RESOURCES


home.aspx
   
What is Bagle Worm? WHAT IS BAGLE WORM?

blog article

Dec 10, 2018

Bagle Worm: Definition. Bagle, also referred to as Beagle, is a mass-mailing computer worm that has affected Microsoft Windows. Bagle refers to a large family of email worms available with many variations. Beagle is notable for the fact that different variants came in password-protected .zip files, ...

Read More

Achieve Security Through Compliance in the Cloud ACHIEVE SECURITY THROUGH COMPLIANCE IN THE CLOUD

blog article

Dec 10, 2018

Digging through my cupboards recently, I came across my old collection of 3½ floppy disks. It’s been quite some time since I’ve had a need to plug in my trusty USB floppy drive, so upon making this great archaeology discovery, I was left simply to ponder about their content and wh...

Read More

Artificial Intelligence and Cybersecurity: Attacking and Defending ARTIFICIAL INTELLIGENCE AND CYBERSECURITY: ATTACKING AND DEFENDING

blog article

Dec 10, 2018

Cybersecurity is a manpower constrained market – therefore, the opportunities for artificial intelligence (AI) automation are vast. Frequently, AI is used to make certain defensive aspects of cyber security more wide reaching and effective. Combating spam and detecting malware are prime exampl...

Read More

Cybersecurity for mission- critical communications CYBERSECURITY FOR MISSION- CRITICAL COMMUNICATIONS

whitepaper

Dec 10, 2018

While most cyber-attacks aim to achieve financial gain, the consequences of a successful attack on a mission-critical communications network can be far more damaging, even life threatening. New, advanced services are being enabled by IP-based broadband networks and made available to public safety an...

Read More

Adopting SDN for Microgrid Communications ADOPTING SDN FOR MICROGRID COMMUNICATIONS

whitepaper

Dec 10, 2018

As power utilities strive to improve the reliability of electricity delivery and become eco-sustainable, microgrids are gaining in popularity. However, there are challenges in extending network connectivity to microgrids.This paper explains how software-defined networking (SDN) provides unique advan...

Read More

CYBERSECURITY STRATEGY REPORT CYBERSECURITY STRATEGY REPORT

whitepaper

Dec 07, 2018

The Subcommittee’s Cybersecurity Concepts and Priorities. In today’s connected world, where nearly all devices—from the phones in our pockets, to the refrigerators in our kitchens, to the multi-million-dollar equipment that runs our electric grid— are linked together through ...

Read More

Don’t Get Phished – 7 Tips to Avoid This Common Cyber Attack DON’T GET PHISHED – 7 TIPS TO AVOID THIS COMMON CYBER ATTACK

blog article

Dec 06, 2018

Phishing is the most common type of cyber-attack that impacts organizations both large and small. These attacks may take many forms, but they all share a common goal – getting you to share sensitive information such as login credentials, credit card information, or bank account details. Unfort...

Read More

What is Cerber Ransomware and How to Remove It? WHAT IS CERBER RANSOMWARE AND HOW TO REMOVE IT?

blog article

Dec 06, 2018

What is Cerber Ransomware? Cerber ransomware is a type of malware that is considered to be the most active one and it executes its attack by infecting a user’s files. In return for the files, the victim is asked to pay the ransom. Ransom. Cerber is a ransomware application that makes use of a ...

Read More

What Cyberstalking Is and How to Prevent It WHAT CYBERSTALKING IS AND HOW TO PREVENT IT

blog article

Dec 05, 2018

When carried out sensibly and securely, communication through social networks and other online public forums can be beneficial, both socially and professionally. However, if you’re not careful, it can lead to numerous undesirable consequences, one of which is cyberstalking. Cyberstalking is st...

Read More

Why Layered Cybersecurity Matters WHY LAYERED CYBERSECURITY MATTERS

video

Dec 05, 2018

SonicWall President and CEO Bill Conner and CTO John Gmuender walk you through the current cyber threat landscape, explore the importance of automated real-time breach detection and prevention, and address how to mitigate today’s most modern cyberattacks. For more information please visit www....

Read More

NRCC Email Hack Highlights Lack of Visibility & Proactive Threat Hunting at Political Organizations NRCC EMAIL HACK HIGHLIGHTS LACK OF VISIBILITY & PROACTIVE THREAT HUNTING AT POLITICAL ORGANIZATIONS

blog article

Dec 05, 2018

Earlier this week, Politico reported that the National Republican Congressional Committee (NRCC) suffered a major attack prior to the 2018 U.S. midterm elections, with thousands of sensitive emails from four senior aides exposed to an outside intruder. While the impact of this breach is still unfold...

Read More

What is Email Virus and How to Avoid Them? WHAT IS EMAIL VIRUS AND HOW TO AVOID THEM?

blog article

Dec 05, 2018

In general, a computer virus or worm is a self-replicating program capable of being spread by emails or by inserting copies of itself into other documents or programs. Viruses that spread via email are capable of knocking out systems burdened by the huge amounts of generated emails, thus causing sev...

Read More

AppSec Is Dead, but Software Security Is Alive & Well APPSEC IS DEAD, BUT SOFTWARE SECURITY IS ALIVE & WELL

blog article

Dec 04, 2018

Mobile, cloud, the Internet of Things (IoT), microservices, and artificial intelligence have made software more complex. However, for most organizations the emphasis remains on speed over security, rather than building security into the DevOps process. Traditional security approaches have slowed the...

Read More

6 Security Tips to Consider While You Travel 6 SECURITY TIPS TO CONSIDER WHILE YOU TRAVEL

blog article

Dec 04, 2018

Following the “8 Ways to Avoid the Cybersecurity Grinch” blog post, it seems like a follow-up is in order given the recent Marriott Breach disclosure.  It is important to note that when we travel, similar to when we shop, we are putting our trust in the organizations we are dealing ...

Read More

CYBER SECURITY – GETTING THE ESSENTIALS IN PLACE CYBER SECURITY – GETTING THE ESSENTIALS IN PLACE

blog article

Dec 04, 2018

Cyber attacks are real. They’re complicated and they’re not going away. In part one of this blog series, we outlined the risks and consequences of cyber crime, and why cyber security is now a whole of business concern. In this post, we’ll delve into how to ensure you’re in th...

Read More

How to Fight Phishing Attacks: Real-World Examples and Solutions HOW TO FIGHT PHISHING ATTACKS: REAL-WORLD EXAMPLES AND SOLUTIONS

blog article

Dec 04, 2018

At Proofpoint, we have seen a rise in highly targeted phishing attacks. 30% of organizations whose O365 environments we've analyzed suffered compromised accounts, mostly via brute force attacks on their O365 credentials. Sometimes these phishing attacks lead to compromised accounts that attacker...

Read More

Cybersecurity in Europe is Improving: Thank You GDPR? CYBERSECURITY IN EUROPE IS IMPROVING: THANK YOU GDPR?

blog article

Dec 04, 2018

After years of debate over whether to impose new cybersecurity regulations on companies, General Data Protection Regulation (GDPR) laws went into effect in Europe in May 2018. Already we’ve seen several data breach victims ordered to pay fines under the new rules and cookie disclosure notices ...

Read More

THE DARK SIDE OF THE FORSSHE A landscape of OpenSSH backdoors THE DARK SIDE OF THE FORSSHE A LANDSCAPE OF OPENSSH BACKDOORS

whitepaper

Dec 04, 2018

A little more than three years ago we started hunting for OpenSSH backdoors being used in-the-wild. While we are always trying to improve defenses against Linux malware by discovering and analyzing examples, the scope of this hunt was specifically to catch server-side OpenSSH backdoors. Unfortunatel...

Read More

Proactive Cyber-security with HPE Gen 10 Servers PROACTIVE CYBER-SECURITY WITH HPE GEN 10 SERVERS

video

Dec 04, 2018

HPE Gen 10 includes the HPE Silicon Root of Trust, which provides a level of protection at the control plane via iLO 5. One of the key changes HPE made in their own manufacturing supply chain is to design their own silicon that contains a fingerprint in the silicon from the factory so that detecting...

Read More

2018 Sees API Breaches Surge With No Relief in Sight 2018 SEES API BREACHES SURGE WITH NO RELIEF IN SIGHT

blog article

Dec 04, 2018

Last year the OWASP Top 10 committee was prophetic in at least one of its inclusions in the update to its industry benchmark list. For the first time, the group included insecure APIs as one of the most common attack vectors that developers need to avoid adding to their code when creating software. ...

Read More

Dell detects data breach, informs customers after a month DELL DETECTS DATA BREACH, INFORMS CUSTOMERS AFTER A MONTH

blog article

Dec 04, 2018

It took Dell almost a full month to inform its customers that their information was stolen following a security incident which occurred on November 9, 2018, reads a notice on the computer company’s website. The company reset customer passwords without informing them early on that their data ma...

Read More

Fork Bomb Virus FORK BOMB VIRUS

blog article

Dec 04, 2018

Fork bomb is also called wabbit or rabbit virus that was crafted by malicious hackers to launch denial-of-service attack on the target system. The virus replicates itself and corrupts the available system resources. It slows down the performance of the system or sometimes can cause system crashes du...

Read More

Tis the Season to be Phishing TIS THE SEASON TO BE PHISHING

blog article

Dec 03, 2018

The holiday season is upon us once again. The conference call on-hold music has become more cheerful, the annual company party is coming up, and the holiday sales are making their way into circulars, popup ads, and emails. For many of us, these sights and sounds instill a familiar warmth and reminde...

Read More

What is Shamoon Virus? WHAT IS SHAMOON VIRUS?

blog article

Dec 03, 2018

Shanmoon was discovered by Seculert, Symantec, and Kaspersky Lab on 16 August 2012 that targets 32-bit NT kernel versions of Microsoft Windows. It is a modular virus and is also known as W32.DisTrack. This virus was crafted for cyber-warfare as it spread the malicious-content from an infected machin...

Read More

Red team testing: hacking and lying your way to data RED TEAM TESTING: HACKING AND LYING YOUR WAY TO DATA

blog article

Nov 30, 2018

We at Bulletproof provide a range of different cyber security services, including penetration tests, managed SIEM, and compliance consultancy. Though undoubtedly the most interesting (and cool) service we offer are our red team assessments. So, what is a red team test? Put simply, a red team test is...

Read More

How to react to a ransomware attack HOW TO REACT TO A RANSOMWARE ATTACK

infographic

Nov 30, 2018

Cyber criminals use ransomware to take control of your data or systems. They offer to release them if you pay them a ransom. The National Crime Agency (NCA) strongly advises you not to pay. Many victims never get their data back and known ‘payers’ are often targeted again. Read the Natio...

Read More

Cyber Security and the Industrial Internet of Things CYBER SECURITY AND THE INDUSTRIAL INTERNET OF THINGS

whitepaper

Nov 30, 2018

The Industrial Internet of Things (IIoT) and Industry 4.0 (I4.0) are transforming discrete manufacturing. Early adopters have already made extensive use of IIoT technology to radically improve factory efficiency and product quality. This has unleashed new competitive pressures for manufacturers acro...

Read More

Which Software Offers The Best Virus Protection in 2019? WHICH SOFTWARE OFFERS THE BEST VIRUS PROTECTION IN 2019?

blog article

Nov 30, 2018

Computers today not just need protection from viruses but from the whole lot of malware (spyware, adware etc.,) including the unpredictable zero-day malware. In other words, we are living in an age were virus protection alone is not going to be enough to safeguard your computers. Therefore, let&rsqu...

Read More

What is CryptoWall? WHAT IS CRYPTOWALL?

blog article

Nov 30, 2018

CryptoWall belongs to the ransomware family that uses advanced techniques to infiltrate computers and hides from its victims. Simply put, the Cryptowall is a Trojan horse that encrypts files on the jeopardized computer and then proceeds to threaten the user to pay a ransom to have the files decrypte...

Read More

Partner Perspectives: Notes from the Field: Extending Carbon Black Visibility to Undetected Malware PARTNER PERSPECTIVES: NOTES FROM THE FIELD: EXTENDING CARBON BLACK VISIBILITY TO UNDETECTED MALWARE

blog article

Nov 29, 2018

Daniel LaVoie is a Senior Solutions Specialist at ReversingLabs. On a recent customer visit, I asked the company’s Director of Security Operations how ReversingLabs came to be deployed as a part of their SOC tool set. The answer was quite interesting, and one that I wanted to share with our bl...

Read More

Top 5 Threat Hunting Myths: “EDR Is Threat Hunting” TOP 5 THREAT HUNTING MYTHS: “EDR IS THREAT HUNTING”

blog article

Nov 29, 2018

The cybersecurity landscape is in a constant state of change and, as many organizations have learned, it’s no longer a matter of if you’ll face a cyberattack, but when. In today’s world, attackers intentionally look normal to evade automated defenses. With the rise of ransomware, f...

Read More

THE STATE OF CYBERSECURITY IN 2018 THE STATE OF CYBERSECURITY IN 2018

infographic

Nov 29, 2018

As cyberattacks continue to increase, the threat landscape and defense techniques in IT are constantly shifting to combat issues. Now more than ever, defenders are evolving their own set of technological advances to combat threats. What you need to know Source: “State of Cybersecurity 2018 Par...

Read More

Kaspersky Security Bulletin 2018 STORY OF THE YEAR: MINERS KASPERSKY SECURITY BULLETIN 2018 STORY OF THE YEAR: MINERS

whitepaper

Nov 29, 2018

Cryptocurrency miners that infect the computers of unsuspecting users essentially operate according to the same business model as ransomware programs: the victim’s computing power is harnessed to enrich the cybercriminals. Only in the case of miners, it might be quite a while before the user n...

Read More

8 Ways to Avoid the Cybersecurity Grinch This Holiday Season 8 WAYS TO AVOID THE CYBERSECURITY GRINCH THIS HOLIDAY SEASON

blog article

Nov 29, 2018

According to the Carbon Black Threat Analysis Unit (TAU), organizations should expect to see a spike in potential cyberattacks starting with Black Friday/Cyber Monday and continuing through the holiday shopping season. TAU’s analysis across Carbon Black’s global endpoint footprint &ndash...

Read More

The Hunt for 3ve THE HUNT FOR 3VE

whitepaper

Nov 29, 2018

Every year brings new levels of sophistication and innovation in cybercrime, and the last year was no exception. Over the course of last year, we investigated one of the most complex and sophisticated ad fraud operations we have seen to date. We named this operation “3ve” (pronounced &ld...

Read More

Cyber Security: IEC 62443 Certification supports Charter of Trust CYBER SECURITY: IEC 62443 CERTIFICATION SUPPORTS CHARTER OF TRUST

video

Nov 29, 2018

In the digital age, cybersecurity is a basic prerequisite if companies are going to be able to protect their critical infrastructures and sensitive data, and ensure uninterrupted business operations. “Confidence that the security of data and networked systems is guaranteed is a key element of ...

Read More

Phishing Sites Using Lock Symbol to Prove Legitimacy PHISHING SITES USING LOCK SYMBOL TO PROVE LEGITIMACY

blog article

Nov 28, 2018

When accessing a website, the green padlock on the left corner indicates that the connection between the website and user is secure. Security experts have all been recommending that users only access websites where there is a site identity button or a padlock appearing in the address bar. A padlock ...

Read More

The Importance of "S" in "CISO" THE IMPORTANCE OF "S" IN "CISO"

blog article

Nov 28, 2018

A Chief Information Security Officer is the brigadier general of the security force of an organization. While the c-suite normally looks at the financial and overall management of an organization, it is up to the CISO to bring in the security aspect, keeping the organization safe from data breaches ...

Read More

Exabeam’s 2019 Cybersecurity Predictions EXABEAM’S 2019 CYBERSECURITY PREDICTIONS

blog article

Nov 28, 2018

When it comes to predicting the future, how do you anticipate the moves of our world’s underground cyber criminals, hackers and rogue nations? While they don’t all agree, Exabeam’s top security sleuths share their predictions for 2019. Tariff, trade, and geopolitical differences wi...

Read More

FireEye Tips and Insights Series: Investigating Network Security Callback Alerts FIREEYE TIPS AND INSIGHTS SERIES: INVESTIGATING NETWORK SECURITY CALLBACK ALERTS

video

Nov 28, 2018

In this installment of the Tips and Insights series, Jason Forcht describes how to investigate callback alerts in the FireEye Network Security system. FireEye Network Security (NX) is an effective cyber threat protection solution that helps organizations minimize the risk of costly breaches by accur...

Read More

The Endless Cycle of ERP Securitys THE ENDLESS CYCLE OF ERP SECURITYS

blog article

Nov 28, 2018

In the movie Groundhog Day, Bill Murray’s character begins to go mad from reliving the same day over and over again. For IT teams, this plot can be quite similar to securing ERP systems. Security is a process and securing ERP systems is addressed by people following processes. There is this co...

Read More

2018 Cost of Data Breach vs. Cybersecurity Response Plans and Solutions 2018 COST OF DATA BREACH VS. CYBERSECURITY RESPONSE PLANS AND SOLUTIONS

blog article

Nov 27, 2018

Now more than ever, enterprises have an obligation to handle the personal data of their customers. To complete numerous financial transactions or register for various services, people disclose their private information to enterprises with an expectation that they will protect their personal data. Un...

Read More

NYDFS Cybersecurity Regulations: A glimpse into the future NYDFS CYBERSECURITY REGULATIONS: A GLIMPSE INTO THE FUTURE

blog article

Nov 27, 2018

The cybersecurity regulation (23 NYCRR 500) adopted by the New York State Department of Financial Services (NYDFS) is nearly two years old. The 2017 bill, the first of its kind, will be fully implemented as of March 1st, 2019. Leading up to that date, companies have had to meet several milestones in...

Read More

What is zero-day exploit WHAT IS ZERO-DAY EXPLOIT

blog article

Nov 27, 2018

A zero-day exploit is a software flaw or a vulnerability. Hackers use this as an exploit to attack the user’s system even before the software vendor identifies it and a security patch fix is available. These zero-day exploits can go unnoticed for a long time and are commonly sold for large sum...

Read More

Cybersecurity and Banking: 3 Trends to Watch in 2019 CYBERSECURITY AND BANKING: 3 TRENDS TO WATCH IN 2019

blog article

Nov 26, 2018

Banks have always been at the forefront of enterprise cybersecurity. Their enormous stores of cash and consumer data have made them a top target for hackers, and the threat of financial losses, regulatory consequences, and reputational damage has spurred them to innovate and accelerate the field of ...

Read More

3 cyber security threats you need to prepare for 3 CYBER SECURITY THREATS YOU NEED TO PREPARE FOR

blog article

Nov 26, 2018

The key to reducing the damage that data breaches can cause is to spot them quickly. Ponemon Institute’s 2018 Cost of a Data Breach Study found that, on average, organisations that identified a breach within 100 days saved more than $1 million (€880,000) per incident. But to be able to sp...

Read More

Sharing Best Practices at Cybersecurity for SAP Customers SHARING BEST PRACTICES AT CYBERSECURITY FOR SAP CUSTOMERS

blog article

Nov 26, 2018

Whether you're just beginning to define the cybersecurity strategy for your SAP infrastructure, or want to brush up on the latest practices, SAPInsider’s Cybersecurity for SAP Customers offers you a chance to network with peers who have similar challenges and meet vendors who hope to contr...

Read More

Putin Cyberthreat PUTIN CYBERTHREAT

video

Nov 26, 2018

Vladimir Putin is a bigger menace than most people know. A new report links Russia to a cyberattack aimed at a petrochemical plant in Saudi Arabia. Putin’s Russia poses a clear danger to the U.S. and other free nations, so why is the mainstream news-media not paying attention? Vladimir Putin i...

Read More

Petya Ransomware Attack: What is it and How can it be stopped? PETYA RANSOMWARE ATTACK: WHAT IS IT AND HOW CAN IT BE STOPPED?

blog article

Nov 26, 2018

The latest ransomware in the cyberspace called “Petya” is infecting computers around the world at an incredible speed. It uses a vulnerability in the Windows OS that Microsoft patched in March 2017 — notably, it is the same virus that was exploited by the recent and prolific WannaC...

Read More

VirtualBox Unpatched Zero-Day Vulnerability and Exploit Released Online VIRTUALBOX UNPATCHED ZERO-DAY VULNERABILITY AND EXPLOIT RELEASED ONLINE

blog article

Nov 25, 2018

A Major Oracle VirtualBox Zero-Day vulnerability and exploit were released by a disgruntled security researcher. The vulnerability affects versions of VirtualBox up to 5.2.20. The vulnerability allows a malicious actor with administrator or root access on the guest OS to bypass the guest OS and exec...

Read More

SECURITY AND YOUR BUSINESS SECURITY AND YOUR BUSINESS

infographic

Nov 23, 2018

49% of CEOs surveyed said that a cyber-attack is now a case of ‘when’ instead of ‘if’. 76% of security breaches are financially motivated which include cryptocurrency demands. 60% of small and medium-sized businesses say attacks are becoming more severe and more sophisticated...

Read More

Kaspersky Security Bulletin: THREAT PREDICTIONS FOR INDUSTRIAL SECURITY IN 2019 KASPERSKY SECURITY BULLETIN: THREAT PREDICTIONS FOR INDUSTRIAL SECURITY IN 2019

whitepaper

Nov 23, 2018

The past few years have been very intense and eventful when it comes to incidents affecting the information security of industrial systems. That includes new vulnerabilities, new threat vectors, accidental infections of industrial systems and detected targeted attacks. In response, last year we deve...

Read More

How many times have you come to accept a certain “truth” that eventually turned out to be complete fiction? HOW MANY TIMES HAVE YOU COME TO ACCEPT A CERTAIN “TRUTH” THAT EVENTUALLY TURNED OUT TO BE COMPLETE FICTION?

blog article

Nov 23, 2018

From “the world is flat” to “the Earth is the center of the universe” to “the government would never monitor my emails: these mass beliefs in something that were ultimately proven to be a myth was usually to the detriment of those who refused to accept reality over thei...

Read More

Kaspersky Security Bulletin: THREAT PREDICTIONS FOR 2019 KASPERSKY SECURITY BULLETIN: THREAT PREDICTIONS FOR 2019

whitepaper

Nov 23, 2018

There’s nothing more difficult than predicting. So, instead of gazing into a crystal ball, the idea here is to make educated guesses based on what has happened recently and where we see a trend that might be exploited in the coming months. Asking the most intelligent people I know, and basing ...

Read More

Threat Intelligence Platforms: Open Source vs. Commercial THREAT INTELLIGENCE PLATFORMS: OPEN SOURCE VS. COMMERCIAL

whitepaper

Nov 22, 2018

As a member of a maturing security team evaluating threat intelligence platforms (TIPs), you may be asking yourself whether you should use an open source solution like Malware Information Sharing Platform (MISP), or buy a TIP from one of many vendors offering solutions. In this whitepaper, we discus...

Read More

Like, share and destroy: How to protect your business from the social media threat LIKE, SHARE AND DESTROY: HOW TO PROTECT YOUR BUSINESS FROM THE SOCIAL MEDIA THREAT

blog article

Nov 22, 2018

Social media is now the window to any business. 83% of organizations use social media as a marketing tactic, making it the most popular marketing tool. It is updated far more regularly than any website and businesses build a following based on publishing engaging content regularly. While businesses ...

Read More

What is NotPetya? How to Prevent this Virus from Infecting WHAT IS NOTPETYA? HOW TO PREVENT THIS VIRUS FROM INFECTING

blog article

Nov 22, 2018

NotPetya virus outwardly resembles the Petya ransomware in many ways, however, the fact is that it’s different and a lot more dangerous than Petya. When Petya affected numerous systems even the best antivirus and virus removal programs failed to deduct it. It brought many systems to a grinding...

Read More

Seven Top Cyber Tactics for Happy Holidays Online SEVEN TOP CYBER TACTICS FOR HAPPY HOLIDAYS ONLINE

blog article

Nov 21, 2018

Tis the season – for dropping your guard. According to Google Trends, online searches on phishing plummet every year over the holiday period. It's natural – after all, you're with your loved ones, you're full of good food, perhaps a little good drink and you're filled wit...

Read More

5 technologies for safer data centers 5 TECHNOLOGIES FOR SAFER DATA CENTERS

whitepaper

Nov 21, 2018

From online retail and mobile banking, through to cloud business productivity applications and digital infrastructure management, there is now an abundance of data that needs to be managed and stored in data centers. However, the increasing value of information has made data centers a prime target f...

Read More

Incident Response Plan 101: How to Build One, Templates and Examples INCIDENT RESPONSE PLAN 101: HOW TO BUILD ONE, TEMPLATES AND EXAMPLES

blog article

Nov 21, 2018

What is an Incident Response Plan and Why Do You Need One? An incident response plan helps IT staff identify, respond to and recover from cybersecurity incidents. The objective of an incident response plan is to prevent damages like service outage, data loss or theft, and illicit access to organizat...

Read More

How to Save the Cybersecurity Industry HOW TO SAVE THE CYBERSECURITY INDUSTRY

video

Nov 21, 2018

In this video, Cylance experts talk about how and why traditional antivirus products are failing and what can be done to halt this trend.  Speakers: Stuart McClure, Chairman and CEO of Cylance. Malcolm Harkins, Chief Security and Trust Officer at Cylance. Gabe Deale, Worldwide VP of Sales Engin...

Read More

What is a Logic Bomb? WHAT IS A LOGIC BOMB?

blog article

Nov 21, 2018

The term logic bomb refers to the malware also called slag code which gets activated by a response to an event. For instance, launching an application or when a specific date/time is reached – it triggers the logic bomb malware to start running on a computer. Online fraudsters make use of the ...

Read More

6 Steps to Build a Holistic Security Strategy with Microsoft 365 6 STEPS TO BUILD A HOLISTIC SECURITY STRATEGY WITH MICROSOFT 365

whitepaper

Nov 21, 2018

Download this executive brief to learn how Cognitive can change the face of regulatory compliance.

Read More

Managing Risk to Your Network Infrastructure: A Matter of Trust MANAGING RISK TO YOUR NETWORK INFRASTRUCTURE: A MATTER OF TRUST

whitepaper

Nov 20, 2018

Cyber attacks targeting the network infrastructure have become increasingly sophisticated and damaging. Today’s evolving threat landscape requires business leaders to approach security differently. In addition to deploying multilayered security solutions that provide defense in-depth, organiza...

Read More

The Battle Against Insider Threats and Why You Need Behavior-based Cybersecurity Strategies THE BATTLE AGAINST INSIDER THREATS AND WHY YOU NEED BEHAVIOR-BASED CYBERSECURITY STRATEGIES

blog article

Nov 20, 2018

Insider threats are a growing concern for all organizations—one that is increasingly difficult to manage using conventional security technologies. Unlike other types of security threats, insider threats are complicated by the fact that only some are caused by intentional malicious insiders. &l...

Read More

Shifting Left in the Cybersecurity Defense Lifecycle SHIFTING LEFT IN THE CYBERSECURITY DEFENSE LIFECYCLE

blog article

Nov 20, 2018

Identifying your risk posture should be the first objective of all cybersecurity programs. Yet, this is where organizations often fail, due to weak visibility and understanding during the crucial “identify” phase of the cybersecurity lifecycle. Focusing on protect, detect, respond, recov...

Read More

No organisation is immune to cyber attacks NO ORGANISATION IS IMMUNE TO CYBER ATTACKS

blog article

Nov 20, 2018

Hackers are becoming more skilled and sophisticated, and this is leaving Irish business owners and their systems extremely vulnerable and unable to protect themselves against cyber security threats. One of the most common tools a company can use to defend themselves against hackers is a penetration ...

Read More

Lax Employee Cybersecurity Habits Pose Growing Danger to Businesses LAX EMPLOYEE CYBERSECURITY HABITS POSE GROWING DANGER TO BUSINESSES

blog article

Nov 20, 2018

Employees’ cybersecurity habits are bad and getting worse. New research illustrates a workforce less committed to security best practices, despite an increased focus on cybersecurity awareness in the workplace. This years’ Market Pulse Survey by SailPoint Technologies reveals that 75% of...

Read More

How to Promote Cyber Security Inside Your Company HOW TO PROMOTE CYBER SECURITY INSIDE YOUR COMPANY

blog article

Nov 19, 2018

As business are digitizing, companies get more and more vulnerable in front of cyberattacks. The numbers are impressive: in 2025 is expected to be 75 billion connected devices. Considering that more than 300.000 new malware programs are created every day, the risk is real. According to a recent McKi...

Read More

Phish Insight - Test Your Employees Cyber Security Awareness PHISH INSIGHT - TEST YOUR EMPLOYEES CYBER SECURITY AWARENESS

video

Nov 19, 2018

In this Video Dave Spilker talks about NE-INC's ability to setup a cyber security test with phishing emails for businesses to test their employees. It's a great way to make sure your employees are trained to spot Phishing emails that can compromise your business security.

Read More

The impact of DDoS attacks on Dutch enterprises THE IMPACT OF DDOS ATTACKS ON DUTCH ENTERPRISES

whitepaper

Nov 19, 2018

Long ago, the name ‘DDoS attack’ was something for ICT staff to deal with. A number of incidents has changed this: a massive DDoS on Dutch Banking Services in 2013 and large-scale attacks aimed at Dutch services in January 2018. The latter affected the entire country. Both caused a great...

Read More

Ransomware Threat Alarmingly High for SMBs as They Place Security on the Back Burner RANSOMWARE THREAT ALARMINGLY HIGH FOR SMBS AS THEY PLACE SECURITY ON THE BACK BURNER

blog article

Nov 19, 2018

Small and medium-sized businesses are still a top target for ransomware attacks, and the number of attacks will most likely increase in 2019, according to a recent survey of MSPs. Over half of MSPs confirmed their clients experienced at least one ransomware attack in the first half of the year, whil...

Read More

How to Choose the best Antivirus Software of 2019 HOW TO CHOOSE THE BEST ANTIVIRUS SOFTWARE OF 2019

blog article

Nov 19, 2018

Numerous Antivirus software is circulating in the market and ascertaining the best among them is a subject of debate. There are many choices to select from because of a large number of strong rivals plus the reality that today’s best could turn one of tomorrows worst. This particular situation...

Read More

What’s Going to Happen to the Cryptocurrency Trend in 2018? WHAT’S GOING TO HAPPEN TO THE CRYPTOCURRENCY TREND IN 2018?

blog article

Nov 19, 2018

Bitcoin- the term is familiar now even to the not-so-tech-savvy layman; the internet is so full of success stories of people who have made their fortune by trading in Bitcoin. Rapper 50 Cent (whose real name is Curtis Jackson) had inadvertently made a fortune out of Bitcoin when he allowed his fans ...

Read More

2018: The New Year resolution for Cybersecurity 2018: THE NEW YEAR RESOLUTION FOR CYBERSECURITY

blog article

Nov 19, 2018

Once again, it’s that time of the year, to swear avoiding junk foods, sweets and keep in shape. To learn new arts, and promise yourself with a resolution that this year you are going to pursue your passion and stick on to it. Nevertheless, unlike those personal resolutions, which you already k...

Read More

Seven Major Threat Trends to be watched out in 2018 SEVEN MAJOR THREAT TRENDS TO BE WATCHED OUT IN 2018

blog article

Nov 19, 2018

January 2018 is over, we’re now on to the second month of the new year. Indications are that 2018 would be as eventful as 2017 was, as regards cyber crimes and cyber attacks. The much-evolved versions of the cyber threats that we had witnessed in 2017 would make their appearances in 2018 and p...

Read More

Looking Ahead: Cyber Security In 2018 LOOKING AHEAD: CYBER SECURITY IN 2018

blog article

Nov 19, 2018

2017 was a pretty rough year in terms of cybersecurity: ransomware, state-sponsored attacks, phishing scams, and big companies (like Equifax) failing to stick to security best practices (like implementing two-factor authentication) and therefore falling victims to cyber attacks. So what does 2019 ha...

Read More

ESET CYBERSECURITY BAROMETER ESET CYBERSECURITY BAROMETER

whitepaper

Nov 18, 2018

The ESET Cybersecurity Barometer Canada is a survey of public opinion about cybersecurity and cybercrime. The survey was conducted because there is a dearth of contemporary research quantifying public attitudes toward, and experience of, cybercrime. Yet public support for cybersecurity efforts, incl...

Read More

Proactive Protection: How Companies Can Secure Customer Data in a Hyper-Connected World PROACTIVE PROTECTION: HOW COMPANIES CAN SECURE CUSTOMER DATA IN A HYPER-CONNECTED WORLD

whitepaper

Nov 17, 2018

Today, digital customer experience transformations are mandatory to stay ahead in business, not optional. Customers are demanding cutting-edge digital experiences, delivered on every channel, via every device, anytime and anywhere they desire. To satisfy these customers, companies are transforming t...

Read More

What is Backdoor Virus? WHAT IS BACKDOOR VIRUS?

blog article

Nov 17, 2018

A backdoor is a malicious computer program used to provide the attacker with unauthorized remote access to a compromised PC by exploiting security vulnerabilities. This backdoor virus works in the background and hides from the user. It is quite difficult to detect as it is very similar to other malw...

Read More

Vulnerability scans vs Penetration tests VULNERABILITY SCANS VS PENETRATION TESTS

blog article

Nov 16, 2018

You’ll often find that ‘vulnerability scan’ and ‘penetration test’ are wrongly used interchangeably, creating confusion about which is the right security choice for businesses. Broadly speaking, a vulnerability scan could be thought of as a surface-level security assess...

Read More

CYBER ATTACKS IMPACT DOWNTIME, IOT AND CONTROL SYSTEMS ACCORDING TO NEW DATA CYBER ATTACKS IMPACT DOWNTIME, IOT AND CONTROL SYSTEMS ACCORDING TO NEW DATA

blog article

Nov 16, 2018

Cybersecurity threats can have serious impacts on organizations regardless of industry, and new data highlighted by CSO shows why these disruptions can be dangerous and costly. With 2018 coming to a close, now is as good a time as ever to understand where your cybersecurity vulnerabilities lie, and ...

Read More

Are you aware of the risks associated with the Cloud? ARE YOU AWARE OF THE RISKS ASSOCIATED WITH THE CLOUD?

blog article

Nov 16, 2018

According to the 2018 Bitglass Cloud Adoption Report, more than 81% of organisations have now adopted the Cloud in some form. However, moving data to the Cloud does not solve security problems – rather, it adds another element that needs addressing. Find out how to tackle this issue with our b...

Read More

Buyer beware: cyberthreats targeting e-commerce, 2018 BUYER BEWARE: CYBERTHREATS TARGETING E-COMMERCE, 2018

whitepaper

Nov 16, 2018

Caveat emptor (“buyer beware”) is the principle that it is the buyer's responsibility to spot if there is anything wrong with what they are being sold. This principle has been applied for centuries and it remains valid in the digital world. In cyberspace things aren’t always wh...

Read More

Agentless threat detection for Microsoft Azure workloads with Cisco Stealthwatch Cloud AGENTLESS THREAT DETECTION FOR MICROSOFT AZURE WORKLOADS WITH CISCO STEALTHWATCH CLOUD

blog article

Nov 16, 2018

Detecting threats, such as malware, rogue insiders, and credential abuse, within public cloud environments can be a major challenge. Traditionally, organizations have tried to solve this problem by overlaying a patchwork of agents across the cloud surface to detect bad activity. This approach requir...

Read More

Cybersecurity Education Series: What Is Malware? CYBERSECURITY EDUCATION SERIES: WHAT IS MALWARE?

blog article

Nov 16, 2018

Malware is one of the most pervasive and dangerous techniques cybercriminals employ to steal an organization’s funds and gain access to confidential data. That’s why were’ dedicating the next post in our cybersecurity education series to reviewing what it is, how it works, and what...

Read More

Synthetic identity fraud to drive $48 billion in annual losses by 2023 – Juniper Research SYNTHETIC IDENTITY FRAUD TO DRIVE $48 BILLION IN ANNUAL LOSSES BY 2023 – JUNIPER RESEARCH

blog article

Nov 15, 2018

Online payment fraud losses will reach $48 billion annually by 2023, up from the $22 billion in losses projected for 2018, a new study from Juniper Research has found. Juniper’s new research claims that a critical driver behind losses from eCommerce, airline ticketing, money transfer and banki...

Read More

Re-designing Linux Security: Do No Harm – Introduction RE-DESIGNING LINUX SECURITY: DO NO HARM – INTRODUCTION

blog article

Nov 15, 2018

The PSC now supports Linux. Cb Defense, Cb LiveOps & Cb ThreatHunter customers will now have the ability to manage and operate across all major operating systems. Securing your server and your data center workloads has changed significantly in recent years. High performance machines no longer ha...

Read More

Navigation Apps: Leading the Way? Or Following You? NAVIGATION APPS: LEADING THE WAY? OR FOLLOWING YOU?

blog article

Nov 15, 2018

In the United States alone, 84% of adults are using navigation applications, according to a recent Gallup poll. Whether they’re downloading it in an app store or the navigation capability is already built into the car, these navigation tools are taking us to the grocery store, to our grandpare...

Read More

Anti-Virus Comparative ANTI-VIRUS COMPARATIVE

whitepaper

Nov 15, 2018

We want to make clear that the results in this report are intended only to give an indication of the impact on system performance (mainly by the real-time/on-access components) of the consumer security products in these specific tests. Users are encouraged to try out the software on their own PC&rsq...

Read More

ENTERPRISE KEY MANAGEMENT ENTERPRISE KEY MANAGEMENT

whitepaper

Nov 15, 2018

Protecting the enterprise’s valuable digital assets from accidental or intentional misuse are key goals for every IT team today. Many organizations have deployed a variety of point encryption solutions as a primary method of protecting their data and to meet various compliance mandates and int...

Read More

SILENTDEFENSE™ AND THE FORESCOUT PLATFORM: CYBERSECURITY FOR CONVERGING IT/OT REQUIREMENTS SILENTDEFENSE™ AND THE FORESCOUT PLATFORM: CYBERSECURITY FOR CONVERGING IT/OT REQUIREMENTS

blog article

Nov 15, 2018

Today’s cyber threats are ever-changing and evolving. Over the last decade, we have seen malware begin to target non-enterprise devices and industrial control systems (ICS) at an alarming pace.  However, most critical infrastructure and ICS asset owners are ill-equipped for this changing ...

Read More

Threats and Complexity Drive Security Stack Consolidation THREATS AND COMPLEXITY DRIVE SECURITY STACK CONSOLIDATION

infographic

Nov 14, 2018

Traditionally, protecting business-critical servers from threats has fallen to a disparate suite of reactive security controls. To stay ahead of advanced threats, lateral movement and increasing attacker sophistication, many organizations plan to consolidate these tools through the use of integrated...

Read More

Detect Cyber Threats with Securonix Proxy Traffic Analyzer DETECT CYBER THREATS WITH SECURONIX PROXY TRAFFIC ANALYZER

whitepaper

Nov 14, 2018

Many organizations encounter an extremely high volume of proxy data on a daily basis. The volume of proxy data can range from 100 GB to over 1 TB an hour. Legacy security information and event management (SIEM) solutions struggle to handle this flow of data and still identify high-fidelity threats. ...

Read More

Small Business Benefits of Moving to the Cloud: Resource Friendly SMALL BUSINESS BENEFITS OF MOVING TO THE CLOUD: RESOURCE FRIENDLY

blog article

Nov 14, 2018

Small businesses never seem to have enough people or funding, and the last thing they need is for their security solution to be eating up precious resources. Your people are stretched thin and don’t really have time or budget to source new hardware or push software updates. Not to mention the ...

Read More

CRYPTOCURRENCY THREAT PREDICTIONS FOR 2019 CRYPTOCURRENCY THREAT PREDICTIONS FOR 2019

whitepaper

Nov 14, 2018

2018 saw cryptocurrency become an established part of many people’s lives, and a more attractive target for cybercriminals across the world. To some extent, the malicious mining of cryptocurrencies even prevailed over the main threat of the last few years: ransomware. However, in the second ha...

Read More

DATA SECURITY SELF- ASSESSMENT for Corporate Executives DATA SECURITY SELF- ASSESSMENT FOR CORPORATE EXECUTIVES

whitepaper

Nov 14, 2018

It should come as no surprise that companies of all sizes are taking data security more and more seriously. Similarly, in recent years, Cyber Liability Insurance has become more commonplace which has allowed the insurance industry to gain important experience with regard to how various companies org...

Read More

FireEye Endpoint Security Achieves Highest Testing Results Amongst NGAV Products FIREEYE ENDPOINT SECURITY ACHIEVES HIGHEST TESTING RESULTS AMONGST NGAV PRODUCTS

blog article

Nov 14, 2018

In the most recent AV-Comparatives Real-World Protection Test results, FireEye Endpoint Security achieved the highest detection rate among next-gen anti-virus vendors with zero false positives. FireEye was able to accomplish this result through a constant flow of innovations that originates with Fir...

Read More

Thinking Global and Acting Local to Close the Skills Gap THINKING GLOBAL AND ACTING LOCAL TO CLOSE THE SKILLS GAP

blog article

Nov 14, 2018

Cybersecurity empowers organizations to enable trust, move faster, add value and grow. In order for cybersecurity to live up to that promise, it will require an increase in talent and new skills to take on the volume and sophistication of today’s threat landscape. According to industry analyst...

Read More

What is Code Red Worm? WHAT IS CODE RED WORM?

blog article

Nov 14, 2018

Code red is a computer worm that was identified in July 2001, when computers running on Internet Information Services (IIS) web server of Microsoft were found compromised. The after effect of the attack caused a damage of billions of dollars in the summer of 2001. Marc Maiffret and Ryan Permeh emplo...

Read More

PRESENTING OT SECURITY RISK TO THE BOARD PRESENTING OT SECURITY RISK TO THE BOARD

whitepaper

Nov 13, 2018

ICS/SCADA and Operational Technology (OT) networks were traditionally kept separate or “air-gapped” from IT networks. However, new business requirements associated with the efficiency benefits of digitalization are forcing increased connectivity between IT and Operational Technology (OT)...

Read More

INTERNATIONAL ANTI-BOTNET GUIDE 2018 INTERNATIONAL ANTI-BOTNET GUIDE 2018

whitepaper

Nov 13, 2018

The International Anti-Botnet Guide was developed to facilitate the mitigation of botnets and other automated, distributed threats through voluntary participation and collaboration among disparate stakeholders throughout the global internet and communications ecosystem. The Guide provides informatio...

Read More

Small Companies, Big Security Concerns SMALL COMPANIES, BIG SECURITY CONCERNS

blog article

Nov 13, 2018

Many people might tend to associate security breaches and malware attacks with large enterprises. After all, the attacks that grab the big headlines generally occur against global companies or large governmental organizations. That doesn’t by any stretch mean small and mid-sized companies are ...

Read More

The Impact of Cyber Warfare on Nuclear Deterrence: A Conceptual and Empirical Overview THE IMPACT OF CYBER WARFARE ON NUCLEAR DETERRENCE: A CONCEPTUAL AND EMPIRICAL OVERVIEW

whitepaper

Nov 13, 2018

ABSTRACT Cyber war is a subject that is highly contested among strategists and experts. This brief assesses the impact of cyber operations against strategic targets and demonstrates that while cyber war is a real phenomenon, it is far from producing decisive outcomes. The cyberspace is a medium to c...

Read More

IT security basics for everyday businesses IT SECURITY BASICS FOR EVERYDAY BUSINESSES

whitepaper

Nov 13, 2018

Let’s be honest. Most people just tune out when confronted with talk of IT security doom and cybersecurity jargon. It either sounds overwhelmingly complex and daunting, or you think ‘seriously, we have nothing worth stealing so why would anyone bother breaking in?’ It doesn’t...

Read More

Cybersecurity in the CONNECTED HOSPITAL CYBERSECURITY IN THE CONNECTED HOSPITAL

infographic

Nov 13, 2018

Abbott conducted in-depth research among physicians and hospital administrators to understand the cybersecurity challenges our hospital customers face. WE SURVEYED: 300 Physicians. 100 Hospital Administrators. WHAT WE FOUND: While physicians and administrators see cybersecurity as a priority, the ma...

Read More

SAP Security Notes November ‘18: The Mobile Client Side Menace SAP SECURITY NOTES NOVEMBER ‘18: THE MOBILE CLIENT SIDE MENACE

blog article

Nov 13, 2018

Today SAP released 12 security notes for November’s SAP Security Patch Day as it is scheduled. This makes a total of 16 security notes after adding the four released since October’s patch day. Among these SAP security notes there are three that fix a number of vulnerabilities reported by...

Read More

Six Design Considerations for Your Security Data Lake SIX DESIGN CONSIDERATIONS FOR YOUR SECURITY DATA LAKE

blog article

Nov 13, 2018

Large numbers of enterprises, such as retail conglomerates, consumer banks, airlines, and insurance companies are joining the rush to set up data lakes for handling petabytes of security data and logs. But many executives and architects assume that once they finish setting up log sources, applying p...

Read More

What is Polymorphic Virus and how do you deal with it? WHAT IS POLYMORPHIC VIRUS AND HOW DO YOU DEAL WITH IT?

blog article

Nov 13, 2018

Similar to the virus which affects the human body, a computer virus is a malicious program that affects the computer to choke or bring down the normal functioning. Usually, a computer virus self-replicates by copying itself to another program. Simply put, the computer virus spreads by itself into ot...

Read More

What are the Dev, Ops, and Security journeys for secrets management? WHAT ARE THE DEV, OPS, AND SECURITY JOURNEYS FOR SECRETS MANAGEMENT?

video

Nov 12, 2018

In each level of the HashiCorp Vault maturity model, different roles—developers, operations, InfoSec—have a specific focus for building a new level of operational excellence as they progress to new stages. Learn what each persona should focus on.

Read More

Network Security in an IoT World NETWORK SECURITY IN AN IOT WORLD

video

Nov 12, 2018

Network security and the integrity of your network in both hardware and software is achieved by targeting a variety of threats from entering or spreading on the network.  So, in the age of IoT and billions of devices, what are the network security measures that combine multiple layers of defens...

Read More

CYBERSECURITY AWARENESS CYBERSECURITY AWARENESS

whitepaper

Nov 10, 2018

HOW T&C RECOGNIZED NCSAM IN OCTOBER 2018 This October, Thomas & Company joined the Department of Homeland Security to raise cybersecurity awareness across the nation during National Cybersecurity Awareness Month (NCSAM). The overarching theme for NCSAM was Cybersecurity is Our Shared Respons...

Read More

How You Can Become Part of an Elite Cybersecurity Force HOW YOU CAN BECOME PART OF AN ELITE CYBERSECURITY FORCE

video

Nov 09, 2018

The hardest part of a journey can be taking the first step👣 but at CQURE we are here to support you all the way, just like we supported Jack Perry. https://cqu.re/Story_of_Jack_Perry. Jack augments his knowledge every year by taking our annual Advanced Windows Security Course. Our aim is to bring m...

Read More

Cybersecurity in the workplace CYBERSECURITY IN THE WORKPLACE

blog article

Nov 09, 2018

Cybercriminals, however, are more likely to view your employees as the path of least resistance into an organization. In North America, for example, two top causes of breaches are careless or uninformed employee actions and phishing or other social engineering. Cybercriminals know that, and they use...

Read More

Why is cybersecurity increasingly a Reg Tech priority for regulators and financial institutions? WHY IS CYBERSECURITY INCREASINGLY A REG TECH PRIORITY FOR REGULATORS AND FINANCIAL INSTITUTIONS?

video

Nov 09, 2018

How tools and RegTech solutions can help with cybersecurity regulation requirements from various jurisdictions. Hear from Promontory Financial Group, an IBM Company's Judith Pinto to learn more. About IBM: Visit the IBM RegTech: https://ibm.biz/BdYwSY. Follow IBM RegTech on Twitter: https://twit...

Read More

7 Ways to Bridge the Cyber Security Skills Gap 7 WAYS TO BRIDGE THE CYBER SECURITY SKILLS GAP

blog article

Nov 09, 2018

Make security training compulsory and fun with a variety of on-demand media. To scale up cyber security, people who are not part of the security team also need to think and care about it.  This was a key takeaway for scalable cyber security from both the AppSec EU and Black Hat security confere...

Read More

How Can You Get More from Your AppSec Education Program? HOW CAN YOU GET MORE FROM YOUR APPSEC EDUCATION PROGRAM?

blog article

Nov 09, 2018

Forbes recently published an article titled “The Cybersecurity Talent Gap Is An Industry Crisis” – and without question, there’s a real lack of cybersecurity talent. Cybersecurity Ventures predicts about 3.5 million unfilled cybersecurity job openings by 2021! The need for cy...

Read More

What is the MyDoom Virus? WHAT IS THE MYDOOM VIRUS?

blog article

Nov 09, 2018

The MyDoom virus, also known as Novarg, is another worm capable of developing a backdoor in a victim computer’s operating system. The family of MyDoom e-mail worms continues to be an active threat because of unprotected personal computers and compromised computer systems even though the virus ...

Read More

Partner Perspectives: Endpoint Phishing Incident Response with Cofense Intelligence and Cb Response PARTNER PERSPECTIVES: ENDPOINT PHISHING INCIDENT RESPONSE WITH COFENSE INTELLIGENCE AND CB RESPONSE

blog article

Nov 08, 2018

Hunting Phished Endpoints with Cofense Intelligence™ and Carbon Black. Ransomware, business email compromise (BEC), malware infections and credential-based theft all primarily stem from a single vector of compromise – phishing. Operationalizing threat intelligence, especially when it com...

Read More

HIPAA Data Security & Privacy HIPAA DATA SECURITY & PRIVACY

whitepaper

Nov 08, 2018

Under the HIPAA mandate, covered entities and business associates are subject to the Security Rule that covers confidentiality, integrity, and availability of electronic Protected Health Information (ePHI) and the Privacy Rule that limits the uses and disclosures of PHI. These rules have long been i...

Read More

5 Ways To Avoid a Phishing Attack 5 WAYS TO AVOID A PHISHING ATTACK

blog article

Nov 08, 2018

Before diving into the 5 ways to avoid a phishing attack, we want to make sure you understand what phishing means and the risk it presents. Phishing is simply a fraudulent method of obtaining sensitive data by disguising as a trustworthy entity in an email. These attacks usually consist of fake emai...

Read More

IT Solutions END-TO-END CYBER SECURITY IT SOLUTIONS END-TO-END CYBER SECURITY

whitepaper

Nov 08, 2018

We assist nuclear operators and suppliers in complying with the most up-to-date cyber security regulatory requirements for Industrial Control Systems. Let us help you adapt to the latest in industry best practice and meet your regulatory needs, including: NIST SP800-82, NIST SP800-53, NRC RG5.71 and...

Read More

The State of Consumer Awareness Around Cybersecurity THE STATE OF CONSUMER AWARENESS AROUND CYBERSECURITY

video

Nov 08, 2018

Shaila discussing consumer awareness of cybersecurity. Laptops, mobile phones, tablets, smartwatches, and more are all often found in a modern user’s arsenal of personal devices. We rely on these devices for so many things – to wake us up, count calories, connect us to friends and loved ...

Read More

Deepguard proactive on-host protection against new and emerging threats DEEPGUARD PROACTIVE ON-HOST PROTECTION AGAINST NEW AND EMERGING THREATS

whitepaper

Nov 07, 2018

This whitepaper explains the trends and developments in computing that have made host-based behavioral analysis and exploit interception necessary elements of computer security. It also provides an overview of the technology and methodology used by DeepGuard, the Host-based Intrusion Prevention Syst...

Read More

CYBERSECURITY AWARENESS: TAKE THE RIGHT APPROACH CYBERSECURITY AWARENESS: TAKE THE RIGHT APPROACH

blog article

Nov 07, 2018

There’s never been a more critical time for awareness training for cybersecurity. Attacks of all kinds are on the rise and the ubiquity of technology in the lives of end users can create opportunities for lapses in judgement, human error and avoidable mistakes. As an IT leader in your organiza...

Read More

Managing Software Security: 10 Essential Best Practices MANAGING SOFTWARE SECURITY: 10 ESSENTIAL BEST PRACTICES

infographic

Nov 07, 2018

Is your software security program up to the challenges of a rapidly accelerating software delivery environment? Most aren’t – and it’s challenging to both identify the problems and determine the best ways to manage software security in a DevOps environment. Learn some of the essent...

Read More

How to Overcome Common Cybersecurity Project Challenges HOW TO OVERCOME COMMON CYBERSECURITY PROJECT CHALLENGES

blog article

Nov 06, 2018

Are you struggling with managing your cybersecurity projects? Are you facing challenges during your project and don’t know how to deal with them? We’ve put together several common cybersecurity project challenges and propose solutions for what you can do about them. Lack of prioritizatio...

Read More

Data security overview DATA SECURITY OVERVIEW

whitepaper

Nov 06, 2018

Organizations today are facing increasing pressure to secure and protect employee data to ever higher standards. There is widespread concern regarding individual consumer and employee data privacy and security, resulting in new legislation, such as the EU’s General Data Protection Regulation (...

Read More

How Dairygold Secures Data & Critical Infrastructure with Smarttech247 & IBM Security HOW DAIRYGOLD SECURES DATA & CRITICAL INFRASTRUCTURE WITH SMARTTECH247 & IBM SECURITY

video

Nov 06, 2018

Learn how Dairygold, a leading dairy cooperative, scales their security operations and critical infrastructure to their business growth. In this real-world customer case study video, Smarttech247 and IBM Security work together to secure Dairygold’s manufacturing processes and data using IBM QR...

Read More

Faster and Smarter Incident Response with Artificial Intelligence FASTER AND SMARTER INCIDENT RESPONSE WITH ARTIFICIAL INTELLIGENCE

video

Nov 06, 2018

Overwhelming amounts of data is one of the major challenges incident response teams battle daily. Artificial intelligence can help – analyzing incident details, threat intelligence, historical context and trends to determine the true nature of an incident. In the video, IBM Resilient’s A...

Read More

THE CRITICALITY OF COORDINATED DISCLOSURE IN MODERN CYBERSECURITY THE CRITICALITY OF COORDINATED DISCLOSURE IN MODERN CYBERSECURITY

whitepaper

Nov 06, 2018

Over the past several years, the Committee on Energy and Commerce has conducted oversight of cybersecurity strategies and incidents both at federal agencies and in the private sector. As part of that work, the Committee has examined the cybersecurity capabilities of the automotive industry, sought a...

Read More

Protect Your Business in the Cloud with Axcient Fusion PROTECT YOUR BUSINESS IN THE CLOUD WITH AXCIENT FUSION

whitepaper

Nov 06, 2018

North American businesses operate in an era where the cost of downtime is more than $700 Billion annually. IT leaders are under constant pressure to protect their business with the ability to rapidly recover from a disaster or site-wide outage, thereby ensuring employees remain productive and applic...

Read More

BLOCKCHAIN FOR THINGS Securing high-volume IoT data transmissions BLOCKCHAIN FOR THINGS SECURING HIGH-VOLUME IOT DATA TRANSMISSIONS

whitepaper

Nov 05, 2018

BLOCKCHAIN FOR THINGS Securing high-volume IoT data transmissions by combining well-established cryptographic signatures with blockchain technology, UBIRCH has created an innovative and highly e¬ client method of securing trust in IoT data forever. We call it Blockchain for Things. IOT IS GROWIN...

Read More

IBM Cloud Data Shield with Intel Software Guard Extensions | Intel Business IBM CLOUD DATA SHIELD WITH INTEL SOFTWARE GUARD EXTENSIONS | INTEL BUSINESS

video

Nov 05, 2018

Intel and IBM are driving cloud innovation together with security as a top priority. IBM Cloud Data Shield based on Intel® Software Guard Extensions (Intel® SGX) helps enable protection of data in all of its phases – data in use, in transit and at rest.

Read More

Innovation key to cybersecurity INNOVATION KEY TO CYBERSECURITY

video

Nov 05, 2018

Pascal Dello Torre, Global head of technology – Veolia Group, talks on the sidelines of Gartner Security and Risk Management Summit 2018, about why it is important to discuss innovation when you are talking about cybersecurity.

Read More

Proofpoint Named a Visionary in the 2018 Gartner Magic Quadrant for Cloud Access Security Brokers PROOFPOINT NAMED A VISIONARY IN THE 2018 GARTNER MAGIC QUADRANT FOR CLOUD ACCESS SECURITY BROKERS

blog article

Nov 05, 2018

Many IT executives have adopted a “Cloud First” strategy to reduce computing costs and improve productivity. However, this boost to operational efficiency is closely followed by the discovery of new security and compliance risks. Security teams are plagued by cloud account compromise. Co...

Read More

VISIBILITY AND ZERO TRUST: HOW TRUSTING NO ONE IS RESTORING FAITH IN CYBERSECURITY VISIBILITY AND ZERO TRUST: HOW TRUSTING NO ONE IS RESTORING FAITH IN CYBERSECURITY

blog article

Nov 05, 2018

For years, IT security architects trusted perimeter defenses to protect enterprise networks and data. The basic premise was simple: build a rock-solid perimeter to protect the trusted network. Once inside you have far-reaching access to a big flat network. In essence, it was like Jack Byrnes’ ...

Read More

Spoofing: RFID and SMS SPOOFING: RFID AND SMS

blog article

Nov 05, 2018

First, let's start with a definition - What is Spoofing? According to ForcePoint, "Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a com...

Read More

What is Locky Ransomware? WHAT IS LOCKY RANSOMWARE?

blog article

Nov 05, 2018

Locky is one kind of latest ransomware. It was first released in 2016. The IT security geeks had discovered that the malware authors send ransomware infected emails demanding for payment through an invoice in the form of malicious Microsoft Word document that runs infectious macros. When the user op...

Read More

What is WannaCry Ransomware? WHAT IS WANNACRY RANSOMWARE?

blog article

Nov 03, 2018

The wannacry ransomware is composed of various components. Files with encryption keys. Application to encrypt data. Application to decrypt data. A copy of Tor Browser. Unlike other ransomware, wannacry has taken the internet world by storm as it created a very bad impact on almost all the business f...

Read More

The rise of smart factories and the cybersecurity risk they pose THE RISE OF SMART FACTORIES AND THE CYBERSECURITY RISK THEY POSE

infographic

Nov 03, 2018

The rise of smart factories will help the manufacturing industry considerably, as digital technology such as automation can lead to greater efficiency and accurate reproducibility, leading to optimum product quality with minimum waste. But, these connected devices expose a greater risk for hackers t...

Read More

Defning a Modern Endpoint Security Stack DEFNING A MODERN ENDPOINT SECURITY STACK

whitepaper

Nov 02, 2018

Despite record spending on cyber security, government agencies and enterprise organizations are not making significant headway in winning a battle against cybercrime. As part of an ongoing modernization initiative, the U.S. DoD is evaluating security solutions that offer the smallest footprint, lowe...

Read More

Kevin Ekbatani on Malware, Solving Puzzles and Artificial Intelligence in Security KEVIN EKBATANI ON MALWARE, SOLVING PUZZLES AND ARTIFICIAL INTELLIGENCE IN SECURITY

video

Nov 02, 2018

Problem solving used to keep Kevin Ekbatani awake at night. These days, he works with small and medium businesses to keep them protected from malware and coordinated attacks. Wrapped in Cylance green, Kevin uses Artificial Intelligence-based security solutions to keep the bad guys from using tools i...

Read More

Data security: 10 secure file sharing options and tips DATA SECURITY: 10 SECURE FILE SHARING OPTIONS AND TIPS

infographic

Nov 02, 2018

when companies decide to start securing all internal file sharing, it may seem like a confusing and even daunting task. How can something be shareable and public while also staying secure and private? It is quite a paradox. There are various kinds of platforms when it comes to secure file sharing. M...

Read More

SECURITY AND PRIVACY IN DISRUPTIVE TECHNOLOGIES IoT SENSING SOLUTION SECURITY AND PRIVACY IN DISRUPTIVE TECHNOLOGIES IOT SENSING SOLUTION

whitepaper

Nov 02, 2018

Disruptive Technologies has prioritized security and privacy throughout every part of the design and development process for our sensing solution, including chip design, sensor design, radio protocol design, cloud services and APIs. Every layer of the Disruptive sensing solution is secure, from the ...

Read More

What Is the Stuxnet Worm Computer Virus? WHAT IS THE STUXNET WORM COMPUTER VIRUS?

blog article

Nov 02, 2018

Stuxnet worm is a rootkit exploit. The Stuxnet worm is targeted at data acquisition (SCADA) systems and supervisory control. On the other side, it is vital to know that the SCADA systems are used for industrial control systems and this includes power, water, sewage plants etc. History of Stuxnet. In...

Read More

What is Zeus Malware? WHAT IS ZEUS MALWARE?

blog article

Nov 01, 2018

The Zeus malware, also known as the ZeuS or Zbot, is a Trojan Horse used to steal confidential information from the victims’ computers. The primary ways by which Zeus malware infects a computer are through phishing attacks and drive-by downloads. The Zeus Trojan was first detected when it stol...

Read More

Digital Trust in New Zealand DIGITAL TRUST IN NEW ZEALAND

infographic

Oct 31, 2018

Embrace cyber security from the start Many companies are pursuing digital transformation projects and growing connectivity is increasing the potential for cyber-attacks. Only 25% of NZ businesses are including proactive risk management 'fully from the start' of a digital transformation proje...

Read More

The value of independent anti-virus testing THE VALUE OF INDEPENDENT ANTI-VIRUS TESTING

blog article

Oct 31, 2018

Unlike many other tests in the IT industry, independent anti-virus (AV) testing is really just that: Independent. Their results provide truly useful comparisons between vendors across a range of security software products. This is both for consumers, and for security vendors looking to integrate an ...

Read More

15 Must-Do Things to Protect Your Business From A Cyber Attack 15 MUST-DO THINGS TO PROTECT YOUR BUSINESS FROM A CYBER ATTACK

infographic

Oct 31, 2018

RISK ASSESSMENT. You need to establish a baseline understanding of the risks facing your organization before you can effectively write security policies and spend money on technical controls. WRITTEN SECURITY POLICY. Policy guides employee behavior and sets expectations for how cybersecurity fits in...

Read More

Regulatory Support for Email Security REGULATORY SUPPORT FOR EMAIL SECURITY

blog article

Oct 31, 2018

Email continues to be the most common method used to gain unauthorized access to corporate systems and perpetrate cyber fraud.  More specifically, targeted business email compromise (BEC) attacks clearly stand out as a major problem.  With a recent survey indicating that 89% of organizatio...

Read More

5 Reasons Why U.S. Voting Systems Are Getting Harder to Hack 5 REASONS WHY U.S. VOTING SYSTEMS ARE GETTING HARDER TO HACK

blog article

Oct 31, 2018

Even as the Justice Department stays busy with those suspected of election meddling in the run-up to the midterms, there’s growing reason for optimism about the ability of the US electoral infrastructure to withstand attacks. While it’s still technically possible for a foreign state to a...

Read More

Internet Data Breaches Realm: 20+ Fascinating Cyber Security Facts INTERNET DATA BREACHES REALM: 20+ FASCINATING CYBER SECURITY FACTS

infographic

Oct 31, 2018

Cybercrime is on the rise, mostly because of the fact that we are becoming so dependent on the internet and are performing so many essential tasks using this tool. Cybercrime results in financial loss, emotional distress and is just generally a nuisance that anyone would want to avoid, and if you ar...

Read More

Cloud-Enabled Core Banking CLOUD-ENABLED CORE BANKING

whitepaper

Oct 30, 2018

Cloud-Enabled Core Banking. The time is now for banks to capitalize on the many benefits that can be achieved by running Core banking solutions in the cloud. This white paper explains why. Topics include recent increased confidence in cloud strategies; a definition of what cloud-based core banking m...

Read More

SamSam: Targeted Ransomware Attacks Continue SAMSAM: TARGETED RANSOMWARE ATTACKS CONTINUE

blog article

Oct 30, 2018

Ransomware group remains highly active in 2018, focusing mainly on organizations in the U.S. The group behind the SamSam ransomware (Ransom.SamSam) has continued to mount attacks against entire organizations during 2018, with fresh attacks seen against 67 different targets, mostly located in the U.S...

Read More

How to Protect Yourself From The Conficker Worm? HOW TO PROTECT YOURSELF FROM THE CONFICKER WORM?

blog article

Oct 30, 2018

A new worm called Conflicker is doing the rounds, attacking unnumbered Windows computers in the recent times. The spread of infection is going from bad to worse and is beyond control as per the reports from a security vendor. Detections of the Conflicker worm are by more than 225% since the end of 2...

Read More

HELPING NCCOE EXPLORE NEW GLOBAL FRAMEWORKS FOR SECURING IOT DEVICES HELPING NCCOE EXPLORE NEW GLOBAL FRAMEWORKS FOR SECURING IOT DEVICES

blog article

Oct 29, 2018

By 2020 there will be 29 billion connected devices, according to ABI Research1, and a growing percentage will be Internet of Things (IoT) devices that are inherently more vulnerable to attacks than traditional computing equipment. The addition of billions of unsecure (and in many cases unsecurable) ...

Read More

Importance of SSL certificate for your company website IMPORTANCE OF SSL CERTIFICATE FOR YOUR COMPANY WEBSITE

blog article

Oct 29, 2018

Anyone who browses the Internet is probably aware of the term SSL. It’s often bandied around as a term which people vaguely understand to be something connected to keeping your browsing data safe. For a lot of people, SSL is denoted by two major recognizable features: 1) Website URLs starting ...

Read More

DHS Cybersecurity Shared Services Program DHS CYBERSECURITY SHARED SERVICES PROGRAM

whitepaper

Oct 29, 2018

SCOUTPRIME ScoutPrime is a Threat Intelligence Platform (TIP) for collecting, normalizing, enriching, orchestrating, and distributing unclassified threat indicators gathered from DHS, Lookingglass, OSINT, and commercial sources. The platform provides 87 data feeds, global Internet topology of networ...

Read More

Protecting Employees from Ransomware Attacks PROTECTING EMPLOYEES FROM RANSOMWARE ATTACKS

video

Oct 29, 2018

Did you know that, every 40 seconds, a company is hit by a ransomware attack? Learn more about protecting employees against such attacks - we'll hear from product marketing manager Lorena Crowley and developer advocate Yufeng Guo as they describe malware protection in Gmail, Drive, Chrome Browse...

Read More

Protecting Employees from Phishing Websites PROTECTING EMPLOYEES FROM PHISHING WEBSITES

video

Oct 28, 2018

Learn more about how organizations can protect employees from phishing websites with product marketing manager Lorena Crowley and developer advocate Yufeng Guo.  Watch more videos from the Security on Google Cloud playlist here → http://bit.ly/2qj6QEy.

Read More

How to solve the cybersecurity talent gap in your organization HOW TO SOLVE THE CYBERSECURITY TALENT GAP IN YOUR ORGANIZATION

infographic

Oct 26, 2018

Solving the cybersecurity talent shortage has become a major challenge for all executives—not just CISOs and CEOs, according to an infographic from Digital Guardian. In 2018, 51% of organizations said they face a cybersecurity skills shortage, up from just 23% in 2014.

Read More

Server-Side Rendering (SSR) on the Exa ® Platform Reduces Bandwidth Usage and Increases Productivity SERVER-SIDE RENDERING (SSR) ON THE EXA ® PLATFORM REDUCES BANDWIDTH USAGE AND INCREASES PRODUCTIVITY

whitepaper

Oct 26, 2018

In today’s digital world, hospitals are struggling to keep up with increasing imaging demands, while managing IT networks that are strained to the limit. Many organizations have already deeply invested in their networks and IT infrastructure, leading administrators to seek out new ways to mana...

Read More

What are boot sector viruses and how can I prevent them? WHAT ARE BOOT SECTOR VIRUSES AND HOW CAN I PREVENT THEM?

blog article

Oct 26, 2018

Computer Virus. Even before we try to understand what a boot sector virus is, let us understand what is a computer virus. In the online world, the term computer virus refers to a malicious program that auto-multiplies by copying itself to another program. Simply put, a computer virus spreads itself ...

Read More

5 phases for migrating healthcare workloads to Amazon Web Services 5 PHASES FOR MIGRATING HEALTHCARE WORKLOADS TO AMAZON WEB SERVICES

whitepaper

Oct 25, 2018

Healthcare organizations migrating to the cloud need a strategy that assesses risks and considers all the possibilities. Moving an entire healthcare service to a new IT environment means deciding how to migrate all three subsystems— compute, storage, and networking—and identifying the ri...

Read More

Designing for People: Proofpoint’s UX Team Reveals the Process behind a Product Refresh DESIGNING FOR PEOPLE: PROOFPOINT’S UX TEAM REVEALS THE PROCESS BEHIND A PRODUCT REFRESH

blog article

Oct 25, 2018

Whether it’s stopping attacks that target users or our passion for customer service, protection has always started with people at Proofpoint. People are also the inspiration behind one of the most sweeping UI/UX redesigns in our company’s history. Our UX/UI design team is in the middle o...

Read More

5 Common Visibility Gaps Your Enterprise Security Plan Can’t Afford 5 COMMON VISIBILITY GAPS YOUR ENTERPRISE SECURITY PLAN CAN’T AFFORD

blog article

Oct 25, 2018

Today’s cybersecurity challenges are unlike anything we’ve seen before. Your organization’s IT infrastructures now consist of the traditional network—employee laptops, desktops, various operating software, storage platforms and servers, cloud storage—plus an entirely ne...

Read More

How to Prevent Bots from Infecting Your System? HOW TO PREVENT BOTS FROM INFECTING YOUR SYSTEM?

blog article

Oct 25, 2018

What are Bots? Bots are Internet robots also known as crawlers, spiders, and web bots. They are automated programs developed for performing repetitive tasks. With the computing power available to programmers, bots have been developed to execute tasks at extremely high speeds, unbelievable for a real...

Read More

CSPi Security Solutions for Secure DevOps & Enhanced Network Security CSPI SECURITY SOLUTIONS FOR SECURE DEVOPS & ENHANCED NETWORK SECURITY

whitepaper

Oct 25, 2018

Organizations of all sizes and across all industries are the targets of an increasing number of sophisticated cyber attacks. The risk of breach is very real, and gets worse every day. The industry recognizes that approaches such as threat prevention and breach detection are ineffective. For proof, j...

Read More

The commodity problem of cybersecurity THE COMMODITY PROBLEM OF CYBERSECURITY

video

Oct 24, 2018

Ilijana Vavan and Max Frolov discuss why cybersecurity companies can’t rely on distributors to expand their partner landscape: It’s a lot of work for little money. NEXT GENERATION CYBERSECURITY FOR BUSINESS. Easy to use, ready to scale: True cybersecurity to protect against every type of...

Read More

CTE: Your Pathway to Cybersecurity Careers CTE: YOUR PATHWAY TO CYBERSECURITY CAREERS

infographic

Oct 24, 2018

How can CTE help me succeed in cybersecurity? CTE provides students with academic, technical and employability skills for a career in cybersecurity through: CTE courses in network security, cybersecurity, cybercrime and more. Work-based learning experiences, such as job shadowing and internships. Ca...

Read More

BehavioSec Fires Up Next-Gen Cybersecurity Solutions with Behavioral Biometrics BEHAVIOSEC FIRES UP NEXT-GEN CYBERSECURITY SOLUTIONS WITH BEHAVIORAL BIOMETRICS

blog article

Oct 24, 2018

There’s no silver bullet for online security, especially when it comes to user authentication. And enterprises aren’t alone in the struggle to keep up with the needs and demands of authentication. At the center of all of this lies user behavior and the challenge it presents to security. ...

Read More

TAKE CONTROL OF YOUR CLOUD TAKE CONTROL OF YOUR CLOUD

whitepaper

Oct 24, 2018

TATA COMMUNICATIONS PROVIDES THE CLOUD PLATFORM YOU NEED - INTEGRATING YOUR DISPARATE IT ENVIRONMENTS TO DELIVER A HIGHPERFORMANCE, RELIABLE AND SECURE APPLICATION EXPERIENCE. Total control: gain absolute visibility into all your enterprise cloud and IT resources with built-in automation, orchestrat...

Read More

Top 5 trends security teams should begin embracing to manage digital risk TOP 5 TRENDS SECURITY TEAMS SHOULD BEGIN EMBRACING TO MANAGE DIGITAL RISK

blog article

Oct 24, 2018

The digital world has opened up a plethora of opportunities for workplaces across the globe. Digital transformation means, among other things, seamless connectivity, the erasure of physical barriers and enterprises that can leverage the freedom of knowledge sharing without boundaries to enable great...

Read More

Carhartt Strengthens Security with Trend Micro’s Connected Threat Defense CARHARTT STRENGTHENS SECURITY WITH TREND MICRO’S CONNECTED THREAT DEFENSE

video

Oct 24, 2018

Founded in 1889, Carhartt, Inc., is a U.S.-based manufacturer that is world-famous for the quality and durability of the work clothes it produces. A family-owned company for over 120 years, Carhartt originally produced clothing primarily for railroad workers.  Today, Carhartt manufacturers a va...

Read More

Ten security controls for effective cybersecurity TEN SECURITY CONTROLS FOR EFFECTIVE CYBERSECURITY

infographic

Oct 24, 2018

Keeping an inventory of authorized and unauthorized software Having visibility over the software in your network can help you identify and remove prohibited software as well as the risk of unknown software exploitations. Keeping an inventory of authorized and unauthorized software Having visibility ...

Read More

Cybersecurity-Painkillers CYBERSECURITY-PAINKILLERS

video

Oct 24, 2018

Claudio Martinelli explains why doctors don’t care about cybersecurity and how cybersecurity companies need to address that. Digitalization should not impair cybersecurity efficiency. Healthcare providers are among the institutions in which we place the most trust; critical infrastructures in ...

Read More

Protecting Your ERP Applications PROTECTING YOUR ERP APPLICATIONS

blog article

Oct 23, 2018

After spending close to a decade in the world of cybersecurity, it was quite surprising to realize that so many organizations still struggle with properly protecting their ERP applications. Hello Onapsis friends and family! My name is Cindy Valladares and I joined this fantastic company a few months...

Read More

Cybersecurity tips from the pros CYBERSECURITY TIPS FROM THE PROS

blog article

Oct 23, 2018

Managing customer identities goes well beyond providing great front-end registration, authentication and single sign-on experiences. Janrain clients also know that their customers’ identities are held securely - with Janrain’s Secure Edge restricting external bad actors and our internal ...

Read More

Neovera-Equinix Partnership Story NEOVERA-EQUINIX PARTNERSHIP STORY

video

Oct 23, 2018

The foundation for Neovera's 'Secure Cloud Connect' Platform: A state-of-the-art "multicloud on-ramp' that enables up to 100% faster application performance and direct access to all major Clouds and SaaS providers (AWS, Azure, Office365, Google Cloud, G-Suite, Oracle Cloud, IBM ...

Read More

When Ransomware Stopped Working Harder and Started Working Smarter WHEN RANSOMWARE STOPPED WORKING HARDER AND STARTED WORKING SMARTER

blog article

Oct 23, 2018

Four years ago, we used to joke about the likelihood of Cryptolocker being delivered to every single email address on the internet. Back then, criminals would blast phishing emails to millions of email addresses, sending ransomware variants via infected links or Word Documents without any apparent r...

Read More

cybersecurity statistics of 2018 CYBERSECURITY STATISTICS OF 2018

infographic

Oct 22, 2018

The cybersecurity statistics of 2018 demonstrated the same trend as any year before that, with an interesting occurrence: the cryptocurrency hype shifted the focus of hackers to a new type of malware. $600 billion, or 0.8% of global GDP, was the total cost of cyberattacks in 2017. Every minute, ther...

Read More

Intel’s AI Privacy Policy White Paper INTEL’S AI PRIVACY POLICY WHITE PAPER

whitepaper

Oct 22, 2018

Two Technology Trends at Intel, we believe in the enormous potential of artifcial intelligence (AI) to improve people’s lives. Two trends that are infuencing AI and digital developments globally are: 1. Data analytics from the edge to the cloud, and 2. Increased mechanisms for data collection ...

Read More

Banking in focus: Your customers’ attitudes to cyber security BANKING IN FOCUS: YOUR CUSTOMERS’ ATTITUDES TO CYBER SECURITY

whitepaper

Oct 21, 2018

Effective cyber security defences are clearly a cornerstone of every financial service. As a differentiator, cyber security extends into an integrated, well-designed customer experience. Cyber security in the UK today As cybercrime rises and everyday services are increasingly digitalized, public opi...

Read More

Gain Confidence in Protecting Critical Infrastructure from Cyberattacks GAIN CONFIDENCE IN PROTECTING CRITICAL INFRASTRUCTURE FROM CYBERATTACKS

whitepaper

Oct 21, 2018

Protecting Critical Infrastructure Is a Local and Global Imperative Consider the services that society counts on everyday — everything from the electric grid, to utilities, to transportation systems, to communications networks, and more. Increasingly, these vital systems face potential disrupt...

Read More

CYBERHOUND’S UNIFIED THREAT MANAGEMENT SERVICE CYBERHOUND’S UNIFIED THREAT MANAGEMENT SERVICE

whitepaper

Oct 21, 2018

The UTM is the ultimate solution – providing cybersecurity, cybersafety and a range of tools to enable reliable Internet in class, reporting and behavioral analytics as well as in-class controls for teachers. Most importantly CyberHound’s UTM provides the ultimate level of protection for...

Read More

GDPR: How Masergy’s Managed Detection and Response Service Helps Enterprises Detect, Report, and Respond to Security Threats GDPR: HOW MASERGY’S MANAGED DETECTION AND RESPONSE SERVICE HELPS ENTERPRISES DETECT, REPORT, AND RESPOND TO SECURITY THREATS

whitepaper

Oct 19, 2018

The GDPR and Masergy Managed Detection and Response (MDR) The European General Data Protection Regulation (GDPR) becomes applicable on May 25, 2018. In addition to applying to entities within the European Union (EU), the GDPR has a broad territorial scope and may apply to entities outside the EU tha...

Read More

HARNESSING DATA SCIENCE AND AI IN HEALTHCARE HARNESSING DATA SCIENCE AND AI IN HEALTHCARE

whitepaper

Oct 18, 2018

The promise that data science and artificial intelligence (AI) hold to transform the delivery of healthcare is undeniable. Healthcare as a sector, with all of the longitudinal data it holds on patients across their lifetimes, is positioned to take advantage of what data science and AI have to offer....

Read More

SECURING OUR NATION’S CRITICAL INFRASTRUCTURE SECURING OUR NATION’S CRITICAL INFRASTRUCTURE

infographic

Oct 18, 2018

Our day-to-day life depends on the country’s 16 sectors of critical infrastructure, which supply food, water, financial services, public health, communications and power along with other networks and systems. A disruption to this system, which is operated via the internet, can have significant...

Read More

Data Lake: Powering Security Insights DATA LAKE: POWERING SECURITY INSIGHTS

whitepaper

Oct 18, 2018

The high-tech industry is transitioning from traditional IT systems to a pool of integrated and loosely-coupled infrastructure and software components that generate huge amounts of data on a continual basis. Enterprises use metrics based on this data to address non-functional system requirements, an...

Read More

What is Pharming and How to Prevent These Attacks WHAT IS PHARMING AND HOW TO PREVENT THESE ATTACKS

blog article

Oct 18, 2018

The word Pharming is coined from the words “phishing” and “farming”. It refers to the cybercrime activities such as phishing, where a website’s traffic is hacked in order to steal the sensitive data. Basically, Pharming utilizes the sequence of letters that form an Inte...

Read More

Three secrets to becoming a mobile security superhero THREE SECRETS TO BECOMING A MOBILE SECURITY SUPERHERO

whitepaper

Oct 17, 2018

Three secrets to becoming a mobile security superhero As more workplaces become everywhere workplaces, cyber threats and attacks increasingly target mobile devices. Through the eyes of many business leaders, opening a presentation or other document on a mobile device is hardly different from doing t...

Read More

CIPHER Named to Top 100 MSSPs of 2018 list as the Top 15 Worldwide CIPHER NAMED TO TOP 100 MSSPS OF 2018 LIST AS THE TOP 15 WORLDWIDE

blog article

Oct 17, 2018

MSSP Alert, published by After Nines Inc, has named CIPHER Security to the Top 100 MSSPs list for 2018. The list and research identify and honor the top 100 managed security services providers (MSSPs) that specialize in comprehensive, outsourced cyber security services. The Top 100 MSSP rankings are...

Read More

Fileless Malware the Stealth Attacker FILELESS MALWARE THE STEALTH ATTACKER

whitepaper

Oct 17, 2018

Fileless malware (FM), aka “non-malware”, or “fileless infection”, is a form of malicious computer attack that exists exclusively within the realm of volatile data storage components such as RAM, in-memory processes, and service areas This differentiates this form of malware ...

Read More

10 Tips to Take Control of Your Public Wi-Fi Security 10 TIPS TO TAKE CONTROL OF YOUR PUBLIC WI-FI SECURITY

blog article

Oct 17, 2018

The amazing ability to surf from anywhere sometimes distracts us from a very basic fact: the information may flow to us – but it can flow from us, in other, undesirable directions. So whether you are on your way to a vacation in a city that offers public Wi-Fi or you live in a city that is tou...

Read More

Securing payments with Twilio programmable voice SECURING PAYMENTS WITH TWILIO PROGRAMMABLE VOICE

whitepaper

Oct 17, 2018

Credit card fraud is the most common form of identity theft, with over 14.2 million accounts exposed and fraud losses totaling $905 million in 2017, according to a report by the Federal Trade Commission (FTC)1. At Twilio, we understand with stakes this high, mitigating the risk of a potential securi...

Read More

Security-as-a-Service in the Carrier Cloud: How CSPs Can Capture the SMB Opportunity SECURITY-AS-A-SERVICE IN THE CARRIER CLOUD: HOW CSPS CAN CAPTURE THE SMB OPPORTUNITY

whitepaper

Oct 17, 2018

The ongoing adoption of cloud computing by communications service providers (CSPs) continues to fundamentally reshape their business models and technology strategies on several levels. One such area that is garnering significant attention is the impact of the cloud on security services. This is beca...

Read More

Protect Your PC from Ransomware, Hijackers, Viruses & Other Malware | Try SpyHunter Today! PROTECT YOUR PC FROM RANSOMWARE, HIJACKERS, VIRUSES & OTHER MALWARE | TRY SPYHUNTER TODAY!

video

Oct 17, 2018

Don’t become the next victim of a malware attack and check your computer for malware with SpyHunter. SpyHunter is a powerful anti-malware program that detects and removes ransomware,  rogueware, viruses, trojans, worms, rootkits, botnets, spyware, adware, browser hijackers and other types...

Read More

So, You SO, YOU'VE EXPERIENCED A HIPAA BREACH—NOW WHAT?

blog article

Oct 17, 2018

It’s a day every CISO dreads. You think you’ve been doing everything right, but despite your best efforts, you’ve experienced a HIPAA breach, and now the OCR is coming in to perform an investigation. What should you do? First, take a deep breath. Relax. While what you do in the fol...

Read More

Exposed -Takeaways from the 2018 State of Privacy and Security Awareness Report EXPOSED -TAKEAWAYS FROM THE 2018 STATE OF PRIVACY AND SECURITY AWARENESS REPORT

infographic

Oct 16, 2018

Each year, we survey just more than a thousand individuals about their cybersecurity and privacy habits in the workplace. After analyzing the data, we compiled our findings into the State of Privacy and Security Awareness Report. The insights collected become the benchmark for year-over-year compari...

Read More

8 breakthrough events in the history of cybersecurity 8 BREAKTHROUGH EVENTS IN THE HISTORY OF CYBERSECURITY

infographic

Oct 16, 2018

cyber-attack is a strike against a computer system, network, or internet-enabled application or device. These attacks happen daily and are constantly evolving. In the past 50 years, cyber attacks have evolved from tiny hacks created by high-school students to state-sponsored attacks compromising pre...

Read More

THE STATE OF CYBERSECURITY IN CENTRAL VIRGINIA THE STATE OF CYBERSECURITY IN CENTRAL VIRGINIA

whitepaper

Oct 16, 2018

The Charlottesville Regional Chamber of Commerce is pleased to present the results of our second annual benchmark study, The State of Cybersecurity in Central Virginia 2018, co-sponsored by Advanced Network Systems, Inc. This report provides insights into: (a) the perceptions of regional business ow...

Read More

Routing Security for Policymakers: An Internet Society White Paper ROUTING SECURITY FOR POLICYMAKERS: AN INTERNET SOCIETY WHITE PAPER

whitepaper

Oct 16, 2018

Although unseen to the average user, Internet Protocol (IP) routing underpins the Internet. By ensuring that packets1 go where they are supposed to, routing2 has a central role in the reliable function of the Internet. It ensures that emails reach the right recipients, e-commerce sites remain operat...

Read More

Think Before You Click THINK BEFORE YOU CLICK

infographic

Oct 16, 2018

30% 30% of phishing messages get opened by targeted users1. 78% of people claim to be aware of the risks of unknown links in emails. And yet they click anyway2. 95% of all attacks on enterprise networks are the result of successful spear phishing3.

Read More

Getting physical with Hybrid Cloud security GETTING PHYSICAL WITH HYBRID CLOUD SECURITY

whitepaper

Oct 16, 2018

In this whitepaper we outline how Interxion Cloud Connect service offers enterprises the most secure and resilient Hybrid Cloud solution. Combining physical security, round the clock maintenance and support, and more than enough redundancy to cope with the unexpected, Interxion’s colocation da...

Read More

5 Cybersecurity Myths – and Facts 5 CYBERSECURITY MYTHS – AND FACTS

blog article

Oct 16, 2018

Let’s face it: Cybersecurity and identity theft aren’t things we like to think about. And according to recent research, many of us aren’t thinking about it at all. Many of us get an antivirus program, try to use strong passwords, and hope those efforts are enough. But are they? The...

Read More

GREYENERGY A successor to BlackEnergy GREYENERGY A SUCCESSOR TO BLACKENERGY

whitepaper

Oct 16, 2018

ESET researchers have discovered and analyzed advanced malware, previously undocumented, that has been used in targeted attacks against critical infrastructure organizations in Central and Eastern Europe. The malware, named GreyEnergy by ESET researchers, exhibits many conceptual similarities with B...

Read More

Cyber Security: Protecting your Business CYBER SECURITY: PROTECTING YOUR BUSINESS

video

Oct 16, 2018

Today we talk about 13 Practical tips to help you protect your business against a Cyber Attack. Tonnes of useful content in here, and I plan to go through each item in more detail in coming weeks.

Read More

The 5 most common reasons for implementing ISO 27001 THE 5 MOST COMMON REASONS FOR IMPLEMENTING ISO 27001

blog article

Oct 16, 2018

If you’re considering implementing ISO 27001, the international standard for information security, you’ve probably heard experts like us talk about the benefits. However, it’s always best to find out what organisations with first-hand experience think, which is why we created our I...

Read More

<strong>Indegy Device Integrity</strong> INDEGY DEVICE INTEGRITY

whitepaper

Oct 16, 2018

This document will explain the OT challenges faced by IT security teams. It will outline why you need Indegy Device Integrity, how it works, what it delivers, why it’s safe and the available options for implementation. More... Read More


Transforming businesses through mobility TRANSFORMING BUSINESSES THROUGH MOBILITY

whitepaper

Oct 15, 2018

Could your employees’ mobile devices be the next target for cyber-criminals? Your organisation almost certainly has some form of anti-malware or anti-virus software on your desktop and laptop PCs – this kind of “endpoint protection” is now a basic requirement in most security...

Read More

Cloud Computing and the Shifting Role of Cyber Security CLOUD COMPUTING AND THE SHIFTING ROLE OF CYBER SECURITY

blog article

Oct 15, 2018

As cloud computing changes the government technology landscape, the conversations around security must change as well. It is safe to say that cloud computing and cyber security have been the dominant technology topics in the federal government for the past decade and continue to be today. Look no fu...

Read More

IBM Unveils Industry’s First Security Operations Center on Wheels IBM UNVEILS INDUSTRY’S FIRST SECURITY OPERATIONS CENTER ON WHEELS

video

Oct 15, 2018

IBM Security today announced the industry’s first mobile Security Operations Center, capable of traveling onsite for cybersecurity training, preparedness, and response. The IBM X-Force Command Cyber Tactical Operations Center (C-TOC) will travel around the U.S. and Europe, running incident res...

Read More

THE BUSINESS IMPACTS OF A CYBERSECURITY CULTURE THE BUSINESS IMPACTS OF A CYBERSECURITY CULTURE

infographic

Oct 15, 2018

Fewer than half of organizations say their security culture is very successful— yet most recognize the numerous benefits a culture of cybersecurity can bring, including a stronger reputation, deeper customer trust, and even higher profit. Global technology association ISACA and the CMMI Instit...

Read More

ISTR Living off the land and fileless attack techniques ISTR LIVING OFF THE LAND AND FILELESS ATTACK TECHNIQUES

whitepaper

Oct 12, 2018

“Living off the land” is one clear trend in targeted cyber attacks at the moment. Attackers are increasingly making use of tools already installed on targeted computers or are running simple scripts and shellcode directly in memory. Creating less new files on the hard disk means less cha...

Read More

The Risks of Storing Your Passwords in Google Sheets THE RISKS OF STORING YOUR PASSWORDS IN GOOGLE SHEETS

blog article

Oct 12, 2018

Our team loves Google. We use it every day to search, email, store and share documents, and keep our lives (both work and personal) more organized. Honestly, how did we ever function without it? For someone who has no system in place to keep track of their passwords then Google Sheets is a great pla...

Read More

MindSphere Enabling the world’s industries to drive their digital transformations MINDSPHERE ENABLING THE WORLD’S INDUSTRIES TO DRIVE THEIR DIGITAL TRANSFORMATIONS

whitepaper

Oct 12, 2018

Siemens’ MindSphere, a cloud-based, open Internet of Things (IoT) operating system, enables industries worldwide to link their machines and physical infrastructure to the digital world easily, quickly and economically. Harnessing data from virtually any number of connected intelligent devices,...

Read More

A Career in Cybersecurity Has Many Positives, But It’s Not Without Challenges A CAREER IN CYBERSECURITY HAS MANY POSITIVES, BUT IT’S NOT WITHOUT CHALLENGES

blog article

Oct 12, 2018

There aren’t many fields where the majority say they’re happy with their profession. A satisfying career path—one where we feel successful—can be a long journey that most of us aren’t taught in school. In fact, 70 percent of workers say they don’t feel satisfied w...

Read More

What is Crimeware? How to Protect Yourself from Crimeware? WHAT IS CRIMEWARE? HOW TO PROTECT YOURSELF FROM CRIMEWARE?

blog article

Oct 12, 2018

Crimeware is a set of programs or any computer program that has been designed to facilitate illegal activity online. Many spyware programs, keyloggers, and browser hijackers can be considered crimeware, although only those used illicitly. The phishing kit is one common type of crimeware that is a co...

Read More

Cybersecurity Education Series: What Is Email Fraud? CYBERSECURITY EDUCATION SERIES: WHAT IS EMAIL FRAUD?

blog article

Oct 12, 2018

Since its inception, email has been a favorite target for cyber criminals hoping to steal sensitive data, user credentials, and company funds. In response, organizations have deployed a wide range of email security tools. But despite increased investment in defense, email fraud is still on the rise....

Read More

CROWDSTRIKE FALCON:SETTING THE NEW STANDARD IN ENDPOINT PROTECTION CROWDSTRIKE FALCON:SETTING THE NEW STANDARD IN ENDPOINT PROTECTION

whitepaper

Oct 12, 2018

CrowdStrike believes it takes more than a few new detection features to qualify as a true next-generation endpoint security platform. Real "next-gen" solutions should offer a complete package of more advanced technology and human-powered intelligence to meet sophisticated attacks head-on. ...

Read More

What is website security? WHAT IS WEBSITE SECURITY?

blog article

Oct 11, 2018

You’ve launched your website and done all you can to ensure its success, but you may have overlooked a critical component: website security. Cyberattacks cause costly clean-up, damage your reputation, and discourage visitors from coming back. Fortunately, you can prevent it all with effective ...

Read More

Design. Build. Protect. Delivering Cybersecurity Services to the Aviation Industry DESIGN. BUILD. PROTECT. DELIVERING CYBERSECURITY SERVICES TO THE AVIATION INDUSTRY

whitepaper

Oct 11, 2018

Working Behind the Scenes Many are familiar with Parsons’ rich history of and reputation providing a full spectrum of engineering, construction, and program management services for the aviation industry. What we may not know is that–for more than 30 years– Parsons has quietly worke...

Read More

Covata’s data security platform expands globally amid fast-growing demand COVATA’S DATA SECURITY PLATFORM EXPANDS GLOBALLY AMID FAST-GROWING DEMAND

video

Oct 11, 2018

Covata Ltd (ASX:CVT) managing director & CEO Ted Pretty speaks to Proactive Investors about the software development company’s suite of cyber and data security products. The global tech company started out as a private software developer for the Australian Department of Defense and began t...

Read More

Tomorrow’s Cloud Security, Today TOMORROW’S CLOUD SECURITY, TODAY

infographic

Oct 11, 2018

Oracle Cloud is built on a 40-year history of protecting data. How can an autonomous and secure cloud help protect your agency? ENCRYPTION. End-to-end data encryption. Encryption protection by default. Automatic key management protection. PATCHING. Automatic and consistent. Covers full stack: Firmwa...

Read More

Gallmaker: New Attack Group Eschews Malware to Live off the Land GALLMAKER: NEW ATTACK GROUP ESCHEWS MALWARE TO LIVE OFF THE LAND

blog article

Oct 10, 2018

This blog has been updated with a revised list of IoCs. An earlier list of IOCs attached to this blog was generated through an automated system and, due to the dual-use nature of the tools used by the group, erroneously included some low fidelity IoCs. Symantec researchers have uncovered a previousl...

Read More

RELENTLESS PROTECTION FROM CYBER THREATS RELENTLESS PROTECTION FROM CYBER THREATS

infographic

Oct 10, 2018

Combining innovative technology with frontline expertise, FireEye protects and defends like no one else can. Frontline Human Expertise. Innovative Technology. FireEye spends more than 1 million hours a year on the frontlines of cyber attacks. 700+ frontline/intelligence experts.

Read More

A new era for customer data – could security be ‘the new green’ for businesses? A NEW ERA FOR CUSTOMER DATA – COULD SECURITY BE ‘THE NEW GREEN’ FOR BUSINESSES?

blog article

Oct 10, 2018

There was a tipping point not so long ago in the realm of environmental responsibility for businesses. For some time, curbing emissions and waste was simply something the corporate world did if it had to, in order to comply with governmental regulations and avoid a hefty fine. Now, driven by a few &...

Read More

Automating Incident Response with IBM Resilient AUTOMATING INCIDENT RESPONSE WITH IBM RESILIENT

video

Oct 10, 2018

Agile and intelligent automation can help incident response teams battle cyberattacks faster, more efficient, and more effectively. In this video, IBM Resilient’s Allen Rogers outlines how the Resilient Incident Response Platform quickly and easily automates IR processes and streamline workflo...

Read More

DATA PROTECTION AND PRIVACY IN SMART ICT DATA PROTECTION AND PRIVACY IN SMART ICT

whitepaper

Oct 10, 2018

Today, modern computing techniques are capable of easily storing, processing and analyzing large amounts of and a variety of data. These techniques could correlate diverse datasets in order to create individual’s profiles, to gain insights, and to offer new digital services. Among others, thre...

Read More

Data Privacy and New Regulations Take Center Stage DATA PRIVACY AND NEW REGULATIONS TAKE CENTER STAGE

whitepaper

Oct 09, 2018

Data Privacy and New Regulations Take Center Stage. A number of important data breach trends emerged in the first half of 2018. One of the most notable of these developments was the introduction of new data protection regulations including the European Union’s General Data Protection Regulatio...

Read More

Secure Your Data with Interxion’s Cloud Connect Network SECURE YOUR DATA WITH INTERXION’S CLOUD CONNECT NETWORK

whitepaper

Oct 09, 2018

While the major hyperscale cloud platforms all invest heavily in security, data-in-transit over the public internet can still be intercepted. As soon as any enterprise data touches the internet, it’s fundamentally at risk - whether from DDoS attacks, malware infections or other threats. With e...

Read More

IT’S EVERYONE’S JOB TO ENSURE ONLINE SAFETY AT WORK IT’S EVERYONE’S JOB TO ENSURE ONLINE SAFETY AT WORK

infographic

Oct 09, 2018

The lines between our work and daily lives are becoming increasingly blurred, and it is more important than ever to be certain that smart cybersecurity practices carry over between the two. When you are on the job – whether it’s at a corporate office, local restaurant, healthcare provide...

Read More

Nationwide Cybersecurity Review: Summary Report 2017 NATIONWIDE CYBERSECURITY REVIEW: SUMMARY REPORT 2017

whitepaper

Oct 09, 2018

The Multi-State Information Sharing & Analysis Center® (MS-ISAC®) would like to thank everyone who has previously participated and continues to participate in the Nationwide Cybersecurity Review (NCSR). Your continued support in the NCSR helps us work towards our mission of improving the...

Read More

World-famous hacker offers his top cybersecurity tips WORLD-FAMOUS HACKER OFFERS HIS TOP CYBERSECURITY TIPS

video

Oct 09, 2018

Once one of FBI's Most Wanted, world's most famous hacker Kevin Mitnick joins BNN Bloomberg for a look at the evolution of cyber security and what companies and governments need to know to protect themselves.

Read More

Messaging, Malware, and Mobile Anti-Abuse Working Group (M3AAWG) Awards the Business Email Compromise List with the 2018 JD Falk Award MESSAGING, MALWARE, AND MOBILE ANTI-ABUSE WORKING GROUP (M3AAWG) AWARDS THE BUSINESS EMAIL COMPROMISE LIST WITH THE 2018 JD FALK AWARD

blog article

Oct 09, 2018

Business email compromise (BEC) /email fraud continues to be a serious pain point for organizations worldwide—and according to the FBI, it has resulted in $12.5B in losses. To help combat the issue, a private group of more than 530 organizations/individuals called the Business Email Compromise...

Read More

CYBER IMPERATIVE: PRESERVE AND STRENGTHEN PUBLIC-PRIVATE PARTNERSHIPS CYBER IMPERATIVE: PRESERVE AND STRENGTHEN PUBLIC-PRIVATE PARTNERSHIPS

whitepaper

Oct 09, 2018

Cybersecurity is a major national and economic security challenge. The United States recognizes the cyber threat, yet it is difficult to “solve” for several reasons: the inherently global nature of the adversary and the battlefield, the rapid evolution of tactics and technology, the invo...

Read More

HHS Urges FDA to Do More on Medical Device Security HHS URGES FDA TO DO MORE ON MEDICAL DEVICE SECURITY

blog article

Oct 08, 2018

We’ve been writing for a few years now about the dangers of connected medical devices and how the U.S. F.D.A. has sought to increase the security of these devices. Previously, in St. Jude Takes Steps to Secure Vulnerable Medical Implants we covered the security surrounding St. Jude medical dev...

Read More

The Future of Financial Stability and Cyber Risk THE FUTURE OF FINANCIAL STABILITY AND CYBER RISK

whitepaper

Oct 07, 2018

Cyber risks pose unique threats to financial stability that are not well understood or managed, despite growing investment in research and dependence by financial institutions, consumers, and governments on cyber technologies. This paper considers the ways in which cyber risks differ from traditiona...

Read More

4 Cybersecurity Factors Every Board Member Must Consider for 2019 Planning 4 CYBERSECURITY FACTORS EVERY BOARD MEMBER MUST CONSIDER FOR 2019 PLANNING

blog article

Oct 05, 2018

Cybersecurity is a growing topic of discussion in Board meetings everywhere — given this fact, Board members need to be prepared to speak knowledgeably about their organization’s cybersecurity posture and programs. As businesses near the last quarter of the year and begin their planning ...

Read More

F-Secure Payment Card Industry Data Security F-SECURE PAYMENT CARD INDUSTRY DATA SECURITY

video

Oct 04, 2018

F-Secure can help your organization achieve PCI DSS compliance regardless of your starting point. In addition to providing compliancy assessment, F-Secure also offers guidance throughout the entire PCI lifecycle.

Read More

NIST Seeks Public Comment on Managing Internet of Things Cybersecurity and Privacy Risks NIST SEEKS PUBLIC COMMENT ON MANAGING INTERNET OF THINGS CYBERSECURITY AND PRIVACY RISKS

blog article

Oct 04, 2018

The U.S. Department of Commerce’s National Institute of Standards and Technology recently announced that it is seeking public comment on Draft NISTIR 8228, Considerations for Managing Internet of Things (“IoT”) Cybersecurity and Privacy Risks (the “Draft Report”). The d...

Read More

The Massive Data Breach Reducing Dwell Time and the Resulting Damage THE MASSIVE DATA BREACH REDUCING DWELL TIME AND THE RESULTING DAMAGE

blog article

Oct 04, 2018

This week we’ve seen what can happen when a major company like Facebook—or any organization for that matter—is faced with a massive data breach. They face possible loss of intellectual property and brand damage if they expose the privacy of their customers, partners, and workforce....

Read More

Cybersecurity Starts with Your Employees CYBERSECURITY STARTS WITH YOUR EMPLOYEES

blog article

Oct 04, 2018

We’re all familiar with Smokey the Bear and the “Only You Can Prevent Wildfires” slogan. In 2015, Smokey got an update and the new “Receive a Bear Hug” ads ran nationwide. In the ad, Smokey runs out of the woods and gives a big bearhug to a camper for properly checking ...

Read More

HOLIDAY CYBER RISK NuData Security Intelligence Report HOLIDAY CYBER RISK NUDATA SECURITY INTELLIGENCE REPORT

infographic

Oct 03, 2018

Fraudsters use ever-morphing cyber fraud methods over the holidays. NuData’s intelligence supports industry trends that e-commerce is increasingly mobile and high-risk. NuData Security analyzed over 80 billion behavioral events annually. Increased fraud & risk across the board.

Read More

Emerging trend of spreading malware through IQY files EMERGING TREND OF SPREADING MALWARE THROUGH IQY FILES

blog article

Oct 03, 2018

Nowadays attackers are searching for new techniques to spread malware, recently we came across a new emerging way to deliver malware through IQY file. Till now we had seen spread of malware through various file types and chains such as Word document, Script, JAVA files. IQY file is an Excel Web Quer...

Read More

Facebook data breach: what you need to know FACEBOOK DATA BREACH: WHAT YOU NEED TO KNOW

blog article

Oct 03, 2018

On the afternoon of Friday, 28 September, Facebook announced that 50 million Facebook accounts had been breached. What happened? Facebook’s Vice President of Product Management, Guy Rosen, announced that the security breach affected 50 million users. It is believed the attackers exploited a vu...

Read More

Pipeline Management and Forecasting Are Key to Improving the Sales Experience PIPELINE MANAGEMENT AND FORECASTING ARE KEY TO IMPROVING THE SALES EXPERIENCE

whitepaper

Oct 03, 2018

Let’s explore some of the current processes around pipeline management and forecasting and how they can be improved.

Read More

Change the sales rep experience, improve the customer experience CHANGE THE SALES REP EXPERIENCE, IMPROVE THE CUSTOMER EXPERIENCE

whitepaper

Oct 03, 2018

The first CRM launch truly changed the way sales were managed. We went from tracking customers on spreadsheets (and even in rolodexes) to tracking them and their attendant opportunities with software. It wasn’t long before reps started to feel the purpose of a CRM was more about preserving the...

Read More

Driving Sales Behavior With Non-Cash Rewards DRIVING SALES BEHAVIOR WITH NON-CASH REWARDS

whitepaper

Oct 03, 2018

In the end, you need to be rewarding your sales reps with more than just money if you want to keep them motivated and if you want your sales compensation plan to deliver on its promises.

Read More

Accounting Firm Harnesses AccuRoute to Streamline Fax Communications, Improve Efficiency, and Ensure Data Security ACCOUNTING FIRM HARNESSES ACCUROUTE TO STREAMLINE FAX COMMUNICATIONS, IMPROVE EFFICIENCY, AND ENSURE DATA SECURITY

whitepaper

Oct 02, 2018

It was time for this top three Global Accounting Firm (the Firm) to update their processes. Their existing document capture solution was no longer able to handle the current volume of their scanning and OCR requirements — up to three million pages per month, many of them multipaged documents r...

Read More

4 Emerging Retail Cybersecurity Threats (and How to Stop Them) 4 EMERGING RETAIL CYBERSECURITY THREATS (AND HOW TO STOP THEM)

blog article

Oct 02, 2018

The retail industry has always been a favorite target of cyber criminals. We all remember major data breaches like those that affected Target, TJX, and Home Depot — but the truth is that cybersecurity threats have been a daily concern of retailers for a long time. Point of Sale (POS) system ha...

Read More

Why Cybersecurity Matters Brought to you in partnership with and What Registrars, Enrollment Managers and Higher Education Should Do About It WHY CYBERSECURITY MATTERS BROUGHT TO YOU IN PARTNERSHIP WITH AND WHAT REGISTRARS, ENROLLMENT MANAGERS AND HIGHER EDUCATION SHOULD DO ABOUT IT

whitepaper

Oct 02, 2018

The purpose of this white paper, jointly written by the National Student Clearinghouse, EDUCAUSE and REN-ISAC, is to build upon registrars’, enrollment managers’, IT’s and higher education’s day-to-day, nationwide dialog around cybersecurity and vulnerabilities.

Read More

IMPROVING YOUR CYBER LITERACY IMPROVING YOUR CYBER LITERACY

infographic

Oct 01, 2018

The Internet of Things (loT) has ushered in new conveniences, increased opportunities, and added means to share, connect, shop, and more. The integration of the Internet into almost every aspect of our lives has fundamentally redefined the way we as consumers operate. With this phenomenon, however, ...

Read More

Why Cybersecurity Matters: Brought to you in partnership with and What Registrars, Enrollment Managers and Higher Education Should Do About It WHY CYBERSECURITY MATTERS: BROUGHT TO YOU IN PARTNERSHIP WITH AND WHAT REGISTRARS, ENROLLMENT MANAGERS AND HIGHER EDUCATION SHOULD DO ABOUT IT

whitepaper

Oct 01, 2018

The purpose of this white paper, jointly written by the National Student Clearinghouse, EDUCAUSE and REN-ISAC, is to build upon registrars’, enrollment managers’, IT’s and higher education’s day-to-day, nationwide dialog around cybersecurity and vulnerabilities. The following...

Read More

What is Browser Hijacking? How to Get Rid of This Virus? WHAT IS BROWSER HIJACKING? HOW TO GET RID OF THIS VIRUS?

blog article

Oct 01, 2018

In computing, a browser hijacking refers to the malicious intrusions made by a hijacker for personal gains. In order to accomplish this, the hijacker uses a malicious software which is placed on the internet browser that alters the activity of the browser. In all the cases, the user is typically una...

Read More

ArcGIS Secure Mobile Implementation Patterns ARCGIS SECURE MOBILE IMPLEMENTATION PATTERNS

whitepaper

Sep 30, 2018

In recent years, enterprise geographic information system (GIS) deployments have increasingly moved from traditional office-based workflows to leveraging GIS apps in the field with mobile technology. This makes security considerations more complex and challenging for information technology (IT) arch...

Read More

EOH Managed Security as a Service (MSaaS) EOH MANAGED SECURITY AS A SERVICE (MSAAS)

whitepaper

Sep 30, 2018

Cybersecurity is now a top business concern. No one is safe from cybercrime, yet many organizations continue to ignore or underestimate their vulnerability to attack. Adopting an ‘it’ll never happen to me’ approach is tantamount to going skydiving without a parachute, and handing t...

Read More

Incident Response Plan: 6 Essential Steps for Responding to a Security Incident INCIDENT RESPONSE PLAN: 6 ESSENTIAL STEPS FOR RESPONDING TO A SECURITY INCIDENT

blog article

Sep 29, 2018

During a cybersecurity incident, security teams will face many unknowns and a frenzy of activity. In such a hectic environment, they may fail to follow proper incident response procedures to effectively limit the damage. This is important because a security incident can be a high-pressure situation,...

Read More

20 Ways to Block Mobile Attacks 20 WAYS TO BLOCK MOBILE ATTACKS

infographic

Sep 28, 2018

To start your National Cyber Security Awareness Month (NCSAM) here is a goodie for your users to kick things off. Very similar to our unique job-aid: Social Engineering Red Flags™ with 22 things to watch out for in email, we created an InfoGraphic (PDF) about Mobile threats that you can send t...

Read More

Excerpts from: Using the ATT&CK™ Framework to Mature Your Threat Hunting Program EXCERPTS FROM: USING THE ATT&CK™ FRAMEWORK TO MATURE YOUR THREAT HUNTING PROGRAM

blog article

Sep 28, 2018

Every threat hunt starts with intelligence. As one of the industry’s most comprehensive knowledge bases for adversary behavior, ATT&CK provides a structure for hunters to build their hypotheses and search for threats.  Recently Carbon Black, Red Canary and MITRE teamed up for the webi...

Read More

BICS CORPORATE SECURITY STATEMENT BICS CORPORATE SECURITY STATEMENT

whitepaper

Sep 28, 2018

Belgacom International Carrier Services (BICS) takes the security of its information, infrastructure and applications very seriously. Its commitment to corporate security is shown through the implementation of policies, controls and procedures, as well as the allocation of dedicated resources requir...

Read More

CYBER SECURITY TIPS FOR EMPLOYEES CYBER SECURITY TIPS FOR EMPLOYEES

infographic

Sep 27, 2018

As reliance on cloud computing and network infrastructure grows, organizations are increasingly targeted by hackers who want to gain access to sensitive information or hold critical data hostage by installing malware. Protect yourself and your company from the growing risk of cyberattacks with these...

Read More

Quantifying Cybersecurity Risk: A Beginners Guide QUANTIFYING CYBERSECURITY RISK: A BEGINNERS GUIDE

blog article

Sep 27, 2018

For those who have been paying attention, this dramatic upward trend is hardly surprising. Data breaches are getting bigger, more damaging, and more expensive. It’s challenging to read the news without seeing a story about one massive cyber attack or another. In many industries, the fear of cy...

Read More

Cyber and Network Security Overview at ECPI University Online CYBER AND NETWORK SECURITY OVERVIEW AT ECPI UNIVERSITY ONLINE

video

Sep 27, 2018

Do you want to stop cyber-crime before it starts? If preventing, detecting, and battling digital crime is important to you, a career in cyber security may be the perfect fit, and a Computer and Information Science degree with a major in Cyber and Network Security could be a great way to start! As a ...

Read More

What is Macro Virus and How to Prevent Them WHAT IS MACRO VIRUS AND HOW TO PREVENT THEM

blog article

Sep 27, 2018

What is Macro Virus. A virus that adds its code to the macros associated with spreadsheets, documents, and other data files in a system is called as a macro virus. Any computer infected by macro virus needs an antivirus program to remove it from all its hiding places. A macro virus is designed to ca...

Read More

Apache Struts, RCEs, and the Equifax Breach Anniversary APACHE STRUTS, RCES, AND THE EQUIFAX BREACH ANNIVERSARY

blog article

Sep 27, 2018

We just passed the one-year anniversary of Equifax’s announcement of their massive data breach due to an exploit of an Apache Struts vulnerability (CVE-2017-5638) – and incidentally, at nearly the same time that Apache announced another critical Apache Struts security flaw (). The latest...

Read More

The World’s Most Popular Coding Language Happens to be Most Hackers’ Weapon of Choice THE WORLD’S MOST POPULAR CODING LANGUAGE HAPPENS TO BE MOST HACKERS’ WEAPON OF CHOICE

blog article

Sep 26, 2018

Python will soon be the world’s most prevalent coding language. That’s quite a statement, but if you look at its simplicity, flexibility and the relative ease with which folks pick it up, it’s not hard to see why The Economist recently touted it as the soon-to-be most used language...

Read More

Taming Chaos Securing the Enterprise Network TAMING CHAOS SECURING THE ENTERPRISE NETWORK

infographic

Sep 26, 2018

Oracle Communications surveyed 277 IT and telecom decision makers at medium and large businesses worldwide in its recent report, “Enterprise Networks in Transition: Taming the Chaos” to see what their biggest challenges are, and what solutions they believe will help.

Read More

Adwind Trojan: How to Stay Safe from Malware ADWIND TROJAN: HOW TO STAY SAFE FROM MALWARE

blog article

Sep 26, 2018

The Adwind Trojan virus, a Remote Access Trojan (RAT), has been noticed to use antivirus software and spreadsheets programs like Excel in order to infect your computer. The virus is back with new tricks trying to bypass your antivirus software in order to infect your computer with dangerous malware....

Read More

5 Key Cybersecurity Trends – What I Learned at Exabeam Spotlight 2018 5 KEY CYBERSECURITY TRENDS – WHAT I LEARNED AT EXABEAM SPOTLIGHT 2018

blog article

Sep 26, 2018

Many attendees were quick to say that their organization’s data is increasingly in the cloud. While most talked about their hybrid data center strategy, the emphasis was on moving more IT resources to infrastructure-as-a-service (IaaS) providers like AWS and Azure, as well as deploying softwar...

Read More

Excerpts From “Why Companies Are Replacing AV with Advanced Endpoint Security” EXCERPTS FROM “WHY COMPANIES ARE REPLACING AV WITH ADVANCED ENDPOINT SECURITY”

blog article

Sep 26, 2018

Is legacy antivirus failing to keep your endpoints secure? In Carbon Black’s recent webinar, Fulcanelli Chavez, Sr. Security Operations Analyst at D.A. Davidson, shared how switching from McAfee to Cb Defense has improved protection and simplified operations for his team. Below are excerpts fr...

Read More

The Guidelines on mobile money data protection THE GUIDELINES ON MOBILE MONEY DATA PROTECTION

whitepaper

Sep 26, 2018

The GSMA represents the interests of mobile operators worldwide, uniting more than 750 operators with over 350 companies in the broader mobile ecosystem, including handset and device makers, software companies, equipment providers and internet companies, as well as organisations in adjacent industry...

Read More

Today TODAY'S CYBERSECURITY REALITY IN 2018

infographic

Sep 25, 2018

Cybersecurity practitioners face challenges when it comes to having a security program that operates effectively. Sometimes it means looking at cybersecurity through the lens of capability and focus on the understanding of what risks there are. Download our infographic for a closer look at the cyber...

Read More

CROWDSTRIKE FALCON SANDBOX MALWARE ANALYSIS CROWDSTRIKE FALCON SANDBOX MALWARE ANALYSIS

whitepaper

Sep 25, 2018

When an organization is hit by a cyberattack, visibility into the intent of the attack must be prioritized at the highest level. You need to quickly understand what the malware was attempting to do and how it works, so you can contain any damage and learn how to prevent attacks in the future. Today,...

Read More

15 Cyber Security Tips No CEO Should Be Without 15 CYBER SECURITY TIPS NO CEO SHOULD BE WITHOUT

video

Sep 25, 2018

Historically, cybersecurity has been an area that is housed solely in the technology department of a company, whether that consists of one or twenty employees. But more and more executives are understanding the importance of being not only knowledgeable but also involved in the conversations and dec...

Read More

What is Trojan Virus? How they work and methods to be protected? WHAT IS TROJAN VIRUS? HOW THEY WORK AND METHODS TO BE PROTECTED?

blog article

Sep 25, 2018

Trojans or Trojan Horses is often mimicked as genuine software by malware authors to gain access to the target victim’s system. Most often the users are tricked by means of social engineering that loads and executes the trojans in the background without the users ‘knowledge. Then the ins...

Read More

Threats Report McAfee Labs THREATS REPORT MCAFEE LABS

infographic

Sep 24, 2018

Cybercriminals Continue to Follow the Money Check Your Bill on Google Play Reported Incidents by Region Cryptocurrencies remain a target for cybercriminals, with total coin miner malware nearly doubling in Q2. Mining for cryptocurrencies requires significant computing power and equipment can be expe...

Read More

How to Protect Your Paycheck: FBI Issues Credential Phishing Alert as Attackers Target Direct Deposits HOW TO PROTECT YOUR PAYCHECK: FBI ISSUES CREDENTIAL PHISHING ALERT AS ATTACKERS TARGET DIRECT DEPOSITS

blog article

Sep 24, 2018

Last week the FBI issued an alert warning organization that cybercriminals are actively using phishing emails to steal consumer log-in credentials for their online payroll accounts. At Proofpoint, we’ve seen this type of attack for a few years now, and unfortunately, all it takes is one creden...

Read More

Sian John of Microsoft UK discusses the state of cybersecurity in business SIAN JOHN OF MICROSOFT UK DISCUSSES THE STATE OF CYBERSECURITY IN BUSINESS

video

Sep 24, 2018

Over the last few years, IT security has become a lot more mainstream within organizations. Sian John discusses the need for businesses to focus on protecting information, identities and devices. Originally filmed for https://www.gemalto.com/review/

Read More

The Need of Linux Antivirus THE NEED OF LINUX ANTIVIRUS

blog article

Sep 24, 2018

In the IT world, it is generally assumed that Linux is more secure compared to other operating systems. In the recent times, it is noticed that the targeted attacks on Linux based machines are on the rise. No wonder, the Linux platform is now widely used on internal file servers and web servers. Bes...

Read More

VMWARE WORKSPACE ONE IS A BETTER CHOICE THAN CITRIX VMWARE WORKSPACE ONE IS A BETTER CHOICE THAN CITRIX

whitepaper

Sep 23, 2018

The intended audience for this paper is IT decision makers and line-of-business owners that are tasked with transitioning their workforce into a modern place of work. The insights presented here will be helpful for executing a digital workspace transformation strategy. The Future of Work Automation....

Read More

How to Stop Cyberattacks on Your IoT Infrastructure HOW TO STOP CYBERATTACKS ON YOUR IOT INFRASTRUCTURE

blog article

Sep 21, 2018

In part one of our internet of things (IoT) blog series, we provided background on the tremendous growth of IoT and their innovative use cases—from alarm systems, to power grid monitoring, to devices that are combating honeybee colony collapse disorder. We also looked at the 600% increase in I...

Read More

Know How To Prevent Identity Theft KNOW HOW TO PREVENT IDENTITY THEFT

blog article

Sep 21, 2018

Today the increasing number of cyber attacks are targeted on individuals and small size businesses. The attacks are aimed at robbing an individual’s identity which is referred to as the identity theft. Thus, a stolen information, such as driving license detail or social security number or othe...

Read More

Security Leadership Series: An Important Principle for Every Cybersecurity Leader to Remember SECURITY LEADERSHIP SERIES: AN IMPORTANT PRINCIPLE FOR EVERY CYBERSECURITY LEADER TO REMEMBER

blog article

Sep 20, 2018

Here’s a principle every cybersecurity leader needs to acknowledge: Cybersecurity is not the single most important element of your company’s business. In reality, most businesses exist to make money or return some form of value to their stakeholders (unless you’re a nonprofit, in w...

Read More

Microsoft Windows Server 2016 Security MICROSOFT WINDOWS SERVER 2016 SECURITY

blog article

Sep 20, 2018

You may have been following our series of blog posts on Microsoft Windows Server security features and capabilities for reducing risk in your IT infrastructure. Today, we’ve compiled a list of all these blog posts. You can use them in two ways as you work to secure your Windows Server operatin...

Read More

Increased Use of a Delphi Packer to Evade Malware Classification INCREASED USE OF A DELPHI PACKER TO EVADE MALWARE CLASSIFICATION

blog article

Sep 20, 2018

The concept of "packing" or "crypting" a malicious program is widely popular among threat actors looking to bypass or defeat analysis by static and dynamic analysis tools. Evasion of classification and detection is an arms race in which new techniques are traded and used in the w...

Read More

How Do I Know If My Android Phone/Device Has Virus? HOW DO I KNOW IF MY ANDROID PHONE/DEVICE HAS VIRUS?

blog article

Sep 20, 2018

Cybercrime is at an all-time high. Criminals are not only targeting home users; they are also preying on businesses jeopardizing their websites and acquiring sensitive clientele information. How to know if your Android phone/device has a virus? Are you a potential victim of an online scam? How to pr...

Read More

EXPOSED: Key Takeaways from the 2018 State of Privacy and Security Awareness Report EXPOSED: KEY TAKEAWAYS FROM THE 2018 STATE OF PRIVACY AND SECURITY AWARENESS REPORT

infographic

Sep 19, 2018

We surveyed 1,024 U.S. employees to test their cybersecurity and data privacy knowledge. Respondents were asked a variety of questions that focus on real-world scenarios in eight threat vectors. Based upon their responses, we assigned them to one of three different risk profiles—Risk, Novice, ...

Read More

2018 Open Source Security and Risk Analysis Report 2018 OPEN SOURCE SECURITY AND RISK ANALYSIS REPORT

infographic

Sep 19, 2018

Black Duck On-Demand’s audits of over 1,100 commercial applications in 2017 highlight the ongoing challenges organizations face in effectively identifying and securing open source. Open source components are essential to application development.

Read More

Accelerating Your Journey to the Cloud with VMware Network Insight ACCELERATING YOUR JOURNEY TO THE CLOUD WITH VMWARE NETWORK INSIGHT

infographic

Sep 19, 2018

To drive growth, mobility and innovation, businesses are looking to embrace the public cloud, but face critical challenges: Limited visibility into the different applications running in their environment and the cost to support this infrastructure. Organizational silos across computer, networking an...

Read More

Does Windows 10 Need Antivirus? DOES WINDOWS 10 NEED ANTIVIRUS?

blog article

Sep 19, 2018

In today’s digital world, malware and cyber attacks have become ubiquitous. Gone are the days when there was only a handful of malicious programs such as viruses. Nowadays, new and powerful malware variants such as the ransomware, spyware, keyloggers, and various new forms of malware have beco...

Read More

START YOUR DIGITAL TRANSFORMATION JOURNEY TODAY START YOUR DIGITAL TRANSFORMATION JOURNEY TODAY

whitepaper

Sep 18, 2018

We’re living in an age of rapid digital transformation, with new technologies changing the way enterprises do business on a daily basis. As the pace of change continues to accelerate, you need a partner with the infrastructure to support manageable growth – and the tools to drive it. Tat...

Read More

HAB: The ‘Black Box’ of IoT Security Systems HAB: THE ‘BLACK BOX’ OF IOT SECURITY SYSTEMS

whitepaper

Sep 18, 2018

The never-ending global innovation race gave us some of the most disruptive goods and services in the last decade but also tremendous inefficiencies in sectors like energy, insurance, real estate, facility management, otherwise known as slow-moving or rather reluctant to innovation. Technology and n...

Read More

New Zero-Day Vulnerability Attack in Windows NEW ZERO-DAY VULNERABILITY ATTACK IN WINDOWS

blog article

Sep 18, 2018

A zero-day also known as Day Zero or 0-day refers to the computing vulnerability which is often sought by the hackers to exploit for selfish and illegal reasons. Zero Day Vulnerability Attacks are becoming more and more common these days. Recently, another one was discovered in Windows and it was im...

Read More

CYBERSECURITY RISK - A GAME PLAN FOR EFFECTIVE MEASUREMENT CYBERSECURITY RISK - A GAME PLAN FOR EFFECTIVE MEASUREMENT

infographic

Sep 17, 2018

Cybersecurity is becoming a numbers game and risk measurement is now on the board as an important business decision-making metric. Here’s what you need to know to start tackling the risk measurement challenge. 5 STEPS FOR MEASURING WHAT MATTERS. Focus on five priorities to identify the best ri...

Read More

3 Tips for Simple Security in a Complex World What the Cyber? 3 TIPS FOR SIMPLE SECURITY IN A COMPLEX WORLD WHAT THE CYBER?

video

Sep 17, 2018

Cyber security is very different than what it was 30 years ago. Today, a lot of this have changed, a lot things are more secure, but still the fundamental problems remain the same.  Online privacy, account and password management, and the increasing number of Internet connected devices in our h...

Read More

PERFORMANCE AND POSSIBLE ARRANGEMENTS OF PENETRATION TESTS PERFORMANCE AND POSSIBLE ARRANGEMENTS OF PENETRATION TESTS

whitepaper

Sep 15, 2018

SySS GmbH has been conducting security tests since 1998. The findings from these tests form the basis of this White Paper. SySS GmbH gained its experience by performing these tests both in large multinational enterprises and traditional medium-sized companies. This White Paper is based on the practi...

Read More

Data Security: When did you last check your printers? DATA SECURITY: WHEN DID YOU LAST CHECK YOUR PRINTERS?

blog article

Sep 14, 2018

Most enterprises have suffered at least one data breach through their printers. Meanwhile, researchers have recently highlighted the fact that many 3D printers are routinely being exposed online without any adequate access controls. Here’s the problem: too many of us overlook printers as dumb ...

Read More

MedImpact Protects Healthcare Data with our Multi-Layered Security MEDIMPACT PROTECTS HEALTHCARE DATA WITH OUR MULTI-LAYERED SECURITY

video

Sep 13, 2018

MedImpact is the largest privately held pharmacy benefit manager (PBM), serving health plans, self-funded employers, and government entities in the United States. Watch the video to learn how Frank Bunton, VP and CISO and Larry Biggs, IT Security Engineer from MedImpact discuss their multi layered s...

Read More

Building a Better Incident Response Plan BUILDING A BETTER INCIDENT RESPONSE PLAN

video

Sep 13, 2018

Despite growing cyber threats and data breach regulations, 75 percent of organizations do not have a complete, fully deployed security incident response plan. In this video, IBM Resilient’s Monica Dubeau outlines steps and strategies for building a robust, proven, and repeatable IR plan, helpi...

Read More

Guide To Survival The Data Breach GUIDE TO SURVIVAL THE DATA BREACH

blog article

Sep 13, 2018

Many of us might have fallen a prey to cyber criminals at least once in the last few years and suffered a bit due to data breach issues. In all cases, a cybercriminal uses malware to infiltrate the systems to cull out the required data, but if an antivirus software is installed then it can prevent s...

Read More

Data incident response process DATA INCIDENT RESPONSE PROCESS

whitepaper

Sep 12, 2018

Maintaining a safe and secure environment for customer data is Google Cloud’s highest priority. To protect customer data, Google runs an industry-leading information security operation that combines stringent processes, a world-class team, and multi layered information security and privacy inf...

Read More

ALL IT TAKES IS ONE ALL IT TAKES IS ONE

infographic

Sep 12, 2018

The FireEye Email Threat Report is the result of FireEye’s analysis of a sample set of over half-a-billion emails from January through June 2018. For more information about ever-evolving malware and malware-less email attacks, in-depth analysis of impersonation attacks and the current tactics ...

Read More

THE ILLICIT CRYPTOCURRENCY MINING THREAT THE ILLICIT CRYPTOCURRENCY MINING THREAT

whitepaper

Sep 12, 2018

Illicit cryptocurrency mining has increased significantly in just a few months. This activity poses both a short- and long-term threat to individuals and enterprises. This threat is not victimless or harmless, so individuals and organizations should take steps to protect their systems. This report l...

Read More

Battling Cyber Threats Using Next-Gen SIEM and Threat Intelligence BATTLING CYBER THREATS USING NEXT-GEN SIEM AND THREAT INTELLIGENCE

blog article

Sep 12, 2018

While SIEMs are central for SOC cybersecurity—collecting logs and data from multiple network sources for evaluation, analysis, and correlation of network events for threat detection—SIEMs are often not enough. With the growing sophistication of organized, modern cyber attackers and their...

Read More

How The ATT&CK™ Framework Can Mature Your Threat Hunting Program HOW THE ATT&CK™ FRAMEWORK CAN MATURE YOUR THREAT HUNTING PROGRAM

blog article

Sep 11, 2018

The truth about threat hunting is that it’s a process that matures with your security team.  The more you learn more about the threat landscape, the more you can operationalize that knowledge.  Because of this, it is important to work within a framework that can help you track the gr...

Read More

Symantec Endpoint Protection Cloud SYMANTEC ENDPOINT PROTECTION CLOUD

whitepaper

Sep 07, 2018

Protecting users and their devices is critical for organizations of all sizes. For businesses with limited IT staff, endpoint protection and control over all your users’ devices (desktops, laptops, tablets & smartphones) can be daunting. The need to address advanced threats with limited re...

Read More

Why cybersecurity training is crucial for your business WHY CYBERSECURITY TRAINING IS CRUCIAL FOR YOUR BUSINESS

infographic

Sep 06, 2018

Do you know the biggest threat to your business does not need to come from outside, but from within? Internal security threats do not necessarily mean spies being sent in by your competitors to crash your business, just as we see in the movies; rather it can be your employees — the same people...

Read More

Fallout Exploit Kit Used in Malvertising Campaign to Deliver GandCrab Ransomware FALLOUT EXPLOIT KIT USED IN MALVERTISING CAMPAIGN TO DELIVER GANDCRAB RANSOMWARE

blog article

Sep 06, 2018

Towards the end of August 2018, FireEye identified a new exploit kit (EK) that was being served up as part of a malvertising campaign affecting users in Japan, Korea, the Middle East, Southern Europe, and other countries in the Asia Pacific region. The first instance of the campaign was observed on ...

Read More

Getting Better Together in Cybersecurity GETTING BETTER TOGETHER IN CYBERSECURITY

blog article

Sep 06, 2018

“Determining Evil from Benign in the Normally Abnormal World of InfoSec” We cannot control our adversary. Although we can choose to control them once in our environment. We have little to no control over when the “big attack” happens. For too long I think we have focused so h...

Read More

RECOMMENDATIONS FOR SECURING THE VOTE RECOMMENDATIONS FOR SECURING THE VOTE

infographic

Sep 06, 2018

Today, U.S. elections are subject to aging equipment, targeting by external actors, and a lack of sustained funding. These issues highlight the need to create more resilient, adaptive, and secure election systems. Representative democracy only works if all eligible citizens can participate in electi...

Read More

Cybersecurity, Information Security, Network Security, Information Assurance: What’s the Difference? CYBERSECURITY, INFORMATION SECURITY, NETWORK SECURITY, INFORMATION ASSURANCE: WHAT’S THE DIFFERENCE?

blog article

Sep 06, 2018

As hackers, security breaches and malware attacks continue to dominate headlines, cyber crime has emerged as a global “pandemic” that last year cost people and organizations an estimated $600 billion, according to CNBC. So it’s not surprising that combating such activities has beco...

Read More

US users worry about identity theft, data leaks but still click on malicious links, use weak passwords, Bitdefender finds US USERS WORRY ABOUT IDENTITY THEFT, DATA LEAKS BUT STILL CLICK ON MALICIOUS LINKS, USE WEAK PASSWORDS, BITDEFENDER FINDS

blog article

Sep 05, 2018

By now, we have all acknowledged the benefits the Internet of Things has to offer not only to the daily lives of consumers, but also to city infrastructures, governments and enterprises. But how security-aware are consumers? According to a Bitdefender survey, the average US home has about 11 smart d...

Read More

Cybersecurity for Industry 4.0 CYBERSECURITY FOR INDUSTRY 4.0

whitepaper

Sep 04, 2018

In an era which is being referred to as Industry 4.0, government departments are increasing their digital footprints and adapting their technology and engagement environments to remain competitive and relevant. As information and assets owned or used by the organization become another node in the ne...

Read More

New CLEAR Solution: Automation from Email Reporting through Remediation NEW CLEAR SOLUTION: AUTOMATION FROM EMAIL REPORTING THROUGH REMEDIATION

blog article

Sep 04, 2018

We’re excited to announce, thanks to Proofpoint’s recent acquisition of Wombat, the availability of the Closed-Loop Email Analysis and Response (CLEAR) solution, our industry’s first complete closed-loop approach to instant end-user email reporting, analysis, and remediation. This ...

Read More

How to be more anonymous and stay safe online HOW TO BE MORE ANONYMOUS AND STAY SAFE ONLINE

infographic

Sep 03, 2018

In cyber security circles they say, just because someone might bash down your door, doesn’t mean you shouldn’t lock it. The truth is, it’s practically impossible to prevent all data breaches. Hackers have shockingly effective techniques, including reading heat signatures or even th...

Read More

RSA QUARTERLY FRAUD REPORT RSA QUARTERLY FRAUD REPORT

whitepaper

Sep 01, 2018

The RSA® Quarterly Fraud Report contains fraud attack and consumer fraud data and analysis from the RSA Fraud & Risk Intelligence team. It represents a snapshot of the cyber-fraud environment, providing actionable intelligence to consumerfacing organizations of all sizes and types to enable ...

Read More

37% of IT Managers See Failure to Install Updates as the Biggest Security Threat of 2018 37% OF IT MANAGERS SEE FAILURE TO INSTALL UPDATES AS THE BIGGEST SECURITY THREAT OF 2018

blog article

Aug 31, 2018

Outdated software is now a bigger threat than weak passwords, bring-your-own-device (BYOD) and unsecured USB sticks, according to a new study. 27% of enterprises spend, on average, at least a month before installing vital security patches, data shows. Among businesses with over 100,000 computer term...

Read More

Cyber Espionage and the US Elections: What are Russian Hackers Possibly Doing and How Can They be Stopped? CYBER ESPIONAGE AND THE US ELECTIONS: WHAT ARE RUSSIAN HACKERS POSSIBLY DOING AND HOW CAN THEY BE STOPPED?

blog article

Aug 31, 2018

Russian meddling in the 2016 US elections and the Hillary Clinton campaign email breach came as a surprise to many (with investigations underway as to who knew what and who was involved). While the New York Times reported the Obama White House had warned the Russians about “malicious cyber act...

Read More

Do You Know How Computer Virus Spreads? DO YOU KNOW HOW COMPUTER VIRUS SPREADS?

blog article

Aug 31, 2018

More and more people are falling a prey to the cyber attacks and losing the valuable data to an unrecognizable online fraudster is becoming one of the biggest nightmares. Say for example, the important analysis report that you prepared the previous night for your company’s new project is all g...

Read More

2018 Critical Infrastructure Risk Assessment 2018 CRITICAL INFRASTRUCTURE RISK ASSESSMENT

whitepaper

Aug 31, 2018

Parsons began this effort to explore the state of cybersecurity risk in critical infrastructure facilities with a simple question. The cyber threat has undoubtedly converged – both information technology (IT) and operational technology (OT) environments are being attacked. But, to what degree ...

Read More

ESET researchers discover LoJax - Week in security with Tony Anscombe ESET RESEARCHERS DISCOVER LOJAX - WEEK IN SECURITY WITH TONY ANSCOMBE

video

Aug 30, 2018

ESET researchers have discovered the first in-the-wild UEFI rootkit. Dubbed LoJax, the research team has shown that the Sednit operators used different components of the LoJax malware. to target a few government organizations in the Balkans as well as in Central and Eastern Europe. Plus Twitter fixe...

Read More

CYBERATTACK TRENDS IN 2018 CYBERATTACK TRENDS IN 2018

infographic

Aug 30, 2018

When it comes to the global cyber landscape, threats are ever evolving, keeping organizations as well as the security community constantly challenged. In 2018, the different strains of malware and their authors have proven to be capable of much more than previously imagined, with more sophistication...

Read More

Protected Voices: Information Security (InfoSec) PROTECTED VOICES: INFORMATION SECURITY (INFOSEC)

video

Aug 30, 2018

The FBI’s Protected Voices initiative provides cybersecurity recommendations to political campaigns on multiple topics, including InfoSec, to help mitigate the risk of cyber influence operations targeting U.S. elections. For more information, visit fbi.gov/protected voices.

Read More

IBM Security’s Mary O’Brien on the impact AI will have on cybersecurity IBM SECURITY’S MARY O’BRIEN ON THE IMPACT AI WILL HAVE ON CYBERSECURITY

video

Aug 30, 2018

Mary O’Brien, vice-president of development for IBM Security, talks to John Kennedy about the impact that artificial intelligence (AI) will have on cybersecurity. O’Brien leads a global team of 2,000 research and development professionals focused on delivering IBM’s extensive secur...

Read More

4 Reasons Why All Businesses Need a Password Manager 4 REASONS WHY ALL BUSINESSES NEED A PASSWORD MANAGER

blog article

Aug 30, 2018

Today, doing business means having dozens of online accounts and dozens (or even hundreds) of passwords. Technology helps us run our businesses more effectively, but it can also make us more vulnerable to data breaches and cyber attacks. Jungle Disk’s suite of cybersecurity products and servic...

Read More

Cyber Defense for Critical Infrastructure CYBER DEFENSE FOR CRITICAL INFRASTRUCTURE

whitepaper

Aug 30, 2018

Critical infrastructure is now under constant threat from cyber adversaries seeking to exploit vulnerable systems and networks to achieve their objectives. Industries such as banks, government utilities and energy companies are constantly upgrading their cyber defence mechanisms in order to harden t...

Read More

AI and Cybersecurity: combining data with human expertise AI AND CYBERSECURITY: COMBINING DATA WITH HUMAN EXPERTISE

blog article

Aug 30, 2018

Artificial intelligence continues to proliferate and influence our lives. Speech recognition and image recognition rely on AI. The financial sector is moving to AI-based insurance risk analysis, credit scores and loan eligibility. We’re also seeing the emergence of AI-based robot lawyers and A...

Read More

Is Your Small Business at Risk of a Cyber Attack? IS YOUR SMALL BUSINESS AT RISK OF A CYBER ATTACK?

blog article

Aug 29, 2018

After reading an article in Dark Reading, I was shocked to find out that over fifty percent of small to medium sized businesses (SMB) do not think they are at risk of cyber attacks. On top of that, I found it interesting that seventy-six percent of SMBs were not using multi-factor authentication eit...

Read More

THE SECURITY FABRIC PROTECTS THE DIGITAL ATTACK SURFACE THE SECURITY FABRIC PROTECTS THE DIGITAL ATTACK SURFACE

whitepaper

Aug 29, 2018

Fortinet’s mission is to deliver the most innovative, highest-performing network security fabric to secure and simplify your IT infrastructure. We are a leading global provider of network security appliances for carriers, data centers, enterprises, and distributed offices.

Read More

CYBER SECURITY ECOSYSTEM AND UTILITY TOKEN CYBER SECURITY ECOSYSTEM AND UTILITY TOKEN

whitepaper

Aug 28, 2018

The parabolic rise and volatile nature of cryptocurrencies portends the enormity of its potential impact. There is widespread speculation. Some pundits predict a cashless society in less than a decade and the more outspoken supporters of Bitcoin predict a price that will eventually crest seven figur...

Read More

An Introduction to AWS Cloud Security AN INTRODUCTION TO AWS CLOUD SECURITY

blog article

Aug 28, 2018

AWS is an indispensable part of business strategy for companies worldwide that make use of its infrastructure, platform, and software services. For example, giant pharmaceuticals slice into the time it takes to complete clinical trials on billion-dollar drugs by spinning up instance after instance o...

Read More

5 Ingredients To Help Your Security Team Perform at Enterprise Scale 5 INGREDIENTS TO HELP YOUR SECURITY TEAM PERFORM AT ENTERPRISE SCALE

whitepaper

Aug 28, 2018

Every enterprise needs a Cyber Security Program. But not every organization has the resources nor the inclination to build a robust Security Operations Center. Leveraging new security technologies and implementing proven security basics enables enterprise scale Security Operations without big budget...

Read More

TALEND CLOUD Security Architecture Overview TALEND CLOUD SECURITY ARCHITECTURE OVERVIEW

whitepaper

Aug 28, 2018

Talend Cloud (https://cloud.talend.com) is a secure and managed cloud integration platform that makes it easy for developers and non-developers to connect, transform, cleanse, and share cloud and on-premises data. Security is our top priority at Talend, whether it is employee, physical, network, inf...

Read More

CSPi Security Solutions for Secure DevOps Enhanced & Network Security CSPI SECURITY SOLUTIONS FOR SECURE DEVOPS ENHANCED & NETWORK SECURITY

whitepaper

Aug 28, 2018

New Security Challenges Call for New Security Approaches. Onslaught of Data Breaches Demands Change Organizations of all sizes and across all industries are the targets of an increasing number of sophisticated cyber-attacks. The risk of breach is very real, and gets worse every day. The industry rec...

Read More

Insecure about security? INSECURE ABOUT SECURITY?

infographic

Aug 27, 2018

Security isn’t just an IT issue, it’s a business concern. The key to safety—and growth—is an integrated strategy that focuses on the future of cybersecurity. It’s a requirement for the whole business, and a demand of customers: 90% of C-suite executives lose sleep over ...

Read More

Four Fundamentals in Building a Security Stack FOUR FUNDAMENTALS IN BUILDING A SECURITY STACK

blog article

Aug 27, 2018

Cybersecurity is an enormous investment with even more enormous consequences for mistakes. To build an optimal security stack you need to balance residual risks with total cost of ownership of the cyber security stack and with minimal disruption to operations. Unfortunately , we have reached an impa...

Read More

Be aware Hiddad Malware present on Google Play Store BE AWARE HIDDAD MALWARE PRESENT ON GOOGLE PLAY STORE

blog article

Aug 27, 2018

Quick Heal Security Lab has spotted a couple of applications on play store which hide themselves after installation and display full screen ads after specific time interval. This trend is used by most of the developers these days to earn profit by displaying ads. Even if users want to uninstall thes...

Read More

Cyber Security Hardening Guide CYBER SECURITY HARDENING GUIDE

whitepaper

Aug 26, 2018

For those who are new to cloud computing, the term “cloud” can sometimes bring concerns regarding digital security. What they may not know is that when using the appropriate methods and technology, cloud-based access control solutions are safer than ever before. In addition, cloud soluti...

Read More

CYBERSECURITY SD HAS YOU PROTECTED CYBERSECURITY SD HAS YOU PROTECTED

whitepaper

Aug 26, 2018

These days the buzz word “Cybersecurity” is tossed around frequently. But what does it really mean? Cybersecurity is the business and processes of protecting IT systems, networks and computers from the theft of electronic assets, information and data. It is a very real concern in a const...

Read More

DEMAND ANSWERS WHEN EVALUATING THIRD-PARTY SOFTWARE SUPPORT DEMAND ANSWERS WHEN EVALUATING THIRD-PARTY SOFTWARE SUPPORT

infographic

Aug 26, 2018

Don't put your software investment at risk. Get the protection you need with Oracle and take advantage of trusted, fully featured security, and comprehensive support. Critical software updates, compliance and governance, and deep domain expertise are essential components of a complete offering. ...

Read More

Machine Learning in Information Security MACHINE LEARNING IN INFORMATION SECURITY

whitepaper

Aug 25, 2018

The advent of new technology brings with it unrealistically high expectations of its applicability and the problems it will solve. And machine learning is the latest example. It’s important for security practitioners to know where the hype around machine learning ends and where practical appli...

Read More

LTI Advance Threat & Vulnerability Management Service LTI ADVANCE THREAT & VULNERABILITY MANAGEMENT SERVICE

whitepaper

Aug 25, 2018

Cyber threats and privacy issues are on the rise, riding on top of the ongoing disruptive technological advancements. Syndicates of skilled & sophisticated adversaries target organizations to exploit vulnerabilities and make unethical gains, often jeopardizing the business of the targeted organi...

Read More

GE Revolutionizes High Voltage Direct Current Controls GE REVOLUTIONIZES HIGH VOLTAGE DIRECT CURRENT CONTROLS

infographic

Aug 25, 2018

UTILIZING NEARLY 60 YEARS OF HVDC EXPERTISE Cutting Edge Computing Technology Combined With Standardized Application Software Delivers Key Customer Outcomes. Rapid Project Delivery Cycle with Faster Return on Investment. A modular hardware platform and proven application software enable a 30% reduct...

Read More

Foreshadow Attacks on Intel Chips is Causing Serious Vulnerabilities FORESHADOW ATTACKS ON INTEL CHIPS IS CAUSING SERIOUS VULNERABILITIES

blog article

Aug 25, 2018

Intel’s Software Guard Extensions (SGX) feature allows programs to establish secure enclaves on Intel processors. The secure enclave develops a safe haven for sensitive information, even if malware or another malady compromises the main computer. A global research group comprising of researche...

Read More

10 Best Practices for Creating an Effective Computer Security Incident Response Team (CSIRT) 10 BEST PRACTICES FOR CREATING AN EFFECTIVE COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT)

blog article

Aug 24, 2018

In many organizations, a computer security incident response team (CSIRT) has become essential to deal with the growing number and increasing sophistication of cyber threats. Unlike a security operations center (SOC) —a dedicated group with the tools to defend networks, servers, and other IT i...

Read More

CLOUD & SECURITY SERVICES PORTFOLIO CLOUD & SECURITY SERVICES PORTFOLIO

whitepaper

Aug 24, 2018

Organisations are rushing to embrace the possibilities of hybrid cloud, but a successful transition depends on having the right technology partner. We’ll do whatever it takes to ensure your digital transformation is seamless and successful. Today, and tomorrow. A world-class Global Service Man...

Read More

CYBER SECURITY RESOURCE PLANNING CYBER SECURITY RESOURCE PLANNING

whitepaper

Aug 24, 2018

You are buying the latest CyberSecurity tools. Your security staff is buried in scores of technical solutions, malware detectors and the latest in AI technology. Your SOC (Security Operations Center) is trying to catch phantom intruders, overwhelmed with false malware alerts, filtering terabytes of ...

Read More

New Wi-Fi attack can crack your passwords NEW WI-FI ATTACK CAN CRACK YOUR PASSWORDS

blog article

Aug 24, 2018

Did you know that there exists a simple way to crack passwords from routers with WPA2 security? Fortunately, this hidden truth was uncovered by the white hat hackers recently! Everybody is using Wi-Fi network these days, and the usual protocols to count on are WPA or WPA2. In simple words, the Wi-Fi...

Read More

LTI’s Threat Hunting Service LTI’S THREAT HUNTING SERVICE

whitepaper

Aug 24, 2018

Traditional security monitoring is proving to be insufficient in today’s fast-paced digital world of Cloud, Mobile, IoT, and advanced threat landscape. With increasing velocity and volume of data, traditional security monitoring solutions are overwhelmed, and require enormous time and effort t...

Read More

Security comes as standard SECURITY COMES AS STANDARD

whitepaper

Aug 23, 2018

There’s been a quiet revolution in software development. Formerly, software engineering teams were focused on functionality and speed to market as their main goals. However, under pressure from a rising number of malicious threats and with tighter data protection laws coming into force, organi...

Read More

CAN ARTIFICIAL INTELLIGENCE POWER FUTURE MALWARE? CAN ARTIFICIAL INTELLIGENCE POWER FUTURE MALWARE?

whitepaper

Aug 23, 2018

Artificial intelligence (AI) is almost an omnipresent topic these days. It is the centerpiece of sales pitches, it “powers” various online services and is mentioned in regard to almost any new product seeking investors. While some vendors truly aim to bring the added value of this techno...

Read More

Enterprise Security Fundamentals ENTERPRISE SECURITY FUNDAMENTALS

whitepaper

Aug 23, 2018

In IT, there is an exception to every rule; even the most basic rule of IT, which states that the answer to every question is “it depends.” Security is no different, and because it touches on all aspects of IT from the physical out to the cloud, anything to do with security is going to b...

Read More

Unencrypted laptop exposes personal details of 37,000 Eir customers, faulty security update blamed UNENCRYPTED LAPTOP EXPOSES PERSONAL DETAILS OF 37,000 EIR CUSTOMERS, FAULTY SECURITY UPDATE BLAMED

blog article

Aug 23, 2018

It’s not great when any organisation loses a laptop, but if the contents of the computer’s hard drive have been fully encrypted and a strong password has been used it’s hardly the end of the world. After all, the chances of a criminal being able to access any sensitive information ...

Read More

Guide to Securing Your Mobile App against Cyber Attacks GUIDE TO SECURING YOUR MOBILE APP AGAINST CYBER ATTACKS

blog article

Aug 23, 2018

Thanks to the advent of technology, the number of mobile phone users are increasing day by day. You’ll be shocked to hear that by 2019, this number will cross the 5 billion mark! While mobile phones may have made our life easier, they have also opened up domains for many cybercriminals who are...

Read More

Three of the Latest Email Security Threats Facing Your Organization THREE OF THE LATEST EMAIL SECURITY THREATS FACING YOUR ORGANIZATION

blog article

Aug 22, 2018

Email is a top vector for cybercriminals to breach your organization. In fact, email-borne attacks are responsible for more than 93% of breaches, according to Verizon's Data Breach Investigation Report. Before you can properly defend against such threats you need to understand their nature. Here...

Read More

Rearchitecting the WAN Edge REARCHITECTING THE WAN EDGE

infographic

Aug 22, 2018

In the age of multi-cloud, enterprises are driving towards a new WAN Edge with SD-WAN. Global Survey Reveals SD-WAN is a Top Technology Priority. The 2018 Frost & Sullivan web-based survey included over 850 companies globally, from five key industries. Top3 PRIORITES. Hybrid Cloud Services. Netw...

Read More

Machine Learning: The First Salvo of the AI Business Revolution MACHINE LEARNING: THE FIRST SALVO OF THE AI BUSINESS REVOLUTION

whitepaper

Aug 22, 2018

In the form of machine learning (ML), artificial intelligence (AI) is making its way into the enterprise, promising to transform many areas of the business including customer experience. Just as humans can learn and act from experience, machines can learn from data, identify patterns and make decisi...

Read More

What is Ransomware? WHAT IS RANSOMWARE?

blog article

Aug 22, 2018

Ransomware is a malicious software which is also known as ransom-malware that threatens to delete or deny access to data, once it takes control over a computing device. The cybercriminal who initiated the attack commands ransom to be paid through cryptocurrency or credit card in order to recover the...

Read More

Migration from Silo Security to Secure Holistic Cloud Networking MIGRATION FROM SILO SECURITY TO SECURE HOLISTIC CLOUD NETWORKING

whitepaper

Aug 21, 2018

Enterprises are rapidly transforming their critical network infrastructures to encompass private, public and hybrid cloud architectures. This complex mesh of diverse network topologies coupled with dense virtualization and artificial intelligence applications has posed exponential security challenge...

Read More

Email Fraud Continues to Rise as the Number of Attacks Grew 36% in Q2 EMAIL FRAUD CONTINUES TO RISE AS THE NUMBER OF ATTACKS GREW 36% IN Q2

blog article

Aug 21, 2018

Email fraud continues to make headlines within the cybersecurity space and continuously reaches unprecedented levels of impact on organizations of all sizes and in all locations. In fact, the FBI recently released a new report indicating that business email compromise (BEC) and email account comprom...

Read More

OVERCOME THE CHALLENGES OF BUILDING YOUR OWN CYBERSECURITY PROGRAM WITH AN MSSP OVERCOME THE CHALLENGES OF BUILDING YOUR OWN CYBERSECURITY PROGRAM WITH AN MSSP

infographic

Aug 21, 2018

According to @451Research, 31% of enterprises that currently do not utilise an MSSP plan to do so within the next 24 months1. The move to Managed Security Services. 31% Enterprise security teams believe that technical staff that possess elevated privileges pose the greatest internal security risk to...

Read More

PROTECTING YOUR PRIVACY IN THE INFORMATION AGE PROTECTING YOUR PRIVACY IN THE INFORMATION AGE

whitepaper

Aug 21, 2018

At Acxiom, we provide consumer information to responsible companies all around the world. Obviously, we have a stake in the issue of consumer privacy. We also know, however, that consumers need certain protections—and that there is some information that should remain private and confidential. ...

Read More

What You Need to Know About Ransomware WHAT YOU NEED TO KNOW ABOUT RANSOMWARE

blog article

Aug 21, 2018

2017 was dominated by major ransomware attacks, a relatively new cyber threat which holds data captive until a ransom is paid. Last year’s WannaCry attack famously impacted more than 200,000 computers across the globe, with victims spanning across various industries. Just this past week, the c...

Read More

Protecting Your Enterprise Databases from Ransomware PROTECTING YOUR ENTERPRISE DATABASES FROM RANSOMWARE

whitepaper

Aug 20, 2018

Ransomware is no longer the new kid on the block. In fact, going back as far as 2005, ransomware has played a part in the world of cybercrime. As a relatively “easy” way for criminals to make money, it comes as no surprise that ransomware has gained many underground followers over the pa...

Read More

Protecting and Enabling the Cloud PROTECTING AND ENABLING THE CLOUD

whitepaper

Aug 20, 2018

According to Gartner, 80% of cloud breaches through 2020 will be due to customer misconfiguration, mismanaged, credentials or insider theft. As cloud ecosystems evolve, and IT perimeters expand and become more complex, it’s increasingly critical to ensure visibility and security across hybrid ...

Read More