following a cyberattack on the city's computer systems last week. It all depends on the department. Some departments were not affected at all by the cyberattack, while employees in others are still not able to turn on...

Read More

Protecting Websites with Defense in Depth PROTECTING WEBSITES WITH DEFENSE IN DEPTH

whitepaper

Mar 21, 2018

How to keep your website secure? Use Secure Credentials. Regular Checks for Malware. Check All Permissions. Keep all your software and plugins updated. Regularly check application level vulnerabilities. Use Web Application Firewall. Have a DDOS Protection service. Protect your Endpoints.

Read More

The Top 5 Application Security Activities for GDPR Compliance - Part II THE TOP 5 APPLICATION SECURITY ACTIVITIES FOR GDPR COMPLIANCE - PART II

blog article

Mar 21, 2018

When looking at any modern application, one will find a myriad of components, frameworks, APIs and code snippets written by various developers inside and outside your organization. Not all of them are as secure as they should be, and not all of them default to the most secure protocol, design patter...

Read More

Small Steps Towards a Secure IoT SMALL STEPS TOWARDS A SECURE IOT

blog article

Mar 21, 2018

A few weeks ago, the UK’s Department for Digital, Culture, Media and Sport, along with the National Cyber Security Centre, released a public draft of a new report into the security of IoT devices. The “Proposed Code of Practice for Security in Consumer IoT Products and Associated Service...

Read More

Did Microsoft admit that Surface Pro 4 Flickergate is a hardware problem? DID MICROSOFT ADMIT THAT SURFACE PRO 4 FLICKERGATE IS A HARDWARE PROBLEM?

blog article

Mar 21, 2018

The infamous problem with screen flicker and shaking on the Surface Pro 4 – a problem so ubiquitous it spawned the flickergate.com web site – may be nearing a resolution. Finally. I’ve been talking about the Surface Pro 4 flickering and shaking problem since October 2015. In April ...

Read More

STOP. THINK. CONNECT.™ Partnership for Systemwide Information Security Awareness STOP. THINK. CONNECT.™ PARTNERSHIP FOR SYSTEMWIDE INFORMATION SECURITY AWARENESS

blog article

Mar 21, 2018

By becoming a STOP. THINK. CONNECT.™ partner, UC joined more than 700 organizations worldwide making a difference in online safety and cybersecurity. Several UC locations, as well as the systemwide Information Security Awareness Workgroup, were already using STOP. THINK. CONNECT.™ resour...

Read More

Progress Update on Cyber Lexicon PROGRESS UPDATE ON CYBER LEXICON

whitepaper

Mar 20, 2018

The Communiqué issued at the March 2017 meeting of the G20 Finance Ministers and Central Bank Governors (FM&CBG) in Baden-Baden noted that the malicious use of Information and Communication Technologies (ICT) could disrupt financial services crucial to both national and international fina...

Read More

How to Get Vital Cybersecurity Messages to Resonate in Higher Ed HOW TO GET VITAL CYBERSECURITY MESSAGES TO RESONATE IN HIGHER ED

blog article

Mar 20, 2018

Higher education IT professionals want — and need — to keep students informed about cybersecurity breaches and loss prevention, but the message may not be getting through, according to a CDW survey of 250 IT staff and 300 students. Here’s one example of the disconnect: 82 percent o...

Read More

Do IT Pros Consider Security When Purchasing Software? DO IT PROS CONSIDER SECURITY WHEN PURCHASING SOFTWARE?

blog article

Mar 19, 2018

Traditionally, security was about cost avoidance. It was thought of like insurance – something you have to have in case something bad happens, but not something that would boost the bottom line or attract customers. But in today’s environment, we are increasingly seeing that security is ...

Read More

Decrypting JobCrypter DECRYPTING JOBCRYPTER

blog article

Mar 19, 2018

Ransomware has been a growing issue for some time now. It has evolved into a big business, moving millions of dollars yearly from victims’ pockets into those of attackers. The modus operandi of ransomware authors is to infect your machine through any vector (phishing, drive-by browser exploits...

Read More

8 questions to ask about your industrial control systems security 8 QUESTIONS TO ASK ABOUT YOUR INDUSTRIAL CONTROL SYSTEMS SECURITY

blog article

Mar 19, 2018

A recent incident where a likely nation-state threat actor inadvertently shut down a critical infrastructure facility in the Middle East when testing new malware has stoked widespread concerns about the vulnerability of industrial control systems (ICSs) to new cyberthreats. Many security experts see...

Read More

The US Cities that are Best at Password Security THE US CITIES THAT ARE BEST AT PASSWORD SECURITY

blog article

Mar 18, 2018

New research reveals the US cities that are best at password security, with Minneapolis topping the list. A study by password manager Dashlane scores cities based on several metrics, including average password strength and average number of reused passwords. Mess With Texas Things might be bigger in...

Read More

An introduction to the NIST Risk Management Framework AN INTRODUCTION TO THE NIST RISK MANAGEMENT FRAMEWORK

blog article

Mar 16, 2018

The Risk Management Framework (RMF) is a set of information security policies and standards for federal government developed by The National Institute of Standards and Technology (NIST). The RMF is covered specifically in the following NIST publications: The Risk Management Framework (RMF) is a set ...

Read More

Introducing CA Veracode Verified INTRODUCING CA VERACODE VERIFIED

blog article

Mar 15, 2018

Are you struggling to respond to customer and prospect concerns about the security of your application? Do you know what good application security looks like, or how to get there? CA Veracode is pleased to announce the CA Veracode Verified program. With CA Veracode Verified, you prove at a glance th...

Read More

Mobile phishing 2018: Myths and facts facing every modern enterprise today MOBILE PHISHING 2018: MYTHS AND FACTS FACING EVERY MODERN ENTERPRISE TODAY

whitepaper

Mar 13, 2018

Mobile devices have opened a profitable new window of opportunity for criminals executing phishing attacks. Attackers are successfully circumventing existing phishing protection to target the mobile device. These attacks are highlighting security shortcomings and exposing sensitive data and personal...

Read More

ACCESS AND PAYMENTS ON ANY WEBSITE  IN TWO CLICKS ACCESS AND PAYMENTS ON ANY WEBSITE IN TWO CLICKS

whitepaper

Mar 13, 2018

Please read this entire section and do not take any actions until you finish it. This white paper is a summary of safein business model, technology and a brief introduction to safein fundraiser’s principles. Safein fundraiser is considered to be a crowdfunding campaign. Detailed terms and cond...

Read More

Cyber NSF Scheme CYBER NSF SCHEME

infographic

Mar 13, 2018

The Singapore Armed Forces (SAF) will boost its cybersecurity capabilities through a new scheme that taps on the Full-time National Serviceman (NSF) resource pool. Cyber Operators will perform basic roles such as 24/7 threat monitoring and analysis. Skilled NSFs will be selected and offered the Cybe...

Read More

Threat Hunting: Common Attack Vectors and Delivery Channels THREAT HUNTING: COMMON ATTACK VECTORS AND DELIVERY CHANNELS

blog article

Mar 12, 2018

It’s generally accepted that the best defense is a good offense. In cybersecurity terms that means taking a more proactive approach to catching our cyber adversaries. Cyber threat hunting is an effective method for searching your network for malware and other threats that have evaded tradition...

Read More

CYBERSECURITY NEEDS ATTENTION CYBERSECURITY NEEDS ATTENTION

infographic

Mar 12, 2018

US organizations have suffered multiple cybersecurity attacks in the last 12 months, with 80-90 percent impacted by a worm or virus, at least one incident of adware or unauthorized system access from internal staff, or an advanced persistent threat (APT). 23 percent have suffered ten or more phishin...

Read More

The cost of a cyber attack THE COST OF A CYBER ATTACK

blog article

Mar 09, 2018

With the risk of a cyber attack now being classed as the top threat to organisations, it’s vital to have the right cyber security measures in place to protect your organisation from an attack. It’s not just an organisation’s reputation that can be damaged by a data breach – t...

Read More

How to Prevent a Breach From Spring Break HOW TO PREVENT A BREACH FROM SPRING BREAK

blog article

Mar 08, 2018

Spring Break, the latest named vulnerability, is more serious than the moniker implies. Spring Break is a critical remote code execution vulnerability in Pivotal Spring REST, one of the most popular frameworks for building web applications, and the effects of this vulnerability are widespread. A pat...

Read More

Maturity models in cyber security: what MATURITY MODELS IN CYBER SECURITY: WHAT'S HAPPENING TO THE IAMM?

blog article

Mar 08, 2018

Most generally, a maturity model is a tool for assessing an organisation's effectiveness at achieving a particular goal. They enable organisations to identify where their practices are weak or not taken seriously and where their practices are truly embedded. In the context of cyber security, mat...

Read More

HOW QUICKLY WILL YOU RECOVER FROM A CYBER ATTACK? HOW QUICKLY WILL YOU RECOVER FROM A CYBER ATTACK?

blog article

Mar 07, 2018

Protecting your business emails is about more than just filtering out spam, malware, and business e-mail compromise emails. In the context of migrating to Microsoft Office 365 and other cloud-based systems, email becomes an even more critical lifeline for the business – and a broader cyber res...

Read More

Morphisec Uncovers New Attack Vector Named CIGslip That Bypasses Microsoft Code Integrity Guard (CIG) MORPHISEC UNCOVERS NEW ATTACK VECTOR NAMED CIGSLIP THAT BYPASSES MICROSOFT CODE INTEGRITY GUARD (CIG)

blog article

Mar 07, 2018

Morphisec researchers Michael Gorelik and Andrey Diment have discovered CIGslip, a new method which can be exploited by attackers to bypass Microsoft’s Code Integrity Guard (CIG) and load malicious libraries into protected processes such as Microsoft Edge. The new attack vector manipulates the...

Read More

The Trends Are In: Cisco’s 2018 Cybersecurity Report THE TRENDS ARE IN: CISCO’S 2018 CYBERSECURITY REPORT

blog article

Mar 07, 2018

Recently, Cisco published the 2018 Annual Cybersecurity Report providing analysis and insights on the latest security trends and threats across the industry. John N. Stewart, Cisco’s Senior Vice President, Chief Security and Trust Officer captured the highlights in his latest blog, but I wante...

Read More

2018 Critical Infrastructure Risk Assessment 2018 CRITICAL INFRASTRUCTURE RISK ASSESSMENT

whitepaper

Mar 06, 2018

By 2021, cybercrime damage is estimated to hit $6 trillion annually. To put that in perspective, that’s almost 10 percent of the world economy. Parsons began this effort to explore the state of cybersecurity risk in critical infrastructure facilities with a simple question. The cyber threat ha...

Read More

AppSec Buyers’ Insights: Binary vs. Source Code Scanning APPSEC BUYERS’ INSIGHTS: BINARY VS. SOURCE CODE SCANNING

blog article

Mar 06, 2018

The discussion surrounding which is superior – binary or source code scanning – has plagued the static analysis market since its inception. A source code scanner analyzes un-compiled code, whereas a binary scanner analyzes compiled code, but in the end, the result is the same. They are s...

Read More

2018 SonicWall Cyber Threat Report: Actionable Intelligence for the Cyber Arms Race 2018 SONICWALL CYBER THREAT REPORT: ACTIONABLE INTELLIGENCE FOR THE CYBER ARMS RACE

blog article

Mar 06, 2018

Make no mistake, we are in a global cyber arms race. But it can’t be won alone: we are in this together. That is why SonicWall is passing along findings, intelligence, analysis and research from our SonicWall Capture Labs to you today in our 2018 SonicWall Cyber Threat Report. By sharing actio...

Read More

3 STRATEGIES FOR WHEN MANAGEMENT DOESN’T GET THE IMPORTANCE OF INFORMATION SECURITY 3 STRATEGIES FOR WHEN MANAGEMENT DOESN’T GET THE IMPORTANCE OF INFORMATION SECURITY

blog article

Mar 05, 2018

The information security industry is broken. We talk about it all the time. There are things that happen constantly in our industry that put data (and people) at risk.  One of those things is management groups who don’t fully understand the importance of information security as a business...

Read More

An Introduction to Information Security AN INTRODUCTION TO INFORMATION SECURITY

whitepaper

Mar 05, 2018

As trends such as machine-to-machine connectivity, smart devices, social networks, and migrating to the cloud progress, there is a growing concern around the compromise of privacy and data security. Even government and commercial organizations are threatened by sophisticated intrusion tactics. There...

Read More

EIM Must Haves for INFORMATION SECURITY & PRIVACY EIM MUST HAVES FOR INFORMATION SECURITY & PRIVACY

infographic

Mar 05, 2018

The first step in safeguarding your sensitive data is knowing where it resides and classifying it accordingly. At the heart of EIM, is a central secure repository for unstructured information. Here, content can have security classifications applied, such as Top Secret, Secret, Confidential, and Publ...

Read More

CRYPTOMINING GOLD RUSH ONE GANG RAKES IN $7M OVER 6 MONTHS CRYPTOMINING GOLD RUSH ONE GANG RAKES IN $7M OVER 6 MONTHS

blog article

Mar 05, 2018

The bloom is on the criminal cryptomining of computer resources and the reason is obvious – it’s lucrative. One cryptomining gang tracked by researchers over the past six months minted $7 million with the help of 10,000 computers infected with mining malware. The rise of malicious crypto...

Read More

Six strategies for a nextgeneration education network SIX STRATEGIES FOR A NEXTGENERATION EDUCATION NETWORK

infographic

Mar 04, 2018

Change is a constant feature of the education environment with an impact on digital delivery and network needs. The challenge for education and IT leaders is choosing a next-generation network which can cope with future events and requirements. Network options include Dedicated and Switched Ethernet...

Read More

Cyber Security Small Charity Guide CYBER SECURITY SMALL CHARITY GUIDE

whitepaper

Mar 02, 2018

Think about how much you rely on your charity’s critical data, supporter details, information on beneficiaries, volunteer data, governing documents, as well as invoices and payment details. Now imagine how long you would be able to operate without them. All charities, regardless of nature and ...

Read More

NEBULA AI (NBAI) — DECENTRALIZED AI BLOCKCHAIN WHITEPAPER NEBULA AI (NBAI) — DECENTRALIZED AI BLOCKCHAIN WHITEPAPER

whitepaper

Mar 02, 2018

The blockchain technology provides a digital trust mechanism for human beings which enhances the efficiency of value exchange and reduces costs, the genuinely credible and efficient Internet of Value is approaching. In recent years, many breakthroughs have been made in the field of artificial intell...

Read More

Cybersecurity Awareness CYBERSECURITY AWARENESS

infographic

Mar 02, 2018

Worldwide, cyber attacks cost businesses as much as $400 billion a year. Cost of cybercrime in the U.S. was approximately $100 billion in 2015. Personal and professional digitisation will increase the cost of data breaches to $2.1 trillion globally by 2019 therefore, 4x the estimated cost of breache...

Read More

Web-based attacks still reign supreme according to the EU Cybersecurity Agency WEB-BASED ATTACKS STILL REIGN SUPREME ACCORDING TO THE EU CYBERSECURITY AGENCY

blog article

Mar 02, 2018

Web-based attacks and malware do not just hold the cybercrime crown, but they’re on the rise — that’s according to the latest Threat Landscape Report by the EU Agency for Network and Information Security (ENISA). In its sixth annual report, ENISA also reported that in 2017 attacker...

Read More

Breach Costs Equifax $275 Million Dollars BREACH COSTS EQUIFAX $275 MILLION DOLLARS

blog article

Mar 02, 2018

March 2, 2018 — Equifax Inc said today that it expects $275 million in costs in 2018 related to the credit reporting company’s massive data breach last year, offset by $75 million in insurance proceeds. The costs mainly reflect technology and data security upgrades, legal fees, and the o...

Read More

The Evolving Cyber Threat to the Banking community THE EVOLVING CYBER THREAT TO THE BANKING COMMUNITY

video

Mar 01, 2018

The third of four short videos provides an insight into the evolving sophistication of attack techniques, as highlighted by the repport's case study. Expert report showcases insights learnt from forensic studies of cyber-attacks on customers around the world, illustrating the sophistication of a...

Read More

TAYLOR CRYPTO TRADING FOR EVERYONE TAYLOR CRYPTO TRADING FOR EVERYONE

whitepaper

Mar 01, 2018

Taylor is an easy-to-use trading assistant service and mobile app that helps people make quick trades and earn small profits many times a day. The service works by signaling good entry points and allowing them to buy and sell almost instantly on popular exchanges, such as Poloniex and Bittrex. The e...

Read More

Automotive Cyber Security – Safety in a 5G World AUTOMOTIVE CYBER SECURITY – SAFETY IN A 5G WORLD

whitepaper

Feb 28, 2018

Automotive Cyber Security – Safety in a 5G World. What I want you to get from this presentation. The reality of your profession. Employ more white-hats into your entire product lifecycle. Think like “Steve”. Our dependence on connected technology is growing faster than our ability ...

Read More

U.S. cybersecurity threat risk remains high -- no signs of lessening U.S. CYBERSECURITY THREAT RISK REMAINS HIGH -- NO SIGNS OF LESSENING

blog article

Feb 27, 2018

The United States’ cybersecurity in both the public and private sectors is at continual risk, according to Director of National Intelligence (DNI) Daniel R. Coats. And the country should expect attacks from both nation state and non-state actors. Furthermore, the “potential for surprise&...

Read More

32 Cybersecurity Experts Predict Threats and Trends for 2018 32 CYBERSECURITY EXPERTS PREDICT THREATS AND TRENDS FOR 2018

blog article

Feb 26, 2018

Cybersecurity continues to be a hot topic in both media and business. The reasons are evident – the last two years saw consistent growth in cyber breaches with 2017 hitting a new record high. Namely, the recent 2017 Annual Data Breach Year-End Review by Identity Theft Resource Center revealed ...

Read More

7 THINGS UEBA DETECTS 7 THINGS UEBA DETECTS

infographic

Feb 26, 2018

Bad guys, outsiders and insiders alike, know that traditional security tools work on basic thresholds and understand repetitive attempts to steal sensitive data raises red flags. They keep their activity slow enough with low volume, exfiltrating small amounts of data over time, to stay under the rad...

Read More

Fog vs Edge Computing FOG VS EDGE COMPUTING

whitepaper

Feb 25, 2018

Can Fog Controllers and Edge Controllers replace hardware PLCs? Fog and Edge Computing – are not the same. Relating to Industry 4.0 and the Internet of Things, Fog and Edge computing are often considered as a proven technical concept for providing control functions and transferring data from s...

Read More

INSIDER THREAT BEST PRACTICES GUIDE, 2ND EDITION FEBRUARY 2018 INSIDER THREAT BEST PRACTICES GUIDE, 2ND EDITION FEBRUARY 2018

whitepaper

Feb 21, 2018

Financial institutions have long been especially lucrative targets for insider attacks, but with the computerization of firm systems and assets, attacks can now be launched on a grander scale than ever before. Insider attacks on firms’ electronic systems can result in financial and intellectua...

Read More

My Cybersecurity Predictions for 2018 MY CYBERSECURITY PREDICTIONS FOR 2018

blog article

Feb 21, 2018

As BlackBerry’s Chief Security Officer, I regularly speak with Fortune 500 C-Suites and leaders representing the world’s top global brands, listening and learning about what security concerns keep them up at night. I also try to spend just as much time speaking with security researchers ...

Read More

CLOSING THE 1% GAP THAT’S COSTING YOU MILLIONS CLOSING THE 1% GAP THAT’S COSTING YOU MILLIONS

whitepaper

Feb 16, 2018

Worldwide enterprise security spending is expected to reach $96.3 billion in 2018, an increase of 8 percent from 20171 . Organizations are spending more on security than ever before, but the number and severity of cyber attacks is on the rise, resulting in hundreds of millions of dollars in losses f...

Read More

THE STATISTICAL ANALYSIS OF 126,000 PHISHING SIMULATIONS CARRIED OUT IN 128 COMPANIES AROUND THE WORLD 1 THE STATISTICAL ANALYSIS OF 126,000 PHISHING SIMULATIONS CARRIED OUT IN 128 COMPANIES AROUND THE WORLD 1

whitepaper

Feb 14, 2018

Over 91% of system breaches have been caused by a phishing attack. Today, phishing attacks continue to be one of the most successful attack types initiated by email. This is especially true for spear phishing, an attack schemed against a certain individual, which has been popular in manipulating hig...

Read More

Cryptocurrency Gold Rush on the Dark Web CRYPTOCURRENCY GOLD RUSH ON THE DARK WEB

whitepaper

Feb 14, 2018

Cryptocurrencies. A decade ago, names such as Bitcoin, Dash, Etherem, and Monero were merely buzzwords. Fast forward to today, and they’ve become as recognizable as the U.S. dollar and the Euro. In many realms, these digital currencies are ushering in a new era of investing – a modern go...

Read More

The Cost of Malicious Cyber Activity to the U.S. Economy THE COST OF MALICIOUS CYBER ACTIVITY TO THE U.S. ECONOMY

whitepaper

Feb 13, 2018

This report examines the substantial economic costs that malicious cyber activity imposes on the U.S. economy. Cyber threats are ever-evolving and may come from sophisticated adversaries. Due to common vulnerabilities, instances of security breaches occur across firms and in patterns that are diffic...

Read More

Cyber security Why the Manufacturing and Retail sectors must rise to the cyber security challenge CYBER SECURITY WHY THE MANUFACTURING AND RETAIL SECTORS MUST RISE TO THE CYBER SECURITY CHALLENGE

whitepaper

Feb 13, 2018

The world has unquestionably changed in the last 10 years and it begs the question “where will we be in 10 years time?” Smart cities, driverless cars, increased drone usage and AI will all have a bearing on how we live our lives and run our businesses. With the advent of smart phones and...

Read More

Wireless Security: Why You Need to Take It Seriously In 2018 WIRELESS SECURITY: WHY YOU NEED TO TAKE IT SERIOUSLY IN 2018

blog article

Feb 13, 2018

When waves of cyber attacks hit last year, such as WannaCry and Not Petya ransomwares, businesses lost billions of dollars in high-profile breaches. In addition, more than half of the U.S. population’s Social Security information was compromised in the Equifax breach. It was a record-breaking ...

Read More

Cyber Security Trends 2018 CYBER SECURITY TRENDS 2018

blog article

Feb 13, 2018

With 2017 remembered for massive data breaches, ransomware attacks and new-found vulnerabilities, we’ve asked Tim Erridge, Director of Advisory at Context, to look at what’s in store for the months ahead. With both the GDPR and the NIS Directive coming into effect in 2018, organizations ...

Read More

Cybersecurity Now a Priority in Fed Government’s Modernization Initiative CYBERSECURITY NOW A PRIORITY IN FED GOVERNMENT’S MODERNIZATION INITIATIVE

blog article

Feb 13, 2018

As the security needs of federal agencies change, the government’s modernization efforts will also require them to change how they think about cybersecurity. The federal government dedicates roughly 80 percent of its entire information technology (IT) budget to maintaining existing legacy syst...

Read More

GDPR The EU General Data Protection Regulation GDPR THE EU GENERAL DATA PROTECTION REGULATION

whitepaper

Feb 12, 2018

The General Data Protection Regulation (GDPR) is the European Union’s new legislation to protect the personal data of its citizens. Organisations have been given a two-year lead-in period to become compliant, and this ends on 25th May 2018. The directive was approved by the EU Parliament on 14...

Read More

Doculabs InfoSec in Pharma DOCULABS INFOSEC IN PHARMA

video

Feb 09, 2018

Doculabs Videolabs. Doculabs’ Joe Shepley outlines the three reasons why information security is of critical importance to organizations in the pharmaceutical industry.

Read More

What’s shaping cybersecurity in 2018? WHAT’S SHAPING CYBERSECURITY IN 2018?

blog article

Feb 09, 2018

This year Cisco hosted the first CISO Experience at Cisco Live Barcelona, on 29 and 30 January. The event attracted over 60 Chief Information Security Officers (CISOs) and other senior security leaders, who discussed the topics that are shaping cybersecurity in 2018. In this first blog of the CISO E...

Read More

Empowering the blockchain community™ EMPOWERING THE BLOCKCHAIN COMMUNITY™

whitepaper

Feb 07, 2018

The information set forth in this presentation (“White Paper”) is not exhaustive and does not constitute a contractual offer. The content is therefore not binding for persons intending to participate in the token generation event for the MOAT token as described in this White Paper. Contr...

Read More

Malicious Trends: Cryptojacking Could Surpass Ransomware as Primary Money Maker MALICIOUS TRENDS: CRYPTOJACKING COULD SURPASS RANSOMWARE AS PRIMARY MONEY MAKER

blog article

Feb 07, 2018

Cryptocurrencies are hot. According to https://coinmarketcap.com, there are now over 1300 cryptocurrencies with new initial coin offerings (ICOs) accelerating all the time. Even Kodak is getting into the act with KODAKcoin. And currently, the price trajectory of Bitcoin is higher than a North Korean...

Read More

EXABEAM 2018 CYBER SECURITY PROFESSIONALS SALARY AND JOB REPORT: EXABEAM 2018 CYBER SECURITY PROFESSIONALS SALARY AND JOB REPORT:

whitepaper

Feb 06, 2018

THE EXABEAM 2018 CYBER SECURITY PROFESSIONALS SALARY AND JOB REPORT is based on a global survey of 481 security professionals that was conducted in March 2018. The purpose of the survey was to gain insights into the trends with security professionals’ salaries (focusing on the median range of ...

Read More

What Is Cyber Resilience and Why Should I Care? Part 1 WHAT IS CYBER RESILIENCE AND WHY SHOULD I CARE? PART 1

blog article

Feb 06, 2018

I’ll be the first to admit it - there’s a lot of acronyms, buzzwords, and catchphrases in the cybersecurity industry today and it can be difficult to understand how a product reflects the core values that give these words life. Take cyber resilience, for example, it’s often thought...

Read More

Advanced Security in All Sorts of Places ADVANCED SECURITY IN ALL SORTS OF PLACES

blog article

Feb 06, 2018

There’s a growing trend spreading through many different organizations in which automated and advanced security features are being developed, capabilities which were previously in the realm of more traditional security vendors. There’s now more security in more places than ever before, w...

Read More

Missing in Action: Several Prominent Malware of 2017 MISSING IN ACTION: SEVERAL PROMINENT MALWARE OF 2017

blog article

Feb 06, 2018

Thus far in 2018, PhishMe Intelligence™ has observed a lull in multiple malware families that were prominent throughout 2017. There are several possible reasons for this hiatus. It is likely that some malware families have petered out and will not return in widespread campaigns. In sharp contr...

Read More

Security and the $150B industry no one is talking about SECURITY AND THE $150B INDUSTRY NO ONE IS TALKING ABOUT

blog article

Feb 05, 2018

Think 2018 is IBM’s flagship conference where thinkers like you come together to innovate and educate—making the world of business work smarter. Together we will explore the journey to cloud and AI, blockchain, security, and Infrastructure discovering partnerships that unlock business an...

Read More

7 Cyber Threat Intelligence Insights for a More What Is Cyber Threat Intelligence? Secure business 7 CYBER THREAT INTELLIGENCE INSIGHTS FOR A MORE WHAT IS CYBER THREAT INTELLIGENCE? SECURE BUSINESS

infographic

Feb 01, 2018

What Is Cyber Threat Intelligence? Secure business Cyber threat intelligence (CTI) involves the collection, evaluation, verification, and distribution of information about ongoing and emerging cyber threats and attacks against network assets and infrastructure. #1 barrier to e¬ffective threat in...

Read More

RSA SECURITY SURVEY RSA SECURITY SURVEY

infographic

Feb 01, 2018

The annual RSA Conference in San Francisco, CA is a gathering of many of the best minds in security, collectively responsible for protecting nearly every major enterprise. What better group could there be to ask about security issues and concerns? We surveyed 208 random attendees on three topics: Cr...

Read More

INFORMATION SECURITY NEWS ROUNDUP: JANUARY 2018 INFORMATION SECURITY NEWS ROUNDUP: JANUARY 2018

blog article

Feb 01, 2018

A new year means new developments in the world of information security news. We’ve already started to see some of Evan’s 2018 Information Security Predictions come true. The NSA is dealing with a shrinking talent pool as many employees jump to the private sector. Ransomware was one of th...

Read More

Cryptocurrency scams on Android CRYPTOCURRENCY SCAMS ON ANDROID

whitepaper

Feb 01, 2018

In 2017, cryptocurrencies became a booming industry, attracting the attention of not only new users, but also cybercriminals. As the fraudsters came rushing to the newly crowded cryptocurrency space, users, businesses, and exchanges have found themselves the target of various fraud schemes – f...

Read More

SUCCESS STORY: FLOWMON HELPS MSP TO DEAL WITH DDOS ATTACKS SUCCESS STORY: FLOWMON HELPS MSP TO DEAL WITH DDOS ATTACKS

blog article

Feb 01, 2018

Aspire, award-winning managed services company specialising in hosted services and data centre solutions started to become the victim of several large volumetric style DDoS attacks, aimed at both its network and the networks of its customers. Dealing with these attacks was a manual and time consumin...

Read More

Security at the Speed of Your Network SECURITY AT THE SPEED OF YOUR NETWORK

whitepaper

Jan 31, 2018

As the volume and speed of network data increases, security tools are unable to keep up, resulting in security tool sprawl, performance degradation, inefficiencies and unnecessary expenditures. All of this leads to increased time to threat detection and response and a higher risk of a breach –...

Read More

2018 Industry Analyst Cybersecurity Predictions 2018 INDUSTRY ANALYST CYBERSECURITY PREDICTIONS

blog article

Jan 31, 2018

Key insights from top industry analysts to help demystify the cybersecurity landscape and reinforce critical areas of focus for organizations worldwide. Security services, IoT, integrated platforms, GDPR, skills shortage, detection and response, machine learning, automation and orchestration are jus...

Read More

The Rise of IoT Botnet Threats and DDoS attacks THE RISE OF IOT BOTNET THREATS AND DDOS ATTACKS

blog article

Jan 30, 2018

Earlier this month, a report by Neustar International Security Council (NISC) revealed that many businesses viewed unsecured IoT devices as their biggest concern about the state of their organisation’s security. While ransomware and financial data theft were still viewed as among the top threa...

Read More

Five cybersecurity threats to keep on your radar in 2018 FIVE CYBERSECURITY THREATS TO KEEP ON YOUR RADAR IN 2018

blog article

Jan 29, 2018

Criminal hackers are finding increasingly sophisticated ways to infiltrate cyber targets. In 2018, organizations can expect even more menacing, intense cyber attacks as threat actors seek new ways to target victims. Here are five cybersecurity threats to look out for. The IoT is becoming more widesp...

Read More

SECURITY TRENDS 2018: THE TOP CYBERSECURITY COMPANIES SECURITY TRENDS 2018: THE TOP CYBERSECURITY COMPANIES

blog article

Jan 29, 2018

What makes a cybersecurity company the best?” is not an easy question to answer. It’s tough to identify the top cybersecurity companies when they aren’t going around telling consumers how many infections they missed or advertising how many breaches they allowed. There are dozens of...

Read More

In the United States will Create a Government Agency for Cybersecurity IN THE UNITED STATES WILL CREATE A GOVERNMENT AGENCY FOR CYBERSECURITY

blog article

Jan 29, 2018

The US House of Representatives passed a bill to establish an agency for cybersecurity and infrastructure security. The project was developed within 5 months and was supported by the majority of members of the House of Representatives. The creation of a new agency involves the reorganization of a nu...

Read More

List of data breaches and cyber attacks in January 2018 LIST OF DATA BREACHES AND CYBER ATTACKS IN JANUARY 2018

blog article

Jan 29, 2018

The first list of 2018 is by no means a short one. In fact, this is one of the longest lists that I’ve ever put together. Thankfully, the total number of leaked records is far lower than previous months. Yay? I count this month’s total to be 7,073,069. If I have missed anything, please d...

Read More

So you want to be an ethical hacker? 21 ways to get started SO YOU WANT TO BE AN ETHICAL HACKER? 21 WAYS TO GET STARTED

blog article

Jan 28, 2018

The cyber security job market is experiencing a major workforce shortage. Millions of positions will be unfilled in the next few years as companies try to shore up their defenses against threat actors in our connected world. If you’re technically inclined, and if you’re willing to work h...

Read More

Shining light into the Deep and Dark Web SHINING LIGHT INTO THE DEEP AND DARK WEB

infographic

Jan 26, 2018

The Deep and Dark Web (DDW) can be scary. A place where criminals can interact and buy and sell identities, passwords, source codes, malware, and even weapons, the DDW can pose serious risks for financial institutions. By gathering intelligence from the DDW, companies can pro-actively identify risks...

Read More

THREAT LANDSCAPE REPORT Q1 2018 THREAT LANDSCAPE REPORT Q1 2018

infographic

Jan 25, 2018

THREAT LANDSCAPE REPORT Q1 2018. THE ZERO-DAY MARKET CONTINUES TO MATURE. WHITE HAT MARKETS: PROGRAMS WITH THE GOAL OF FIXING VULNERABILITIES. BLACK HAT MARKETS: GIVE CYBER CRIMINALS AN EASY WAY TO LAUNCH ZERO-DAY ATTACKS. WHAT CAN YOU DO? GET EFFECTIVE ADVANCED THREAT PROTECTION (ATP) Sandboxing an...

Read More

KEEPING PACE AT SCALE KEEPING PACE AT SCALE

infographic

Jan 25, 2018

CLOUD AGILITY - WHICH ENABLES RAPID DEPLOYMENT OF CLOUD APPLICATIONS – IS CAUSING A “PACE GAP” BETWEEN HOW FAST BUSINESSES ARE SCALING UP IN THE CLOUD AND THEIR ABILITY TO KEEP UP WITH COMMENSURATE SECURITY MEASURES. 87% of surveyed companies say they have adopted a “cloud fi...

Read More

THE MAIN APPLICATION SECURITY TECHNOLOGIES TO ADOPT BY 2018 THE MAIN APPLICATION SECURITY TECHNOLOGIES TO ADOPT BY 2018

whitepaper

Jan 25, 2018

In this white paper, we will present relatively new and trending application security technologies which are important to implement in the next year in order to keep your application security posture up to date and resistant to modern threats. We will also discuss the benefits that you can expect fr...

Read More

DATA PRIVACY AND SECURITY TRENDS FOR 2018 DATA PRIVACY AND SECURITY TRENDS FOR 2018

whitepaper

Jan 25, 2018

Data breaches are at an all-time high, with new and evolving technologies being used to instigate as well as prevent cyberattacks. With companies, governments and citizens facing a growing risk of being hacked, data security demands both defensive and offensive strategic solutions. This paper explor...

Read More

New Malware and Mirai Botnet Variants Pose Significant Threats NEW MALWARE AND MIRAI BOTNET VARIANTS POSE SIGNIFICANT THREATS

blog article

Jan 25, 2018

There is no shortage of malware on the Dark Web. In particular, during the past week security researchers from various points around the world have been talking about three threats, two of which are variants of the now infamous Mirai botnet code.

Read More

Cyber Security and Privacy - Ambassador of USA Greg Delavi CYBER SECURITY AND PRIVACY - AMBASSADOR OF USA GREG DELAVI

video

Jan 24, 2018

It’s great to be here with you all today. The U.S. Embassy strongly supports Kosovo’s efforts to increase its cybersecurity capabilities, both in the public and private sectors.  I am glad to see so many other people here who share that commitment, especially the Prime Minister, the...

Read More

Small Businesses - Big Targets for Cyberattacks SMALL BUSINESSES - BIG TARGETS FOR CYBERATTACKS

blog article

Jan 24, 2018

Cybersecurity has become a complex undertaking, but too many small businesses have fallen so far behind the curve that a successful attack could seriously impact them. That level of cyber risk reflects the exposure of modern businesses to email security issues that still mean an entire company can b...

Read More

WHAT’S THE DIFFERENCE BETWEEN CYBERSECURITY AND CYBER RESILIENCE? WHAT’S THE DIFFERENCE BETWEEN CYBERSECURITY AND CYBER RESILIENCE?

blog article

Jan 23, 2018

While the term “cybersecurity” is as old as the hills in the security world, the term “cyber resilience” has been gaining momentum. This is a good thing. Cybersecurity management is complex and always changing, and focusing on security alone simply isn’t enough – ...

Read More

Information Security Advisory: 2018 InfoSec Predictions INFORMATION SECURITY ADVISORY: 2018 INFOSEC PREDICTIONS

blog article

Jan 22, 2018

2017 proved to be a challenging year on many fronts in the information security realm. The Equifax breach, WannaCry ransomware attacks, and Russian manipulation of social media were just some of the lowlights. How will 2018 pan out? Here are some thoughts from the Kroll Information Security team: Th...

Read More

DDoS Protection: a Big Need for Small Business DDOS PROTECTION: A BIG NEED FOR SMALL BUSINESS

blog article

Jan 22, 2018

Small businesses that are third party vendors to large businesses really have to step up their cyber security game to protect their networks, because large businesses are increasingly concerned about the quality of their network partners.

Read More

Just Keep Swimming: How to Avoid Phishing on Social Media JUST KEEP SWIMMING: HOW TO AVOID PHISHING ON SOCIAL MEDIA

blog article

Jan 22, 2018

Phishing attacks attempt to steal your most private information, posing major risks to your online safety. It’s more pressing than ever to have a trained eye to spot and avoid even the most cunning phishing attacks on social media.

Read More

Online Cybersecurity Advice for all digital citizens ONLINE CYBERSECURITY ADVICE FOR ALL DIGITAL CITIZENS

infographic

Jan 18, 2018

Lock down your login. Your usernames and passwords are not enough to protect key accounts like email, banking and social media. Strengthen online accounts and use strong authentication tools – like biometrics, security keys or a unique, one-time code through an app on your mobile device &ndash...

Read More

Attribution in cyberspace: Beyond the “whodunnit” ATTRIBUTION IN CYBERSPACE: BEYOND THE “WHODUNNIT”

whitepaper

Jan 17, 2018

“The UK government judges that the Russian government, specifically the Russian military, was responsible for the destructive NotPetya cyber-attack. We call upon Russia to be the responsible member of the international community it claims to be rather then secretly trying to undermine it&rdquo...

Read More

2018 Global Life Sciences Outlook Innovating life sciences in the fourth industrial revolution: Embrace, build, grow 2018 GLOBAL LIFE SCIENCES OUTLOOK INNOVATING LIFE SCIENCES IN THE FOURTH INDUSTRIAL REVOLUTION: EMBRACE, BUILD, GROW

infographic

Jan 17, 2018

2018 Global Life Sciences Outlook Innovating life sciences in the fourth industrial revolution: Embrace, build, grow. Global health care spending. Why. Aging and increasing populations. Emerging market expansion. Advances in medical treatments. Rising labor costs.

Read More

The Leader in Cybersecurity Education THE LEADER IN CYBERSECURITY EDUCATION

whitepaper

Jan 17, 2018

At EC-Council University, we have high aspirations for our students. They will be tomorrow’s technology leaders. We strive to prepare our graduates to embrace the challenging position of Cyber Security Specialists in International organizations worldwide. We consider this to be the school wher...

Read More

PREPARING FOR GDPR COMPLIANCE WITH ENDPOINT AND MOBILE PREPARING FOR GDPR COMPLIANCE WITH ENDPOINT AND MOBILE

infographic

Jan 17, 2018

Enforcement of the European Union (EU) General Data Protection Regulation (GDPR) applies to all global organisations processing personal data of EU data subjects. When it comes to your endpoint and mobile environment, are you confident that you can answer questions about:  Where data is stored....

Read More

Cybersecurity Trends: What to Expect in 2018 and Beyond CYBERSECURITY TRENDS: WHAT TO EXPECT IN 2018 AND BEYOND

blog article

Jan 17, 2018

The last year saw huge spikes in ransomware and threat actors have become even more proficient at lateral movement. Organizations aren't getting breached by advanced persistent threats specifically targeting them – at least for the most part. Opportunistic threat actors are taking advantag...

Read More

PROTECTING YOUR CAMPUS FROM CYBER THREATS PROTECTING YOUR CAMPUS FROM CYBER THREATS

infographic

Jan 16, 2018

5 STEPS TO MITIGATE THREATS. 1. Assess your security landscape. Regularly assess your vulnerabilities, deploy new solutions and use third-party security audits. 2. Train staff and students. Malware and ransomware often find their way to your network via phishing attacks. Ongoing training can help pr...

Read More

Collectrium Security White Paper COLLECTRIUM SECURITY WHITE PAPER

whitepaper

Jan 16, 2018

Thousands of collectors and art professionals trust Collectrium to store and share their collection management data and files simply and privately. This security white paper details the security infrastructure and configuration Collectrium uses to protect data and assets entered into the platform. T...

Read More

Public Safety & 9‐1‐1 Mobile Apps PUBLIC SAFETY & 9‐1‐1 MOBILE APPS

whitepaper

Jan 16, 2018

Mobile applications can potentially have access to a wealth of sensitive information about the user and or device. These findings can  range from applications integration with ad networks to proper handling of a user’s password. Each piece of information that is  accessed by the appl...

Read More

CYBERSECURITY THREATS TO THE OIL & GAS INDUSTRY CYBERSECURITY THREATS TO THE OIL & GAS INDUSTRY

whitepaper

Jan 16, 2018

Our increasing dependence on technology and web-based communication has opened the door for cybersecurity threat, particularly in the oil and gas industry. Petroleum companies face significant threats, such as hydrocarbon installation terrorism, which can cause plant shutdowns resulting from sabotag...

Read More

Mobile Security Threats of 2018 MOBILE SECURITY THREATS OF 2018

blog article

Jan 16, 2018

Mobile security is the topmost concern among the organizations today, thanks to mobility and BYOD (Bring Your Own Device). Most employees now routinely access corporate data from smartphones and tactfully keep sensitive information away from wrong hands. Now the truth is mobile malware are spreading...

Read More

PHISHING ATTACK PREVENTION: HOW TO IDENTIFY & AVOID PHISHING SCAMS PHISHING ATTACK PREVENTION: HOW TO IDENTIFY & AVOID PHISHING SCAMS

blog article

Jan 15, 2018

Phishing attacks are one of the most common security challenges that both individuals and companies face in keeping their information secure. Whether it's getting access to passwords, credit cards, or other sensitive information, hackers are using email, social media, phone calls, and any form o...

Read More

Are You Ready for the Evolution of Ransomware? ARE YOU READY FOR THE EVOLUTION OF RANSOMWARE?

blog article

Jan 15, 2018

With 2017 in the rearview mirror, we’re looking towards the changes a new year will bring. However, while the calendar may have changed, the threat of ransomware across industries and geographies has remained. And worse, it‘s looking like it’s about to evolve into an even greater p...

Read More

ARUBA SD-BRANCH OVERVIEW ARUBA SD-BRANCH OVERVIEW

whitepaper

Jan 13, 2018

Branch networks are changing rapidly. The most pressing challenges of today include an increasing number of mobile and IoT devices, growing bandwidth requirements of the business, and modern users who expect connectivity for work and personal use—all while the teams that run these distributed ...

Read More

Top 10 Cybersecurity Tips for Businesses in 2018 TOP 10 CYBERSECURITY TIPS FOR BUSINESSES IN 2018

blog article

Jan 12, 2018

While your people are without a doubt the power behind your business, they can also be a weakness when it comes to cybersecurity. Organizations must protect against all types of threats – internal and external – and, the first step to doing this is understanding the basics of cybersecuri...

Read More

Mobile Threat Landscape: What to expect in 2018 MOBILE THREAT LANDSCAPE: WHAT TO EXPECT IN 2018

blog article

Jan 12, 2018

Last year, we witnessed more mobile attacks and data breaches than ever before. Ransomwares (like WannaCry, NotPetya…) have often made the headlines as their attacks increased by 300% in the first quarter of 2017 (Panda Lab), and globally, the volume of unknown malwares has quadrupled year-ov...

Read More

Network security - the basics NETWORK SECURITY - THE BASICS

infographic

Jan 11, 2018

Effective cyber security starts with a secure network. Help make your network secure by developing and implementing some simple policies and responses. Control access Control who can access your network – and what they can do in it. Q. Do you know who is accessing your network? Q. Do you have ...

Read More

Implementing the NIST Cybersecurity Framework (CSF) IMPLEMENTING THE NIST CYBERSECURITY FRAMEWORK (CSF)

infographic

Jan 11, 2018

Implementing the NIST Cybersecurity Framework (CSF). CSF Goals. Describe current and target state Identify and prioritize opportunities for improvement. Assess progress and communicate across organization. Complement existing processes and programs. Cavirin automates the suggested NIST process.

Read More

PROTECT AND SECURE: GUARDING YOUR INFORMATION PROTECT AND SECURE: GUARDING YOUR INFORMATION

infographic

Jan 11, 2018

An AIIM and M-Files survey found that many organizations have serious gaps in their information security policies and practices, while others are taking proactive steps to mitigate the prevalence of data breaches. Of organizations have experienced one or more information security breaches within the...

Read More

Top Seven Cybersecurity Predictions for 2018 TOP SEVEN CYBERSECURITY PREDICTIONS FOR 2018

blog article

Jan 11, 2018

With a turbulent 2017 finally behind us, what’s the cybersecurity forecast for 2018? Some predictions need no crystal ball – the cyber labor shortage will continue, spending on security solutions will go up, the breaches that do occur will be bigger and messier.

Read More

2018 Security Threat Report 2018 SECURITY THREAT REPORT

infographic

Jan 10, 2018

Assessing Nine Years of Cyber Security Vulnerabilities and Exploits Disclosures of significant cyber security breaches have become routine as organizations increasingly rely on vulnerable digital technologies and third-party service providers. Protiviti’s 2018 Security Threat Report aims to he...

Read More

How to Play Your Role in Cybersecurity HOW TO PLAY YOUR ROLE IN CYBERSECURITY

whitepaper

Jan 10, 2018

For many agencies, cloud computing is a vital component of their IT strategy because it provides the flexibility and scalability government needs to meet modern technology demands. But while there are significant benefits of the cloud, agencies must be careful not to sacrifice security during cloud ...

Read More

TROUBLING TRENDS IN NETWORK SECURITY TROUBLING TRENDS IN NETWORK SECURITY

infographic

Jan 10, 2018

According to recent ESG research, the difficulty associated with network security Operations is on a negative trend. 85% of respondents feel NetSec is as hard or harder than it was 2 years ago and those indicating NetSec is getting easier are outnumbered by more than 3:1.

Read More

5 Cybersecurity Challenges and Trends: What to Expect in 2018 5 CYBERSECURITY CHALLENGES AND TRENDS: WHAT TO EXPECT IN 2018

blog article

Jan 10, 2018

Cybercriminals are going to create 3.5 million new, unfilled cybersecurity jobs by 2021. Compare that with one million openings in 2016. That’s an increase of 350 percent in just five years. And with that increase comes some serious cybersecurity revenue dedication. Everywhere, businesses are ...

Read More

Making Sense of Cybersecurity in 2018 MAKING SENSE OF CYBERSECURITY IN 2018

video

Jan 10, 2018

A variety of new threats and challenges will threaten organizations in 2018. In part two of their discussion, watch as RSA's Niloofar Howe and Zulfikar Ramzan offer their perspective on what's ahead in the New Year for cybersecurity.

Read More

Third Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way THIRD ANNUAL STUDY ON EXCHANGING CYBER THREAT INTELLIGENCE: THERE HAS TO BE A BETTER WAY

whitepaper

Jan 09, 2018

In a world of increasingly stealthy and sophisticated cyber criminals, it is difficult, costly and ineffective for companies to defend themselves against these threats alone. As revealed in The Third Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way, more companies a...

Read More

Cyber Security: A Perfect Storm CYBER SECURITY: A PERFECT STORM

infographic

Jan 09, 2018

As companies and industries increasingly rely on technology, security risks become greater. With growing numbers of Windows machines and increased scarcity of skilled technical resources, a “perfect storm” of cyber threats in production facilities is looming. The annual financial cost of...

Read More

A Parents A PARENTS' GUIDE TO CYBERSECURITY

whitepaper

Jan 09, 2018

Children and teens can be caught by the same kinds of security problems that affect adults (drive-by downloads, links to malicious sites, viruses and malware, etc.). But there are some special ways criminals get to kids, such as links to “fan sites” that contain malicious links or &ldquo...

Read More

APNIC eLearning: Network Security Fundamentals APNIC ELEARNING: NETWORK SECURITY FUNDAMENTALS

whitepaper

Jan 09, 2018

Confidentiality. prevents unauthorized use or disclosure of information. Integrity. safeguards the accuracy and completeness of information. Availability. authorized users have reliable and timely access to information. The Internet was initially designed for connectivity – Trust assumed &ndas...

Read More

IBM® Sterling B2B Integrator IBM® STERLING B2B INTEGRATOR

infographic

Jan 09, 2018

Now with more ways to tackle tough B2B integration challenges. Integrate complex multi-enterprise B2B processes to enable efficient, flexible and secure collaboration across a growing trading partner community. Get more from your base IBM Sterling B2B Integrator deployment by adding specialized capa...

Read More

8 Cyber Security Predictions for 2018 8 CYBER SECURITY PREDICTIONS FOR 2018

blog article

Jan 09, 2018

In preparation for the upcoming publication of the 2018 Annual SonicWall Threat Report, we’re busy reviewing and analyzing data trends identified by SonicWall Capture Labs over the course of 2017.
The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector th...

Read More

Find Out If Your Company is Vulnerable to a Cyber Security Threat FIND OUT IF YOUR COMPANY IS VULNERABLE TO A CYBER SECURITY THREAT

infographic

Jan 09, 2018

The last thing you want is for your company to appear in a headline about cyber security—because if your business is on the front page, chances are the news isn’t the best type of news. Online cyber security breaches and data compliance problems are happening every day around the world, ...

Read More

The Healthcare / Cyber-Security Connection THE HEALTHCARE / CYBER-SECURITY CONNECTION

blog article

Jan 09, 2018

One of the businesses in the spotlight lately when it comes to cyber-attacks is healthcare – in fact, 46% of healthcare organizations experienced a data breach. The data associated with this industry is extremely sensitive and highly regulated, and also actively sought by hackers.

Read More

2018 Cybersecurity Predictions 2018 CYBERSECURITY PREDICTIONS

whitepaper

Jan 08, 2018

Preparing security professionals and business leaders to shift their thinking and manage cyber as an enterprise risk in 2018. Since issuing our 2017 predictions, we’ve seen a dramatic rise in the sophistication, scale, and impact of cyber attacks. As companies strive to enrich their customer e...

Read More

Managing Cybersecurity Regulation Mayhem MANAGING CYBERSECURITY REGULATION MAYHEM

video

Jan 08, 2018

Watch as Peter Beardmore, Chairman, Security for Business Innovation Council, and Steve Schlarman, Director, Product Marketing, RSA Archer, discuss a new report from the Security for Business Innovation Council, "Managing Cybersecurity Regulation Mayhem," and what steps organizations can t...

Read More

Cybersecurity Compliance and Resilience CYBERSECURITY COMPLIANCE AND RESILIENCE

blog article

Jan 08, 2018

IT security professionals have to worry about defending against ever-evolving cyber threats and, increasingly, the C-suite has to worry about following cybersecurity laws. The year 2018 will be marked by increasing regulations, and discussions about regulations, that are intended to protect cyberspa...

Read More

VPNFilter Malware - Critical Update VPNFILTER MALWARE - CRITICAL UPDATE

blog article

Jan 06, 2018

VPNFilter, a new malware campaign first reported this past May 23rd, is part of a new line of emerging IoT threats that FortiGuard Labs has been tracking over the past few years. What makes this threat particularly dangerous is that it not only performs data exfiltration, but can also render devices...

Read More

How Government Agencies are Facing Cyber Security Challenges HOW GOVERNMENT AGENCIES ARE FACING CYBER SECURITY CHALLENGES

whitepaper

Jan 05, 2018

The United States Federal Government relies heavily on information technology to drive efficiencies and increase citizen engagement. However, an uptick in cyber attacks and data breaches that affect government operations has created a perfect storm of risks and challenges. Cyber threats continue to ...

Read More

Security Challenges: Integrating Apple Computers into Windows Environments SECURITY CHALLENGES: INTEGRATING APPLE COMPUTERS INTO WINDOWS ENVIRONMENTS

whitepaper

Jan 04, 2018

Security Challenges: Integrating Mac into Windows Environments Apple® Mac devices are growing in corporate popularity by the day. It’s up to IT departments to make sure that these devices utilize all resources in the environment, as well as ensure they’re visible and managed. This ca...

Read More

2018 Public Sector 2018Cyber Security Series 2018 PUBLIC SECTOR 2018CYBER SECURITY SERIES

whitepaper

Jan 04, 2018

While new technology has created an increasingly interconnected digital ecosystem, offering opportunities for innovation and productivity, the cyber sphere also presents new risks and challenges. Australia’s Cyber Security Strategy is in its second year and is driving change and pushing the pu...

Read More

NETWORK & IoT SECURITY IN 2018 NETWORK & IOT SECURITY IN 2018

infographic

Jan 04, 2018

NETWORK & IoT SECURITY IN 2018. Many enterprises have established IoT security policies but lack sufficient tools to enforce them. 92% of global technology security decision makers at firms with 1000+ employees have security policies in place for managing IoT devices. Only 47% say they have 10% ...

Read More

THE ROAD TO A SECURE MOBILE FIRST STRATEGY THE ROAD TO A SECURE MOBILE FIRST STRATEGY

infographic

Jan 03, 2018

QUICK & SECURE LOGIN. Deploy modern authentication options to support an optimal user login experience. PROVIDE A FRICTIONLESS EXPERIENCE. Provide the most frictionless user experience for your customers without compromising security. PROTECT MOBILE BANKING APPS. Attacks on mobile banking apps a...

Read More

A Roadmap for Implementing Cybersecurity Frameworks A ROADMAP FOR IMPLEMENTING CYBERSECURITY FRAMEWORKS

video

Jan 03, 2018

Jackie Groark, Director, Security/CISO speaks at Veristor's Cybersecurity Tech Summit. Safeguarding your IT assets has never been more challenging. From phishing scams to insider threats, it is a never-ending problem for enterprises to keep the right people in and the wrong people out. To better...

Read More

10 INFORMATION SECURITY PREDICTIONS FOR 2018 10 INFORMATION SECURITY PREDICTIONS FOR 2018

blog article

Jan 02, 2018

In 2017, the hacking group known as the Shadow Brokers made a name for themselves with their April release of (alleged) NSA tools (including EternalBlue).  Ransomware became even more mainstream, at least in the news, with the WannaCry outbreak in May.  Arguably the biggest news of the yea...

Read More

8 VISIONARY PREDICTIONS FOR INFORMATION SECURITY IN 2018 8 VISIONARY PREDICTIONS FOR INFORMATION SECURITY IN 2018

blog article

Jan 02, 2018

In 2017, the InfoSec community saw the continuance of several trends from 2016 as well as the emergence of some new and nasty surprises. File-less attacks continued to rise in popularity, ransomware attacks on healthcare organizations became more prevalent, spending on cyber insurance increased, and...

Read More

Different Types of Malware and How to Avoid Them DIFFERENT TYPES OF MALWARE AND HOW TO AVOID THEM

video

Jan 01, 2018

Keeping all the valuable data on your PC or smartphone secure, isn't as easy as it used to be. Hacks are happening at an increasing rate, and malware is everywhere. These are the types of Malware and how to avoid them.

Read More

Cyber Security Trends: What to Watch for in 2018 CYBER SECURITY TRENDS: WHAT TO WATCH FOR IN 2018

blog article

Dec 27, 2017

As we wrap up another calendar year, we can’t help but think about the near future and what it holds in store for the cyber security -  and Distributed Denial of Service (DDoS) as a growing issue.  Based on Corero’s visibility into environments dealing with DDoS, we’ve su...

Read More

As risk management matures, cybersecurity gaps still loom AS RISK MANAGEMENT MATURES, CYBERSECURITY GAPS STILL LOOM

infographic

Dec 20, 2017

Healthcare’s approach to cybersecurity is maturing, but not quickly enough. The third annual HIMSS Analytics IT Security and Risk Management Study1 showed improvements in risk management. However, there are still gaps with addressing increasing security threats and evolving concerns around the...

Read More

Partial Security Isn PARTIAL SECURITY ISN'T SECURITY: HOW PROOFPOINT SOLVES YOUR ENTIRE EMAIL SECURITY PROBLEM

infographic

Dec 20, 2017

Ransomware, email fraud, and email downtime threaten your business—and your bottom line. Your current tools might help with some aspects of email security or stop some attacks. But you need to solve your entire email threat problem, not just parts of it..

Read More

Public Wi-Fi Attacks - Starbucks PUBLIC WI-FI ATTACKS - STARBUCKS

blog article

Dec 19, 2017

One of the dangers when working while on the road is using public Wi-Fi access points, such as the ones you find in your hotel, airport or local cafe. Public Wi-Fi is incredibly convenient, but does come with its own unique risks. While such attacks are not as common as many other attacks, they do h...

Read More

The Logicalis Approach Against Ransowmare THE LOGICALIS APPROACH AGAINST RANSOWMARE

infographic

Dec 18, 2017

How to Prevent Malware Threats Attacker sends e-mail with malicious software or link. Malicious Actors Cisco E-mail Security Cisco E-mail Security identifies suspicious e-mail and attachments and removes or quarantines them.

Read More

This Android CryptoMining Malware is Capable of Destroying Android Phones THIS ANDROID CRYPTOMINING MALWARE IS CAPABLE OF DESTROYING ANDROID PHONES

blog article

Dec 18, 2017

Cybersecurity researchers have discovered a “jack of all trades” cryptocurrency mining malware called Loapi that is capable of destroying phones from within in two days. A new strain of malware targeting Android phones, called Loapi, capable of triggering a number of malicious activities...

Read More

The Convergence of Security and Network Operations THE CONVERGENCE OF SECURITY AND NETWORK OPERATIONS

blog article

Dec 13, 2017

More complex business networks, including cloud services and infrastructure, mobile applications, virtual desktops, SDN/NFV, and IoT systems, are taxing both security and network operations teams. At the same time, increasingly sophisticated and persistent attacks are challenging traditional organiz...

Read More

10 Cybersecurity Predictions for 2018 10 CYBERSECURITY PREDICTIONS FOR 2018

blog article

Dec 12, 2017

It has been a turbulent year of devastating ransomware attacks (e.g. NotPetya) and gut-wrenching breaches (e.g. Equifax). Undoubtedly, the question on everyone’s mind is, “what’s in store for us in the New Year?” Webroot’s top 10 cybersecurity predictions for 2018 cover...

Read More

2018 Predictions for Cyber Security 2018 PREDICTIONS FOR CYBER SECURITY

blog article

Dec 11, 2017

With rapid digitization and the inter-networked world leading to a huge data explosion combined with the relentless growth of transformative technologies, the importance of cyber security – now and in the future – is unquestionable. Industry requires skilled cyber security professionals ...

Read More

3 Disruptive Trends Driving Demand for Automated Cyber Security for SMBs 3 DISRUPTIVE TRENDS DRIVING DEMAND FOR AUTOMATED CYBER SECURITY FOR SMBS

blog article

Dec 11, 2017

Organizations typically struggle to provide a holistic security posture. There are many security vendors providing exciting and innovative solutions. But from a customer perspective, they often become various point solutions solving several unique problems. This often becomes cumbersome, expensive a...

Read More

2018 Cyber Security Predictions 2018 CYBER SECURITY PREDICTIONS

infographic

Dec 11, 2017

The year 2017 is ending as a record year for data breaches. From the Equifax data breach to the Uber data scandal, there’s plenty of reading material on cyber and data security to keep you occupied. The year is ending, but it’s time to look to the new year. This forward-looking approach ...

Read More

Emerging Challenges in Cybersecurity: A Conversation with Former NATO Assistant Secretary General So EMERGING CHALLENGES IN CYBERSECURITY: A CONVERSATION WITH FORMER NATO ASSISTANT SECRETARY GENERAL SO

video

Dec 08, 2017

A wave of high-profile cyberattacks swept the world in 2017 targeting an array of important sectors. Ransomware crippled land and sea transportation and affected hospitals and ATMs. The breach of credit-reporting giant Equifax exposed the information of more than 140 million people, while the U.S. e...

Read More

Don’t Let Cybersecurity Threats Leave You Blindsided DON’T LET CYBERSECURITY THREATS LEAVE YOU BLINDSIDED

infographic

Dec 08, 2017

As this infographic from Proofpoint demonstrates, there’s a huge cybersecurity visibility gap—and you may not be seeing the biggest threats.

Read More

2018 Cyber Security Predictions 2018 CYBER SECURITY PREDICTIONS

blog article

Dec 07, 2017

As 2017 draws to a close, here is what you can expect over the course of the upcoming year This past year, cyber criminals caused major service disruptions around the world, using their increasing technical proficiency to break through cyber defenses. In 2018, we expect the trend to become more pron...

Read More

Your Cybersecurity is Made from Human Suffering YOUR CYBERSECURITY IS MADE FROM HUMAN SUFFERING

blog article

Dec 04, 2017

Welcome! You’re here because you know I say things that let you ridicule me to your coworkers or because you happen to have a morbid curiosity about human suffering. If it’s the second one, then please skip directly to the vile pictures at the end of the article to get your jollies. Now ...

Read More

Holiday Hackers Can Ruin Website Availability and Security for Retailers HOLIDAY HACKERS CAN RUIN WEBSITE AVAILABILITY AND SECURITY FOR RETAILERS

blog article

Dec 01, 2017

The few days after Thanksgiving in the U.S. are traditionally peak holiday shopping days for U.S. residents. They flood both physical and online stores to check off items on their holiday shopping lists, with hopes of scoring a few bargains. Almost everyone does some shopping online, according to th...

Read More

How to get started in Infosec HOW TO GET STARTED IN INFOSEC

video

Nov 29, 2017

What does it take to become a cyber security expert? Jim Holcomb, Associate Security Consultant at Evolve Security shares advice on what you can do to join the cyber security industry. Want to learn more about cyber security? Join Evolve Security Academy, an immersive and competitive Cyber Security ...

Read More

Why Most Cyber Security Training Fails and What We Can Do About it WHY MOST CYBER SECURITY TRAINING FAILS AND WHAT WE CAN DO ABOUT IT

video

Nov 29, 2017

To date, the only pro-active, user-focused solution against spear phishing has been cyber security awareness training. However, multiple lines of evidence—from continuing news stories of bigger and bolder breaches to objective academic assessments of training effects—point to its limited...

Read More

Cybersecurity: Fighting a Threat That Causes $450B of Damage Each Year CYBERSECURITY: FIGHTING A THREAT THAT CAUSES $450B OF DAMAGE EACH YEAR

infographic

Nov 28, 2017

With recent high profile hacks of companies such as Uber, Equifax, and HBO, it’s safe to say that cybersecurity is already top of mind for many of the world’s biggest companies. However, as billions of more devices get connected to the internet every year – including many that are ...

Read More

CrowdStrike CTO and Co-founder Dmitri Alperovitch on Today CROWDSTRIKE CTO AND CO-FOUNDER DMITRI ALPEROVITCH ON TODAY'S NEED FOR INFOSEC PROS

video

Nov 27, 2017

Cybersecurity leader Dmitri Alperovitch, CrowdStrike CTO and Co-founder, discuss the importance of infosecurity as a profession, including the best career advice he ever got, why you should treat your job as a mission in life, and where to find the best new opportunities in the cybersecurity field.

Read More

DDoS Time to Mitigation DDOS TIME TO MITIGATION

video

Nov 27, 2017

Distributed Denial of Service (DDoS) attacks can impact customers, result in major financial losses, and cripple operations of any size. Service providers, hosting providers and digital enterprises are all impacted by DDoS attacks.

Read More

2018 Threats Predictions 2018 THREATS PREDICTIONS

infographic

Nov 22, 2017

2018 Threats Predictions. Machine learning. The development of machine learning to protect organizations will fuel an arms race between defenders and attackers. Cybercriminals Cybercriminals will also employ machine learning to support their attacks. Detects and corrects Machine learning detects and...

Read More

Catch the Latest Malware with Capture Advanced Threat Protection CATCH THE LATEST MALWARE WITH CAPTURE ADVANCED THREAT PROTECTION

blog article

Nov 22, 2017

Now that Halloween is over and your coworkers are bringing in the extra candy they don’t want, let’s look back at the last quarter’s results from SonicWall Capture Advanced Threat Protection (ATP) network sandbox service. Grab the candy corn and let’s crunch some data. Note: ...

Read More

CYBER SECURITY FOR HIGHER EDUCATION: WHAT COLLEGES & UNIVERSITIES NEED TO KNOW CYBER SECURITY FOR HIGHER EDUCATION: WHAT COLLEGES & UNIVERSITIES NEED TO KNOW

blog article

Nov 21, 2017

Institutions of higher learning don’t just disseminate knowledge, they store it. Extensive data repositories hold proprietary information about vital scientific and academic research (some of it under contract to businesses and government). And then there’s the billions of pieces of pers...

Read More

2018 predictions - Cyber Security 2018 PREDICTIONS - CYBER SECURITY

video

Nov 19, 2017

George Gerchow is making bold predictions for 2018 cyber security. Hit or miss? Time will show. This is an exciting time to be in enterprise software. With the rise of serverless, the power of hybrid computing and the endless uses of artificial intelligence (AI), 2017 will likely go down as the most...

Read More

New Research: Mobile Malware Hits Every Business NEW RESEARCH: MOBILE MALWARE HITS EVERY BUSINESS

blog article

Nov 17, 2017

Every business has experienced at least one mobile cyberattack in the past year, according to a new study published today by Check Point mobile threat researchers. The report, entitled Mobile Cyberattacks Impact Every Business, is the first study to document the volume and impact of mobile attacks a...

Read More

Banking Malware Spin-Off Targets Twitter, Facebook Accounts BANKING MALWARE SPIN-OFF TARGETS TWITTER, FACEBOOK ACCOUNTS

blog article

Nov 17, 2017

First reported by ZDNet, the Zeus offshoot has been repurposed with “new espionage capabilities” to both monitor and modify Facebook and Twitter posts, as well as gain the ability to eavesdrop on emails.

Read More

FIND YOUR WEAKEST LINK TO PROTECT AGAINST MALWARE FIND YOUR WEAKEST LINK TO PROTECT AGAINST MALWARE

blog article

Nov 16, 2017

According to Verizon’s Data Breach Investigation Report for 2017, two-thirds of cybersecurity breaches are caused by malware installed by malicious email attachments, and 43 percent of those attacks hap