RESOURCES


home.aspx
   
BenefitMall Hit by Months-Long Data Breach BENEFITMALL HIT BY MONTHS-LONG DATA BREACH

blog article

Jan 17, 2019

The Dallas-based payroll firm BenefitMall announced on January 4 that nearly 112,000 customers may have had their personal information exposed during a four-month long data breach. The breach was discovered on October 11, when the company realized that several internal email accounts had been compro...

Read More

Effective Data Security When Recycling Corporate E-Waste EFFECTIVE DATA SECURITY WHEN RECYCLING CORPORATE E-WASTE

blog article

Jan 17, 2019

In today's progressively digital world, data security is just as important as its physical counterpart. Sensitive data stored in servers, laptops, and any other form of e-waste can be compromised any time there's an attack by a malicious entity. Sensitive data can be any of the following: Tr...

Read More

Avoiding Critical Security Risk Analysis Mistakes AVOIDING CRITICAL SECURITY RISK ANALYSIS MISTAKES

blog article

Jan 17, 2019

Healthcare organizations and their business associates must be careful to avoid making mistakes with their HIPAA security risk analysis in case they ever undergo a compliance review or breach investigation by federal regulators, says privacy attorney Adam Greene. “What I see a lot of – a...

Read More

The U.S. Government Blaming Cyber Attacks on Russia May Cost One Business $100 Million THE U.S. GOVERNMENT BLAMING CYBER ATTACKS ON RUSSIA MAY COST ONE BUSINESS $100 MILLION

blog article

Jan 17, 2019

Governments attributing cyberattacks to specific countries usually ends in nothing more than a line in a news story. But sometimes these kinds of claims can have unforeseen consequences. The $100 Million insurance coverage lawsuit between Mondelez, the owner of brands such as Oreos and Nabisco, and ...

Read More

Is it Dangerous to Rely Too Heavily on Predictive Analytics for Fighting Ransomware? IS IT DANGEROUS TO RELY TOO HEAVILY ON PREDICTIVE ANALYTICS FOR FIGHTING RANSOMWARE?

blog article

Jan 17, 2019

Ransomware is a rising threat to businesses all over the world. Between 2016 and 2017, the number of ransomware incidents increased by 350%. The FBI now estimates that there are 4,000 ransomware attacks every day. Digital security experts are desperately looking for new ways to thwart these attacks....

Read More

Cyber security Small Business Guide CYBER SECURITY SMALL BUSINESS GUIDE

infographic

Jan 17, 2019

A cyber security guide for small business owners. An informative infographic by the UK National Cyber Security Centre (NCSC) summarizes five simple but key steps for small business owners, to protect their organizations from cyber threat, and therefore save time, money and ensure business reputation...

Read More

Modern Ransomware Goes After Data Backups MODERN RANSOMWARE GOES AFTER DATA BACKUPS

blog article

Jan 16, 2019

Ransomware is using a variety of methods to reduce or nullify the effectiveness of data backups, writes Maria Korolov at CSO. Restoring from a backup is one of the best strategies that organizations can use to recover from a ransomware attack, so it’s obvious why attackers would want to target...

Read More

Cisco CEO on Tech Industry, Tariffs, Cybersecurity CISCO CEO ON TECH INDUSTRY, TARIFFS, CYBERSECURITY

video

Jan 16, 2019

Jan.16 -- Chuck Robbins, chief executive officer at Cisco Systems, discusses the state of the technology industry in global business and governments, U.S.-China trade, and cybersecurity. He speaks on "Bloomberg Daybreak: Americas."

Read More

Minister Gan encourages IHiS to press on, recover and rebuild MINISTER GAN ENCOURAGES IHIS TO PRESS ON, RECOVER AND REBUILD

video

Jan 15, 2019

Minister for Health Gan Kim Yong spoke on the support for IHiS (Integrated Health Information System) and their staff as they learn from the cyberattack. He shared that the public healthcare family was in full support of IHiS as they recover, rebuild, and implement the Committee of Inquiry's rec...

Read More

Building up cybersecurity defences in public healthcare BUILDING UP CYBERSECURITY DEFENCES IN PUBLIC HEALTHCARE

video

Jan 15, 2019

Minister for Health Gan Kim Yong shared how public healthcare agencies will learn from the SingHealth data breach and prioritise cybersecurity initiatives. The Ministry of Health, IHiS, as well as the healthcare clusters will report their progress on these initiatives to a Healthcare IT Steering Com...

Read More

Findings of our survey show that cyber awareness training is badly needed for organizations FINDINGS OF OUR SURVEY SHOW THAT CYBER AWARENESS TRAINING IS BADLY NEEDED FOR ORGANIZATIONS

blog article

Jan 15, 2019

Employees are the weakest link in your security chain. Studies have found that over 90% of all cyber breaches happen because of human error. Even with the best of intentions, sometimes their actions can lead to major cybersecurity faux pas. But, how much of it is because of poor behavior or bad deci...

Read More

Cyber Threats In The Banking Industry CYBER THREATS IN THE BANKING INDUSTRY

blog article

Jan 14, 2019

Cybersecurity breaches continue to grow in both frequency and sophistication for all industries, and the financial sector is particularly vulnerable. In mid-2018, ITSP Magazine reported that financial services firms fall victim to cybersecurity attacks 300 times more frequently than businesses in ot...

Read More

Fighting the Evolution of Malware FIGHTING THE EVOLUTION OF MALWARE

blog article

Jan 14, 2019

Malware is becoming increasingly destructive. Below is a short history of this trend, along with steps organizations can take to combat it. We begin with Mirai that, in the summer of 2016, was responsible for the largest DDoS attack in history. It was built using millions of vulnerable IoT devices a...

Read More

Government shutdown impacts .gov websites, puts Americans in danger GOVERNMENT SHUTDOWN IMPACTS .GOV WEBSITES, PUTS AMERICANS IN DANGER

blog article

Jan 14, 2019

If you are in the United States, then you likely already know that we are on our 24th day of a government shutdown. While it is considered a “partial” shutdown, there are still plenty of government workers who are furloughed, which impacts the services they run—both online and off....

Read More

What’s the Answer to the Vulnerability Overload Problem? Key Findings from ESG’s Cyber Risk Management Survey WHAT’S THE ANSWER TO THE VULNERABILITY OVERLOAD PROBLEM? KEY FINDINGS FROM ESG’S CYBER RISK MANAGEMENT SURVEY

whitepaper

Jan 11, 2019

Cyber risk management is demanding work. Vulnerabilities are growing, threat actors are smarter and pressure from the executive team is intensifying. What used to be a side IT conversation is now a top business priority. You finally have the full attention of the C-suite and board – but, do yo...

Read More

5 CYBERSECURITY TRENDS FOR 2019 5 CYBERSECURITY TRENDS FOR 2019

blog article

Jan 11, 2019

As we kick off 2019, we are excited to bring you our 3rd Annual “STEALTHbits’ Experts Predictions”. This has been such a crowd pleaser that we just had to keep it going! Like the last few years, we made our way around the office with left over holiday cookie bribes to get the voice...

Read More

The Evolution of Malware Identification THE EVOLUTION OF MALWARE IDENTIFICATION

blog article

Jan 11, 2019

Code is what allows website owners to customize their websites and make it unique. However, sometimes malware can sneak into that code, resulting in a potentially harmful impact to unsuspecting users. Using today’s techniques, how would you distinguish which code is good and which code is bad?...

Read More

The Phishing Decision Tree THE PHISHING DECISION TREE

infographic

Jan 10, 2019

If you're looking for a Security Awareness infographic that employees might actually look at, we've found one for you. Security Awareness company Wombat (which was acquired last year by Proofpoint) came up with the most clever and comprehensive security awareness infographic we've seen.

Read More

Cyber immunity for energy infrastructures CYBER IMMUNITY FOR ENERGY INFRASTRUCTURES

whitepaper

Jan 10, 2019

Energy infrastructures are at serious risk As investments in the renewable energy industry rose rapidly in the last decade, utilities have become a popular target for cyber criminals. In fact, thanks to digitalization and increased interconnectivity, the huge amount of data coming from wind turbines...

Read More

OpSec: A Vital Part of Any Cybersecurity Program OPSEC: A VITAL PART OF ANY CYBERSECURITY PROGRAM

blog article

Jan 10, 2019

We all have something to hide. Even though humans are social beings, there are some things we want to keep to ourselves, and it’s been like that since the beginning of humankind. In the digital world, the format in which those secrets are kept is what we keep in focus, in contrast to the &rsqu...

Read More

VMware Edge and IoT Solutions VMWARE EDGE AND IOT SOLUTIONS

video

Jan 10, 2019

We’ve broadened our internet of things (IoT) and edge computing strategy with a new product portfolio called VMware Edge. The portfolio includes solutions that allow you to take control of the Edge with a simplified, secure, scalable digital foundation built on proven and trusted VMware techno...

Read More

DEPLOYING PERVASIVE SECURITY WITH AWS TRANSIT GATEWAY AND FORTINET CLOUD SERVICES HUB DEPLOYING PERVASIVE SECURITY WITH AWS TRANSIT GATEWAY AND FORTINET CLOUD SERVICES HUB

whitepaper

Jan 10, 2019

Most AWS deployments have evolved from a single virtual private cloud (VPC) to multiple VPCs spread across several regions. The Fortinet Transit VPC solution supports organizations that have storage and compute infrastructures spread across on-premises data centers and Amazon Web Services (AWS) VPCs...

Read More

Cyber Insurance Premiums | Echoworx Talking Security Ep. 2 CYBER INSURANCE PREMIUMS | ECHOWORX TALKING SECURITY EP. 2

video

Jan 10, 2019

Cyber insurance is beginning to become the norm for most business working in highly-regulated industries. But with underwriters still sketching out what exactly cyber insurance is and how premiums are calculated – is it better to invest in proactive cybersecurity measures, like encryption, or ...

Read More

A Nasty Trick: From Credential Theft Malware to Business Disruption A NASTY TRICK: FROM CREDENTIAL THEFT MALWARE TO BUSINESS DISRUPTION

blog article

Jan 10, 2019

FireEye is tracking a set of financially-motivated activity referred to as TEMP.MixMaster that involves the interactive deployment of Ryuk ransomware following TrickBot malware infections. These operations have been active since at least December 2017, with a notable uptick in the latter half of 201...

Read More

Good password security: the perfect New Year’s resolution for your business and employees GOOD PASSWORD SECURITY: THE PERFECT NEW YEAR’S RESOLUTION FOR YOUR BUSINESS AND EMPLOYEES

blog article

Jan 09, 2019

The New Year’s resolutions we stick to have a few things in common: they’re realistic, focused, and have clear benefits. That’s why improving company-wide password habits is a great resolution for 2019. According to the most recent data from Verizon, over 70% of employees reuse pas...

Read More

Cyber Security Marketing Tactics That Actually Work CYBER SECURITY MARKETING TACTICS THAT ACTUALLY WORK

blog article

Jan 09, 2019

Whether you want to attribute it to the rise of interconnected devices in the IoT revolution or just the growing instances of cybercrime, the cyber security industry has seen immense growth in recent years and shows no signs of stopping. In fact, according to a Cybersecurity Market Report published ...

Read More

Achieve Data Security with Strong Internal and External Perimeters ACHIEVE DATA SECURITY WITH STRONG INTERNAL AND EXTERNAL PERIMETERS

blog article

Jan 09, 2019

Securing your organization’s most sensitive content is analogous to securing a busy office building. If you’re in charge of security in an office building, you must protect your tenants amid a constant flux of employees and visitors. You must keep the building, its employees, and their p...

Read More

Opinion How to drive home the Importance of data security with company stakeholders OPINION HOW TO DRIVE HOME THE IMPORTANCE OF DATA SECURITY WITH COMPANY STAKEHOLDERS

blog article

Jan 09, 2019

For the modern business, there are few topics more important than data security. Without a proper appreciation for data security and all that it entails, you’ll find your business falling behind. But getting all of your employees and company stakeholders on board can prove to be a major challe...

Read More

What is Hybris Computer Worm? WHAT IS HYBRIS COMPUTER WORM?

blog article

Jan 09, 2019

Hybris Worm is a type of malware (computer worm) that multiplies by automatically replicating itsef. This type of computer worm has the capability to multiply not just within an infected system but also expanding to other systems that are connected to the same network. The mode of infection within t...

Read More

New Year, New Threats: 4 Cybersecurity Predictions For 2019 NEW YEAR, NEW THREATS: 4 CYBERSECURITY PREDICTIONS FOR 2019

blog article

Jan 09, 2019

The new year has always been an important marker for cybersecurity professionals – just think back to Y2K and the widespread concern that every piece of technology might stop working at midnight on January 1, 2000. After a tough 2018, marked by extensive spam communication via both email and t...

Read More

How To Guide: Meeting Today HOW TO GUIDE: MEETING TODAY'S CRITICAL COMPLIANCE AND SECURITY REQUIREMENTS WITH DOCUSIGN

whitepaper

Jan 09, 2019

Learn how DocuSign is your trusted source for meeting today’s rigorous security and compliance requirements and can help you: Comply with global security standards Meet industry specific regulations Improve security Follow existing corporate standards and procedures Provide visibility into all tran...

Read More

Ryuk ransomware attacks businesses over the holidays RYUK RANSOMWARE ATTACKS BUSINESSES OVER THE HOLIDAYS

blog article

Jan 08, 2019

While families gathered for food and merriment on Christmas Eve, most businesses slumbered. Nothing was stirring, not even a mouse—or so they thought. For those at Tribune Publishing and Data Resolution, however, a silent attack was slowly spreading through their networks, encrypting data and ...

Read More

Scheduled Network Maintenance: How Does It Affect Your Customer’s Business SCHEDULED NETWORK MAINTENANCE: HOW DOES IT AFFECT YOUR CUSTOMER’S BUSINESS

blog article

Jan 08, 2019

As a managed services provider (MSP) it is your responsibility to manage and maintain not only the endpoints on your clients’ networks but also the networks themselves. This may not be terribly important for very small businesses, especially if they are just starting out. However, as your clie...

Read More

Tips on Cybersecurity Vendor Risk Management for the Board of Directors TIPS ON CYBERSECURITY VENDOR RISK MANAGEMENT FOR THE BOARD OF DIRECTORS

blog article

Jan 08, 2019

Think about your vendors. Each one presents a unique risk to you. Whether it’s a risk to information security or the availability of your company’s product or service, all vendor services come with a specific level of risk. In the current technological environment, vendors are not only h...

Read More

2019 Global Health Care Outlook 2019 GLOBAL HEALTH CARE OUTLOOK

infographic

Jan 08, 2019

Global health care spending continues to increase dramatically. is projected to reach $10.059 trillion by 2022. Factors impacting health care costs. life expectancy continues to climb—number of people aged over 65 globally is more than 668 million, or 11.6%, of the total global population. win...

Read More

SAP Security Notes January ‘19: First Critical Note for SAP Cloud Connector and Mobile Patching SAP SECURITY NOTES JANUARY ‘19: FIRST CRITICAL NOTE FOR SAP CLOUD CONNECTOR AND MOBILE PATCHING

blog article

Jan 08, 2019

Today is the first SAP Security Patch Day for 2019 and 18 security notes were released, including one that was published during the month after the last Patch Day. This month, several platforms that are not usually part of the Patch Day have Security Notes published, including SAP Cloud Connector an...

Read More

Securing finance: Cybersecurity SECURING FINANCE: CYBERSECURITY

video

Jan 08, 2019

Cyber security is a significant risk for many organisations; one that needs to be managed appropriately. Having the right policies and procedures in place is essential in this connected world.  While organisations differ according to the work that they do, this page provides some practical guid...

Read More

IoT Cybersecurity Challenges and Solutions IOT CYBERSECURITY CHALLENGES AND SOLUTIONS

blog article

Jan 08, 2019

The Internet of Things (IoT) is simply an interconnected array of electronic devices that are linked by the Internet, through which they can transmit and receive data. The original “thing” was a Coca Cola vending machine that was able to report back to HQ how many bottles of soda were le...

Read More

Here are some predictions for the new year HERE ARE SOME PREDICTIONS FOR THE NEW YEAR

blog article

Jan 07, 2019

Happy New Year! As we finish singing “Auld Lang Syne” with a champagne toast to close out 2018, it is time to look to 2019 with excitement. But, before you make a few New Year’s resolutions, it would be best if you took a step back to analyze a few predictions and trends that may i...

Read More

New Year – Mastering Privacy and Data Security in 2019 NEW YEAR – MASTERING PRIVACY AND DATA SECURITY IN 2019

blog article

Jan 07, 2019

Privacy Compliance & Data Security - A Fox Rothschild Blog. 2019 presents businesses with new cybersecurity and privacy challenges: rapid advances in technology, sophisticated new cyberattacks and stricter privacy regulations here and around the world, just to name a few. Businesses that fail to...

Read More

Introducing the Defender INTRODUCING THE DEFENDER'S DIGEST

blog article

Jan 07, 2019

With cyberattackers actively targeting SAP and Oracle ERP systems and more organizations experiencing breaches, the ERP cybersecurity industry is constantly changing. Staying up to date with best practices can be a struggle. Onapsis would like to introduce the Defender’s Digest, a new monthly ...

Read More

The Difference Between Data Privacy and Data Security THE DIFFERENCE BETWEEN DATA PRIVACY AND DATA SECURITY

blog article

Jan 07, 2019

Repeat after me, data security is not privacy. Privacy is also not data security. These two terms are often used interchangeably, but there are distinct differences as well as similarities. Yes, data security and privacy have a common goal to protect sensitive data. But they have very different appr...

Read More

Assystem expertise in cybersecurity ASSYSTEM EXPERTISE IN CYBERSECURITY

video

Jan 07, 2019

This video explains all the parameters to take into account to be prepared for any cyberattack. Assystem offers a great expertise in cybersecurity and propose to its customers the best solution according to their systems, the nature of the risks and the economical background.

Read More

This Era Strongly Demands for Advanced Security Solutions – Let’s See Why THIS ERA STRONGLY DEMANDS FOR ADVANCED SECURITY SOLUTIONS – LET’S SEE WHY

blog article

Jan 07, 2019

In today era of 2019, companies are turning towards advanced security solutions because of the surging in data breaches. Lots of updation and intelligence systems are required in monitoring products for malware protection and to perform auto defensive actions. This post is going to aware readers tha...

Read More

VPN vs Antivirus: Which is a Bigger Cyber Security Market and Which Does Your Company Need? VPN VS ANTIVIRUS: WHICH IS A BIGGER CYBER SECURITY MARKET AND WHICH DOES YOUR COMPANY NEED?

blog article

Jan 07, 2019

With cyber security being the rage these days, choosing out of the many programs that are popping up with the promise of offering optimal protection becomes a dilemma. Even more, the choice between picking out a recommended antivirus and sticking with the more traditional way of protecting your comp...

Read More

3 Top Cybersecurity Stocks to Buy in 2019 3 TOP CYBERSECURITY STOCKS TO BUY IN 2019

blog article

Jan 07, 2019

Okta (NASDAQ:OKTA) is the leading provider of enterprise identity-management services. More than 5,600 businesses rely on Okta to manage and secure the digital access rights to their network. Think passwords, login processes, and employee on- and off-boarding procedures. Okta makes all this simpler ...

Read More

How To Pick A Data Backup Method For Your Enterprise HOW TO PICK A DATA BACKUP METHOD FOR YOUR ENTERPRISE

blog article

Jan 07, 2019

The digital age is all about data security and privacy, but that doesn’t mean businesses and private individuals have much of a clue when it comes to properly back up their information. Despite the fact that finding the right data backup method isn’t always a breeze, it doesn’t hav...

Read More

How to Improve Blockchain Security HOW TO IMPROVE BLOCKCHAIN SECURITY

blog article

Jan 07, 2019

In 2014, Mt. Gox, one of the largest cryptocurrency exchanges (managing approximately 70% of all transactions in Bitcoin) had been the victim of successful hacking attempts for a period of three years, and Mt. Gox’s customers lost 750,000 Bitcoins. Bitcoin lost over a third of its value when t...

Read More

WEST VIRGINIA CYBERSECURITY Workforce Strategic Initiative Report WEST VIRGINIA CYBERSECURITY WORKFORCE STRATEGIC INITIATIVE REPORT

whitepaper

Jan 05, 2019

TechConnect West Virginia has been the driving force behind the West Virginia Cybersecurity Workforce Strategic Initiative. TCWV is a non-profit coalition committed to the advancement of the innovation economy in West Virginia, focused on four technology sectors: advanced energy, chemicals and advan...

Read More

THE UK THE UK'S BIGGEST DATA BREACH FINES 2018

infographic

Jan 04, 2019

The ICO (Information Commissioner's Office) issued the most - and largest - fines ever in 2018, including: 11 fines totaling £1,290,000 to organisations for serious security failures. + 11 fines totaling. £138,000 to UK charities for unlawfully processing personal data in the 12 mont...

Read More

Legal Industry Cyber Threats LEGAL INDUSTRY CYBER THREATS

infographic

Jan 04, 2019

WHAT ATTACKERS WANT. Corporate intelligence, confidential data, medical records, intellectual property, M&A intelligence, reputation damage. ATTACK TYPES. Ransomware, malware, phishing/spear-phishing, hacktivism. MAJOR ATTACKS. The Panama Papers, DLA Piper, Appleby, Cravath, Swaine & Moore, ...

Read More

 Psychology of Workplace Collaboration PSYCHOLOGY OF WORKPLACE COLLABORATION

whitepaper

Jan 04, 2019

In today's ever-changing workplace, companies are challenged to keep up with mobile employees and constant connectivity. Does your team have what it needs to stay innovative and inspired? This eBook addresses how organisational psychology can help you understand what your teams need.

Read More

 Trendwatch: The 5 Essentials of Unified Communications TRENDWATCH: THE 5 ESSENTIALS OF UNIFIED COMMUNICATIONS

whitepaper

Jan 04, 2019

Companies can build a strong foundation of communication by making it easier for individuals to access the information they need, and for teams to connect more easily. Technology plays a critical role in this process because diverse teams work across multiple locations, use a range of devices and ha...

Read More

 Crash Course in Upgrading to Windows 10 CRASH COURSE IN UPGRADING TO WINDOWS 10

whitepaper

Jan 04, 2019

You’ve made the right decision to upgrade your business to Windows 10. We know that company-wide deployments are never easy, which is why we’ve put together this to help you take the next step. Download the “Crash Course in Upgrading to Windows 10” eBook to find out how to streamline the process. Di...

Read More

 6 Steps to a Holistic Security Strategy 6 STEPS TO A HOLISTIC SECURITY STRATEGY

whitepaper

Jan 04, 2019

Did you know that the average company has 75 different security products? It's no surprise; modern security needs are multifaceted and many enterprise organizations are operating so quickly that they don’t have the time to put together comprehensive security strategies. But to be successful, organiz...

Read More

 Zes Stappen voor een Holistische Beveiligingsstrategie ZES STAPPEN VOOR EEN HOLISTISCHE BEVEILIGINGSSTRATEGIE

whitepaper

Jan 04, 2019

Wist je dat een gemiddelde organisatie 75 verschillende beveiligingsproducten heeft? Het is geen verrassing, moderne beveiligingsbehoeften zijn veelzijdig en veel bedrijfsorganisaties werken zo snel dat ze geen tijd hebben om uitgebreide beveiligingsstrategieën op te zetten. Maar om succesvol te zij...

Read More

The Surprising Role Of AI In Cybercrime THE SURPRISING ROLE OF AI IN CYBERCRIME

blog article

Jan 03, 2019

Artificial Intelligence (AI), or machine learning, is changing the technological landscape. As computers “learn” and make smarter “decisions”, response times become faster and efficiency and productivity increase. In the world of cybersecurity, AI is playing a more active rol...

Read More

Making – And Keeping – Your Cybersecurity Resolution MAKING – AND KEEPING – YOUR CYBERSECURITY RESOLUTION

blog article

Jan 03, 2019

We all know the drill by now: the beginning of the year is a fresh start, and the perfect time to set a goal. 40% of Americans make a New Year’s resolution each year, and whether that’s sticking to a budget, finding a new hobby, or getting more exercise, they don’t waste a minute m...

Read More

A Passage to Penetration Testing A PASSAGE TO PENETRATION TESTING

whitepaper

Jan 03, 2019

What Is Penetration Testing? A penetration test or ‘pen test’ is the process of evaluating the security infrastructure within a controlled environment to safely attack, identify, penetrate and exploit vulnerabilities. These vulnerabilities may exist in network, applications, database, pr...

Read More

Hackers Hijack Chromecast Devices and Smart TVs via Exposed UPnP HACKERS HIJACK CHROMECAST DEVICES AND SMART TVS VIA EXPOSED UPNP

blog article

Jan 03, 2019

A pair of hackers has launched a campaign that displays rogue messages on people’s smart TVs encouraging them to subscribe to a popular YouTube channel. The attack doesn’t seem to be malicious and is part of a larger campaign to promote PewDiePie, the YouTube channel with the largest num...

Read More

Click2Gov breaches show the power of zero-days CLICK2GOV BREACHES SHOW THE POWER OF ZERO-DAYS

blog article

Jan 03, 2019

Just about every organization, including the biggest of all—government at all levels—encourages you to pay your bills online. You know the pitch: It’s easy! It’s quick! It’s convenient! It saves paper! And, they also say, it’s safe and secure! Except when it isn&r...

Read More

Is Your Cybersecurity Level Capable of Standing in Multi-Cloud Infrastructures Future? IS YOUR CYBERSECURITY LEVEL CAPABLE OF STANDING IN MULTI-CLOUD INFRASTRUCTURES FUTURE?

blog article

Jan 03, 2019

The popular advantages of working on a multi-cloud infrastructure are – Cloud service provider flexibility, optimized workloads, no cloud vendor lock-in, and cost efficiency. Someone said that “multi-clouds expand the attack surface area and raise the total number of Cybersecurity holes ...

Read More

Security trends to pay attention to in 2019 and beyond SECURITY TRENDS TO PAY ATTENTION TO IN 2019 AND BEYOND

blog article

Jan 03, 2019

Software security requires good hygiene and constant diligence to protect your organization and users from known threats; it also requires working proactively to identify and address emerging risks. Here at Google Cloud, we help you do both. We build products that make security easy—from autom...

Read More

The 4 stages of cyber resilience THE 4 STAGES OF CYBER RESILIENCE

blog article

Jan 03, 2019

Until recently, organisations often spent almost all of their information security budget on prevention, effectively taking an all-or-nothing approach to the threat of data breaches. They either repelled the attack or faced the consequences head-on. However, with data breaches becoming more common a...

Read More

The Future of Cybersecurity – A 2019 Outlook THE FUTURE OF CYBERSECURITY – A 2019 OUTLOOK

blog article

Jan 03, 2019

From the record-breaking number of data breaches to the implementation of the General Data Protection Regulation (GDPR), 2018 will certainly go down as a memorable year for the cybersecurity industry. And there have been plenty of learnings for both the industry and organisations, too. Despite havin...

Read More

The new landscape of pre-installed mobile malware: malicious code within THE NEW LANDSCAPE OF PRE-INSTALLED MOBILE MALWARE: MALICIOUS CODE WITHIN

blog article

Jan 02, 2019

Here’s a scary thought: Mobile devices may soon come with pre-installed malware on required system apps. While it might sound like a grim foretelling, pre-installed mobile malware is an unfortunate reality of the future. In the past, we’ve seen pre-installed malware with the notorious Ad...

Read More

OSINT Framework: The Perfect Cybersecurity Intel Gathering Tool OSINT FRAMEWORK: THE PERFECT CYBERSECURITY INTEL GATHERING TOOL

blog article

Jan 02, 2019

Intel and reconnaissance are among the first steps taken in any cybersecurity research effort, and as we’ve seen in our previous post, OSINT plays a big role in data collection. So what is OSINT? While there are tons of public resources for getting information about any individual or organizat...

Read More

Common Exploits Found in a Penetration Test COMMON EXPLOITS FOUND IN A PENETRATION TEST

blog article

Jan 02, 2019

How to Remediate Vulnerabilities to Secure Your Business. Let’s imagine that your company just completed a penetration test and you are left with an assessment report from the vendor with a list of exploits and vulnerabilities to remediate. You are trying to get a full understanding of the rep...

Read More

The Changing Landscape of Automated Attacks on Web and Mobile Apps THE CHANGING LANDSCAPE OF AUTOMATED ATTACKS ON WEB AND MOBILE APPS

blog article

Jan 02, 2019

In recent years, we have witnessed an unprecedented surge in automated attacks targeting online businesses. These attacks are aimed at validating stolen payment card details, scraping content, taking over accounts and sometimes even slowing down the target website. In the last post, I had highlighte...

Read More

New Windows Zero-day Bug Allows Deleting Arbitrary Files NEW WINDOWS ZERO-DAY BUG ALLOWS DELETING ARBITRARY FILES

blog article

Jan 02, 2019

A security researcher released exploit code for an unpatched bug in Windows that could allow an attacker with limited privileges to delete system files. Exploiting the bug requires winning a race condition on the machine, so a successful exploit can take some time as it will retry until it succeeds,...

Read More

Cyber Security in 2019 CYBER SECURITY IN 2019

infographic

Jan 02, 2019

With a new year of cyber threats ahead of us, what are the cyber security trends and activities most likely to affect your organisation? As 2019 gets underway, plenty of people are sharing their predictions for the year ahead. While there are plenty of unknowns ahead for the public sector, not least...

Read More

Various steps involved in Implementing a Cyber Kill Chain VARIOUS STEPS INVOLVED IN IMPLEMENTING A CYBER KILL CHAIN

blog article

Jan 02, 2019

We are living in a world where everything is networked together, from online transactions to government infrastructure, and therefore, network protection will no longer be an optional extra. Today, cyber-attack has become an international issue, as high-profile infringements have caused many problem...

Read More

Threats Report McAfee Labs December 2018 THREATS REPORT MCAFEE LABS DECEMBER 2018

infographic

Dec 31, 2018

Inside the Digital Underworld. In Q3, we examined how markets are changing on the dark web as well as the hot topics and commodities in underground hacker forums. Underground Hacker Forums. Niche Markets With the takedown of some high-profile dark web markets in 2017, vendors are moving away from la...

Read More

Darktrace Discoveries 2018 Real-World Threats Identified by Cyber AI DARKTRACE DISCOVERIES 2018 REAL-WORLD THREATS IDENTIFIED BY CYBER AI

whitepaper

Dec 31, 2018

Cyber-attacks in 2018 are increasingly moving at machinespeeds, encrypting or compromising machines within seconds. Strained security teams simply cannot keep pace, and struggle to respond fast enough. As attackers learn to move at unprecedented speeds, we have also seen AI become a fundamental ally...

Read More

GAIN BACK THE TRUST IN YOUR NETWORK GAIN BACK THE TRUST IN YOUR NETWORK

whitepaper

Dec 31, 2018

INTRODUCING BLUE RIDGE NETWORKS’ TECHNOLOGY Blue Ridge Networks’ LinkGuard platform represents a best-in-class capability to protect the critical assets of commercial and government customers from increasingly destructive and costly cyber-attacks. Able to support a wide range of architec...

Read More

CYBERSECURITY TRENDS 2019: Privacy and Intrusion in the Global Village CYBERSECURITY TRENDS 2019: PRIVACY AND INTRUSION IN THE GLOBAL VILLAGE

whitepaper

Dec 29, 2018

For several years now, ESET experts from around the world have been contributing to our annual Trends report, which offers a brief review of the milestones reached in the world of cybersecurity and our predictions about possible attack scenarios and measures to counteract them in 2019. The basic sce...

Read More

Beware! Your website might be delivering Emotet malware BEWARE! YOUR WEBSITE MIGHT BE DELIVERING EMOTET MALWARE

blog article

Dec 29, 2018

In 2018, we saw a surge in Emotet activity. Emotet started as a banking trojan but this blog will shed light on how it has also become a “threat distributor”. We will also discuss server-side and client-side activity and how it spreads. Its self-propagation makes it all the more challeng...

Read More

2018: The Year of the Data Breach Tsunami 2018: THE YEAR OF THE DATA BREACH TSUNAMI

infographic

Dec 28, 2018

Our friends at Malwarebytes wrote: "It’s tough to remember all of the data breaches that happened in 2018. But when you look at the largest and most impactful ones that were reported throughout the year, it paints a grim picture about the state of data security today. The consequences of ...

Read More

state of the internet security CYBER ATTACK TRENDS AND THREAT LANDSCAPE STATE OF THE INTERNET SECURITY CYBER ATTACK TRENDS AND THREAT LANDSCAPE

whitepaper

Dec 28, 2018

Explosion of Automated Attacks in the Connected World. A White House study published in January of 2018 estimated that malicious cyber activity cost the U.S. economy between $57 billion and $109 billion in 20161 . An international report from the Center for Strategic and International Studies (CSIS)...

Read More

The New Mob is on the Internet THE NEW MOB IS ON THE INTERNET

blog article

Dec 28, 2018

According to the Secureworks State of Cybercrime Report 2018, the bulk of cybercrime-related damage around the globe is perpetrated by a small group of well-organized, dangerous, and covert criminal groups. What’s worse, the report shows that the boundary between a nation-state and cybercrimin...

Read More

White House Cybersecurity Strategy: The Essence WHITE HOUSE CYBERSECURITY STRATEGY: THE ESSENCE

blog article

Dec 28, 2018

The “National Cyber Strategy”, released recently by the White House, offers a broad blueprint for America’s approach to cybersecurity.  Let’s look its four “pillars”, and their key elements. 1. Protecting the American People, Homeland, and the American Way of...

Read More

Cyber Security and Privacy Threats & How We Fought Them | 2018 in Review CYBER SECURITY AND PRIVACY THREATS & HOW WE FOUGHT THEM | 2018 IN REVIEW

blog article

Dec 28, 2018

It was the best of years, it was the worst of years… Today we’re doing a recap of 2018. Treat yourself to a cup of hot drink, sit back, and enjoy our review of these past 12 months. What new cyber threats arose? How did internet community address them? What did KeepSolid VPN Unlimited d...

Read More

Software Supply Chain Threats Are On The Rise SOFTWARE SUPPLY CHAIN THREATS ARE ON THE RISE

blog article

Dec 27, 2018

Large organizations in both the public and private sector routinely work with subcontractors for everything from the supply of manufactured components to the supply of custom computer code. For example, government agencies may contract with software development companies for the supply of code used ...

Read More

Security in Remote Support SECURITY IN REMOTE SUPPORT

whitepaper

Dec 27, 2018

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to your organization. BeyondTrust can help your support organization stay secure and compliant, while improving the efficiency and success of your organization with ...

Read More

Exploits on the Rise: SAP and Oracle EXPLOITS ON THE RISE: SAP AND ORACLE

blog article

Dec 27, 2018

Whatever role you play in ensuring your organization runs smoothly, the biggest risk to the business is not knowing the risks. ERP systems SAP and Oracle have seen a 100% increase in available public exploits over the last three years and a 160% increase in the activity and interest in ERP-specific ...

Read More

Security in the Privileged Remote Access Appliance SECURITY IN THE PRIVILEGED REMOTE ACCESS APPLIANCE

whitepaper

Dec 27, 2018

Security in BeyondTrust Privileged Remote Access (OnPremises) The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to your organization. BeyondTrust can help your organization stay secure and compliant, while improving...

Read More

A LOOK AHEAD 10 CYBER SECURITY PREDICTIONS FOR 2019 A LOOK AHEAD 10 CYBER SECURITY PREDICTIONS FOR 2019

whitepaper

Dec 27, 2018

2018 was a year of major cyberattacks, from all-too-common hacks, ransomware and phishing to new, sophisticated crypto-jacking. The year also brought dramatic privacy developments through enactment of the European General Protection Regulation (GDPR) and passage of the California Consumer Privacy Ac...

Read More

Five Ways to Increase Your Cyber Health in 2019 FIVE WAYS TO INCREASE YOUR CYBER HEALTH IN 2019

blog article

Dec 27, 2018

You are the Internet. It’s easy to get lost in the jargon, or the acronyms, or the fast-paced upgrades, but it doesn’t make it any less true. The Internet isn’t just a bunch of servers sitting in a dusty warehouse somewhere, or the flickering bars on the corner of your phone (which...

Read More

Top 5 Cybersecurity Priorities for 2019: Ponemon Study TOP 5 CYBERSECURITY PRIORITIES FOR 2019: PONEMON STUDY

blog article

Dec 27, 2018

We asked 2,410 IT and cybersecurity decision-makers in six countries to identify their top cybersecurity and governance priorities for the New Year. Here’s what we learned. What are your top cybersecurity concerns for 2019? Tenable commissioned Ponemon Institute to conduct a survey of 2,410 IT...

Read More

Compliance with Data Security and Privacy COMPLIANCE WITH DATA SECURITY AND PRIVACY

video

Dec 26, 2018

Daksh Singh, Head of Analytics, Aegon Life, talks about why it is vital for BFSI companies to comply with security and privacy while dealing with customer data. Your data is secure with us. Information security is indispensable to winning customer confidence in Financial Services industry. Lemnisk i...

Read More

The Top 5 Best DNS Servers for improving Online Privacy & Security THE TOP 5 BEST DNS SERVERS FOR IMPROVING ONLINE PRIVACY & SECURITY

blog article

Dec 25, 2018

We recently ran two Twitter polls to ask what you thought the best DNS servers were in terms of online privacy and security. ISPs (Internet Service Providers) generally offer DNS services to their customers, so when you don’t set up DNS servers on your computer or router, your DNS queries will...

Read More

6 Alternative Authentication Methods to Supersede Passwords 6 ALTERNATIVE AUTHENTICATION METHODS TO SUPERSEDE PASSWORDS

blog article

Dec 24, 2018

Back in 2004, Bill Gates said people would rely less and less on passwords, because “they just don’t meet the challenge.” And really, passwords, the world’s most common way of authentication, have been becoming obsolete over the past decade or so. Judging from numerous securi...

Read More

Adware Definition ADWARE DEFINITION

blog article

Dec 24, 2018

A software application that shows unsolicited advertisements while a program is running is termed as an adware. In most cases, the adware comes implanted inside a free software supported by advertisements. These ads start to show up in pop-up windows or on a toolbar on a computer or browser. Though ...

Read More

All You Need to Know about the NIST Cybersecurity Framework ALL YOU NEED TO KNOW ABOUT THE NIST CYBERSECURITY FRAMEWORK

blog article

Dec 21, 2018

The last few years have transformed cybersecurity and data protection from niche concerns to major problems as both individuals and organizations suffered from an unprecedented wave of cyberattacks and data theft. Governments around the world have stepped up and have begun introducing legislation th...

Read More

Unmanaged Virtual Private Server: Keeping It Secure UNMANAGED VIRTUAL PRIVATE SERVER: KEEPING IT SECURE

blog article

Dec 21, 2018

Virtual Private Servers (VPS) is undoubtedly the future of web hosting. A VPS refers to a virtual machine or virtual server, installed on a computer that is simultaneously accessed by many end users or websites seems to be a dedicated server. Also referred to as a virtual dedicated server (VDS), the...

Read More

Cybersecurity Trends to Watch Out for in 2019 CYBERSECURITY TRENDS TO WATCH OUT FOR IN 2019

blog article

Dec 21, 2018

The cybersecurity landscape is in constant flux, keeping our team busy researching the newest threats to keep our customers safe. As the new year approaches, we asked our cybersecurity experts to predict which security trends will have the most impact in 2019 and what consumers should prepare for. C...

Read More

58% increase in companies affected by BEC attacks 58% INCREASE IN COMPANIES AFFECTED BY BEC ATTACKS

blog article

Dec 21, 2018

Data from Lloyds Bank has revealed a 58% increase in BEC (business email compromise) attacks in the year to date. It is important to note that the “true scale of the problem is likely to be much larger” as this is only reported fraud. Key findings. The average loss to a commercial custom...

Read More

CYBERX AND HIGHLIGHTS CYBERARK INTEGRATION CYBERX AND HIGHLIGHTS CYBERARK INTEGRATION

whitepaper

Dec 21, 2018

Reducing OT Risk from Unauthorized Remote Access. The March 2018 FBI/DHS alert clearly documented how threat actors are leveraging compromised remote access credentials to access critical infrastructure networks via remote desktop and VPN connections. By using trusted connections, this approach easi...

Read More

A Dynamic Duo: AWS & WP Engine A DYNAMIC DUO: AWS & WP ENGINE

whitepaper

Dec 21, 2018

WordPress at scale means two things: building an application or website that scales well for traffic growth or allocating additional infrastructure for planned and unplanned traffic spikes. At WP Engine, we leverage a modern technology stack to make sure our customers have the right tools for scalin...

Read More

Join Allen Downs at IBM Think 2019 JOIN ALLEN DOWNS AT IBM THINK 2019

video

Dec 20, 2018

Join Allen Downs, Vice President, IBM Business Resiliency Services, and other IBM experts, industry analysts and clients at the Security & Resiliency campus at IBM Think 2019 to learn about new technologies and practices to mitigate cyber risks.

Read More

The Email Security Education Series: The Basics THE EMAIL SECURITY EDUCATION SERIES: THE BASICS

blog article

Dec 20, 2018

Your customers rely on email for their day-to-day business operations, and cybercriminals know this.  This is why some of the biggest online threats come from spam and email-borne malware. In fact, phishing and spear phishing represent the number one attack vector threatening business all over ...

Read More

Granular Security for Assessments in Financial Reporting Compliance GRANULAR SECURITY FOR ASSESSMENTS IN FINANCIAL REPORTING COMPLIANCE

whitepaper

Dec 20, 2018

Beginning with Release 13 Update 18C, data security for Financial Reporting Compliance assessments is no longer dependent on data security for other objects. In Financial Reporting Compliance, data security policies determine which items are available to users. The policies are mapped to roles, whic...

Read More

Data Security Compliance for NBFCs DATA SECURITY COMPLIANCE FOR NBFCS

blog article

Dec 20, 2018

Non-bank financial institutions (NBFIs) or non-bank financial companies (NBFCs) have been an integral part of the Indian financial system. These are financial institutions that do not have a banking license or regulated by an agency but can still carry out financial services ranging from asset finan...

Read More

Social Engineering Methods Used for Malware Distribution SOCIAL ENGINEERING METHODS USED FOR MALWARE DISTRIBUTION

blog article

Dec 20, 2018

Social engineering has been one of the most effective ways to spread malicious software lately. Whereas software vulnerabilities tend to be patched sooner or later, things don’t appear so promising when it comes to human “exploits.” For example, Microsoft has rolled out a patch tha...

Read More

Your checklist for responding to and reporting data breaches YOUR CHECKLIST FOR RESPONDING TO AND REPORTING DATA BREACHES

blog article

Dec 20, 2018

There is a lot you need to do after you discover a data breach, so it’s a good idea to keep a checklist. This will help you keep track of your progress during a hectic few days and ensure that you’ve done everything necessary to comply with the EU GDPR (General Data Protection Regulation...

Read More

3 cyber security takeaways from 2018 3 CYBER SECURITY TAKEAWAYS FROM 2018

blog article

Dec 20, 2018

2018 is coming to an end. And there’s been lots of big cyber security developments. Hotel hacks, the GDPR, low-level vulnerabilities and cold boot attacks all made headlines in the last year. Janne Kauhanen, host of F-Secure’s Cyber Security Sauna podcast, invited several F-Secure expert...

Read More

2018 in Review: The Top Four Takeaways in Security 2018 IN REVIEW: THE TOP FOUR TAKEAWAYS IN SECURITY

blog article

Dec 20, 2018

2018 in Review: The Top Four Takeaways in Security, and What Does it Mean for 2019? It’s hard to believe that 2018 is almost over. While many of us may remember 2018 as  “The Year of GDPR,” there were many other security developments and trends, many of which could affect our ...

Read More

Are security concerns holding you back from. EMBRACING THE CLOUD? ARE SECURITY CONCERNS HOLDING YOU BACK FROM. EMBRACING THE CLOUD?

infographic

Dec 20, 2018

In a recent survey, 150+ federal IT professionals said that their number one cloud challenge1 is expanding security measures to cover their cloud environments. If you’re an IT leader that’s hesitant to embrace the cloud due to security concerns, Force 3 can help. Security is a key concer...

Read More

SINGAPORE HEALTH SERVICE CYBER ATTACK LESSONS LEARNED SINGAPORE HEALTH SERVICE CYBER ATTACK LESSONS LEARNED

whitepaper

Dec 20, 2018

In the most recent cyber wake up call, the personal data of 1.5 million patients in Singapore has been hacked in the country’s largest cyber-attack, the Singaporean government announced recently. 160,000 of these patients, including Prime Minister Lee Hsien Loong, had their outpatient prescrip...

Read More

 Industrial and Critical Infrastructures Compliance With the NIS Cyber Security Framework INDUSTRIAL AND CRITICAL INFRASTRUCTURES COMPLIANCE WITH THE NIS CYBER SECURITY FRAMEWORK

whitepaper

Dec 20, 2018

European national security depends on the reliability and continuous operations of each nation’s critical infrastructure. The increasing complexity and connectivity of critical infrastructure systems are exposing them to cybersecurity threats which put their safety and reliability at risk. The Europ...

Read More

Adhering to NIST Cyber Security Framework with Indegy Security Suite ADHERING TO NIST CYBER SECURITY FRAMEWORK WITH INDEGY SECURITY SUITE

whitepaper

Dec 20, 2018

United States national security depends on the reliability and continuous operations of the nation's critical infrastructure. The increasing complexity and connectivity of critical infrastructure systems are exposing them to cybersecurity threats which put their safety and reliability at risk. The ...

Read More

The Role of Cyber Intelligence in Election Security THE ROLE OF CYBER INTELLIGENCE IN ELECTION SECURITY

blog article

Dec 19, 2018

Elections. Quite the hot-button issue these days. Step into the proverbial public square, or be invited behind closed doors, and you’ll find elections are being discussed with fervor. With all the extra attention, it’s important to note that more eyes will be on security than ever &ndash...

Read More

5 data breaches that could have been avoided in 2018 5 DATA BREACHES THAT COULD HAVE BEEN AVOIDED IN 2018

blog article

Dec 19, 2018

2018 has been a year of ups and downs for information security. We’ve seen the enforcement of the EU’s GDPR take full effect, bringing the importance of protecting sensitive data to the forefront of people’s minds, with practical steps being taken to ensure compliance. However, whi...

Read More

Smart Cities, Intelligent Transportation Controlling and Optimizing the Flow of Traffic SMART CITIES, INTELLIGENT TRANSPORTATION CONTROLLING AND OPTIMIZING THE FLOW OF TRAFFIC

whitepaper

Dec 19, 2018

City managers across the U.S. are looking for ways to better control traffic to reduce pressure on infrastructure, improve air quality, and make cities more livable. To that end, they are interweaving alternative modes of transportation, active traffic management, and connected vehicles into an inte...

Read More

Download for a data breach. How to avoid unwanted data acquisition in downloadable documents DOWNLOAD FOR A DATA BREACH. HOW TO AVOID UNWANTED DATA ACQUISITION IN DOWNLOADABLE DOCUMENTS

blog article

Dec 19, 2018

Downloading a document from websites and cloud collaboration applications is a common practice for many businesses. The finance department downloads an invoice, the HR department, a CV, and Business Development an RFP. While it’s often as common as replying to an email, employees often forget ...

Read More

WHAT’S GOING TO CHANGE IN CYBERSECURITY IN 2019 (AND WHAT WON’T) WHAT’S GOING TO CHANGE IN CYBERSECURITY IN 2019 (AND WHAT WON’T)

blog article

Dec 19, 2018

Many things in cybersecurity that should happen in 2019 won’t. Learn why. Every year, we reach December and industry experts share their predictions and tell the world what the biggest trends will be for the following year. In the security industry it’s hard to predict exactly what cyber...

Read More

An Inside Look At The IPSec Tunnel AN INSIDE LOOK AT THE IPSEC TUNNEL

blog article

Dec 18, 2018

The Internet is an integral part of daily business for most organizations today, and along with this comes an inherent vulnerability to cyber attacks. In the face of growing incidents of cybercrime, enterprises struggle with the quandary of how to keep data secure while avoiding disruptions to daily...

Read More

What is Passive DNS? And Why Should You Use a Passive DNS API? WHAT IS PASSIVE DNS? AND WHY SHOULD YOU USE A PASSIVE DNS API?

blog article

Dec 18, 2018

Cybersecurity attacks and network threats are on the rise every year. Even if you’re not aware of it, the bad guys are always lurking in the background, looking for ways to attack your web server, DNS infrastructure and domain names. As seen in our Types of DNS Attacks blog post, the DNS syste...

Read More

What is IoT Security and Why is it Important for Businesses? WHAT IS IOT SECURITY AND WHY IS IT IMPORTANT FOR BUSINESSES?

blog article

Dec 18, 2018

The Business of IoT Security. Way before IoT security was on everybody’s mind, something happened in late 2016 that was straight out of a sci-fi movie: the Internet went down. Well, only parts of it, but it was pretty big. So big, in fact, that it has been described as the biggest DDoS attack ...

Read More

How Big Data is the Future of Business Security HOW BIG DATA IS THE FUTURE OF BUSINESS SECURITY

blog article

Dec 18, 2018

Over time, instances of hacks seem to be breeding at a higher rate. Research in 2016 showed that over a million incidents of cyber crimes were reported in that year alone. Over time, malware attacks have become more challenging to fight and detect and are more sophisticated than before. One of the c...

Read More

FireEye Tips and Insights Series: Gathering Information to Report False Positives FIREEYE TIPS AND INSIGHTS SERIES: GATHERING INFORMATION TO REPORT FALSE POSITIVES

video

Dec 18, 2018

In this installment of the Tips and Insights series, Nate Hancock demonstrates how to gather information for reporting a false positive to FireEye Support. FireEye Network Security (NX) is an effective cyber threat protection solution that helps organizations minimize the risk of costly breaches by ...

Read More

Predictions 2019: "The era of simple Android malware is over" PREDICTIONS 2019: "THE ERA OF SIMPLE ANDROID MALWARE IS OVER"

blog article

Dec 18, 2018

Colorful packaging is not only available for Christmas - but also used by malware throughout the year. Android Malware becomes more sophisticated users, and online banking is also tricky. Our Security Predictions for 2019 give an overview of the biggest threats for customers. The malware ecosystem r...

Read More

It didn IT DIDN'T TAKE LONG FOR THE LAWSUITS TO START ROLLING IN

blog article

Dec 17, 2018

Most people are impressed by size. Specifically, large manmade or natural wonders, large statues or artwork, large bank accounts or net worth, large customer bases or revenues will all make the news in a positive light. Unfortunately, when it comes to cybercrime, we all gasp when we see large number...

Read More

The Year Ahead: Cybersecurity Trends To Look Out for In 2019 THE YEAR AHEAD: CYBERSECURITY TRENDS TO LOOK OUT FOR IN 2019

blog article

Dec 17, 2018

A Proven Record Tracking Cybersecurity Trends. This time of the year is always exciting for us, as we get to take a step back, analyze how we did throughout the year, and look ahead at what the coming year will bring. Taking full advantage of our team’s expertise in data and application securi...

Read More

What is the General Data Protection Regulation? Understanding and Complying with GDPR Requirements WHAT IS THE GENERAL DATA PROTECTION REGULATION? UNDERSTANDING AND COMPLYING WITH GDPR REQUIREMENTS

blog article

Dec 17, 2018

Learn about the General Data Protection Regulation (GDPR) and the requirements for compliance in Data Protection 101, our series on the fundamentals of information security. A DEFINITION OF GDPR (GENERAL DATA PROTECTION REGULATION). The General Data Protection Regulation (GDPR), agreed upon by the E...

Read More

ASL Airlines France Combats Ransomware and Unifies Global Management with Rubrik Polaris ASL AIRLINES FRANCE COMBATS RANSOMWARE AND UNIFIES GLOBAL MANAGEMENT WITH RUBRIK POLARIS

whitepaper

Dec 15, 2018

ASL Airlines France (ASL) is a cargo and passenger airline based in Tremblay-en-France at Bâtiment Le Séquoia. Their main base is Charles de Gaulle airport, Europe’s second busiest air traffic hub. A majority of ASL’s fleet operates on the behalf of delivery services through...

Read More

Six costly data protection gaps in Microsoft Office 365 and how to close them SIX COSTLY DATA PROTECTION GAPS IN MICROSOFT OFFICE 365 AND HOW TO CLOSE THEM

whitepaper

Dec 15, 2018

MICROSOFT OFFICE 365 IS A DATA LOSS DISASTER WAITING TO HAPPEN. If your business relies on Microsoft Office 365, you can expect reliable access to its applications with very high uptime. But many IT professionals are laboring under a dangerous misconception: that Microsoft provides fullyfledged data...

Read More

The Benefits And Practicalities Of Obfuscation THE BENEFITS AND PRACTICALITIES OF OBFUSCATION

blog article

Dec 14, 2018

Obfuscation is also known as geo-spoofing or anonymization, and it refers to the process of concealing a user’s geographic location. Keeping one’s whereabouts and identity concealed, especially when connecting from untrusted locations, can be challenging. To further complicate matters, i...

Read More

Security Predictions from the Magic 8 Ball SECURITY PREDICTIONS FROM THE MAGIC 8 BALL

blog article

Dec 14, 2018

With the end of each year, security professionals break out their crystal balls to estimate what will be the industry’s trends for the coming year. To break this tradition, I decided to not ask my crystal ball, but my magic 8 ball. This post will cover some of the trends that we can look forwa...

Read More

Data Protection in the UK Post-Brexit DATA PROTECTION IN THE UK POST-BREXIT

blog article

Dec 14, 2018

After months of intense negotiations, the UK and the EU have reached a deal for the UK’s exit from the European Union or, as it’s more commonly known, Brexit. However, to gain approval, the 585-page withdrawal agreement must still earn a vote from the British parliament as well as one fr...

Read More

How to stay cyber secure over the Christmas period HOW TO STAY CYBER SECURE OVER THE CHRISTMAS PERIOD

blog article

Dec 14, 2018

If there’s a worst possible time for an organisation to suffer a data breach, it’s Christmas. That’s not only because it’s morale-sapping to suffer such bad news at a time that’s supposed to be full of cheer and optimism. There’re also the practicalities of respon...

Read More

Key Considerations for Selecting an Industrial Cybersecurity Solution for Asset Identification, Threat Detection, and Response KEY CONSIDERATIONS FOR SELECTING AN INDUSTRIAL CYBERSECURITY SOLUTION FOR ASSET IDENTIFICATION, THREAT DETECTION, AND RESPONSE

whitepaper

Dec 13, 2018

In the industrial cybersecurity industry today, there are two main challenges facing those responsible for protecting their organizations’ networks: a largely unknown threat landscape and a shortage of experienced personnel with effective threat detection and response capabilities. With the nu...

Read More

Airport Security Model for IT AIRPORT SECURITY MODEL FOR IT

infographic

Dec 13, 2018

Cisco AnyConnect. Like your driver’s license, you have to show your proof of who you are to get into an airport, and AnyConnect works like this to secure endpoint access and ensure they are “compliant” to be on the network. Cisco Umbrella (OpenDNS). This is a No-fly List check &mda...

Read More

What Separates Webroot WiFi Security from Other VPNs? WHAT SEPARATES WEBROOT WIFI SECURITY FROM OTHER VPNS?

blog article

Dec 13, 2018

Virtual Private Networks (VPNs) are quickly becoming a fundamental necessity for staying safe online. From large corporations to family households, people are turning to VPNs to ensure their data is encrypted end to end. But as with any emerging technology, it’s easy to become overwhelmed with...

Read More

GSA Simplifies Categories for IT-70 HACS SINs GSA SIMPLIFIES CATEGORIES FOR IT-70 HACS SINS

blog article

Dec 13, 2018

The General Services Administration (GSA) announced changes to the Information Technology Schedule 70 (IT-70) Highly Adaptive Cybersecurity Services (HACS) Special Item Numbers (SINs) on November 14, consolidating its cyber security contract vehicles. The main change is the addition of a new sub-cat...

Read More

How to document your information security policy HOW TO DOCUMENT YOUR INFORMATION SECURITY POLICY

blog article

Dec 12, 2018

Information security policies play a vital role in organisational security. Getting your policy right will give you an excellent framework to build on, making sure that all your efforts follow a single goal. But if you get it wrong, you risk neglecting key issues and exposing yourself to data breach...

Read More

FireEye Email Security Server Edition FIREEYE EMAIL SECURITY SERVER EDITION

whitepaper

Dec 12, 2018

Email is the most vulnerable vector for cyber-attacks because it is the highest volume data ingress point. Organizations face an ever-increasing number of security challenges from email-based advanced threats. Most advanced threats use email to deliver URLs linked to credential phishing sites and we...

Read More

Read: New Attack Analytics Dashboard Streamlines Security Investigations READ: NEW ATTACK ANALYTICS DASHBOARD STREAMLINES SECURITY INVESTIGATIONS

blog article

Dec 12, 2018

Attack Analytics, launched this May, aimed to crush the maddening pace of alerts that security teams were receiving. For security analysts unable to triage this avalanche of alerts, Attack Analytics condenses thousands upon thousands of alerts into a handful of relevant, investigable incidents. ...

Read More

Microsoft Patch Tuesday – December 2018 MICROSOFT PATCH TUESDAY – DECEMBER 2018

blog article

Dec 12, 2018

This month the vendor has patched 39 vulnerabilities, 9 of which are rated Critical. As always, customers are advised to follow these security best practices: Install vendor patches as soon as they are available. Run all software with the least privileges required while still maintaining functionali...

Read More

SonicWall: Why We Chose 6Connex SONICWALL: WHY WE CHOSE 6CONNEX'S PLATFORM TO IMPROVE OUR SALES KICKOFFS

video

Dec 11, 2018

SonicWall is a cybersecurity company with thousands of partners around the world. They needed to optimize their sales kick-offs with new tools available. 6Connex helped them increase engagement between teams and streamline their processes.  Learn how.

Read More

2019 will be Privacy Rights’ Break Out Year 2019 WILL BE PRIVACY RIGHTS’ BREAK OUT YEAR

blog article

Dec 11, 2018

Anyone who doubts that 2019 will be the year that the EU’s revolutionary privacy regime, the General Data Protection Regulation (GDPR), finally starts to bite should look to the complaints filed just last week against Google by consumer protection agencies from seven EU countries. The 44 page ...

Read More

Holiday Spam Bulletin HOLIDAY SPAM BULLETIN

infographic

Dec 11, 2018

Naughty and nice cyber security news for the holidays. You better watch out. You better not cry. You better not pout. We’re telling you why: Spam is on the rise! F-Secure research finds that spam is the most common method for cyber criminals to spread malware in 2018. Roughly 69 percent of spa...

Read More

How Cybersecurity Is Evolving: The Real Lesson of Machine Learning HOW CYBERSECURITY IS EVOLVING: THE REAL LESSON OF MACHINE LEARNING

blog article

Dec 11, 2018

Artificial Intelligence (AI) and machine learning are currently hot property, on the wish and hit lists of just about every company on the planet. And it’s not hard to guess why. While AI programs can approximate human behaviour, machine learning (a branch of AI), allows programs to ‘lea...

Read More

KEEPING CYBERSECURE While on the Move KEEPING CYBERSECURE WHILE ON THE MOVE

infographic

Dec 10, 2018

Your bags aren’t the only thing you can lose while travelling. Cybercriminals are ready to steal sensitive information from unsuspecting travelers, resulting in part for the record 16.7 million victims of identity theft in 2017. From booking your ticket and arriving at the hotel to making that...

Read More

7 Most Common Cybersecurity Mistakes To Avoid 7 MOST COMMON CYBERSECURITY MISTAKES TO AVOID

blog article

Dec 10, 2018

Most website owners pay close attention to various factors affecting their website`s popularity and conversions but leave little to no room for thinking about their cybersecurity. While it may be completely unimportant when you just want to build an audience and drive conversions, what you have to u...

Read More

What is Bagle Worm? WHAT IS BAGLE WORM?

blog article

Dec 10, 2018

Bagle Worm: Definition. Bagle, also referred to as Beagle, is a mass-mailing computer worm that has affected Microsoft Windows. Bagle refers to a large family of email worms available with many variations. Beagle is notable for the fact that different variants came in password-protected .zip files, ...

Read More

Achieve Security Through Compliance in the Cloud ACHIEVE SECURITY THROUGH COMPLIANCE IN THE CLOUD

blog article

Dec 10, 2018

Digging through my cupboards recently, I came across my old collection of 3½ floppy disks. It’s been quite some time since I’ve had a need to plug in my trusty USB floppy drive, so upon making this great archaeology discovery, I was left simply to ponder about their content and wh...

Read More

Artificial Intelligence and Cybersecurity: Attacking and Defending ARTIFICIAL INTELLIGENCE AND CYBERSECURITY: ATTACKING AND DEFENDING

blog article

Dec 10, 2018

Cybersecurity is a manpower constrained market – therefore, the opportunities for artificial intelligence (AI) automation are vast. Frequently, AI is used to make certain defensive aspects of cyber security more wide reaching and effective. Combating spam and detecting malware are prime exampl...

Read More

Cybersecurity for mission- critical communications CYBERSECURITY FOR MISSION- CRITICAL COMMUNICATIONS

whitepaper

Dec 10, 2018

While most cyber-attacks aim to achieve financial gain, the consequences of a successful attack on a mission-critical communications network can be far more damaging, even life threatening. New, advanced services are being enabled by IP-based broadband networks and made available to public safety an...

Read More

Adopting SDN for Microgrid Communications ADOPTING SDN FOR MICROGRID COMMUNICATIONS

whitepaper

Dec 10, 2018

As power utilities strive to improve the reliability of electricity delivery and become eco-sustainable, microgrids are gaining in popularity. However, there are challenges in extending network connectivity to microgrids.This paper explains how software-defined networking (SDN) provides unique advan...

Read More

Building the Digital Spine of Oil & Gas Enterprises BUILDING THE DIGITAL SPINE OF OIL & GAS ENTERPRISES

whitepaper

Dec 08, 2018

The advent of Fourth Industrial Revolution is transforming the existing cyber-physical systems, impacting the way companies compete, operate, and grow. Increasingly organizations, across industries and geographies, are treading on the digital path by embracing the latest technology trends - from Int...

Read More

Ensuring a Fast, Reliable, and Secure Database Through Automation: Oracle Autonomous Database ENSURING A FAST, RELIABLE, AND SECURE DATABASE THROUGH AUTOMATION: ORACLE AUTONOMOUS DATABASE

whitepaper

Dec 08, 2018

Managing a modern enterprise-class database can be monstrously complicated. If it’s a data warehouse, the index structure, partitioning plan, and various server settings must be just right to ensure good performance in handling complex queries. If it’s a transactional database, availabil...

Read More

CYBERSECURITY STRATEGY REPORT CYBERSECURITY STRATEGY REPORT

whitepaper

Dec 07, 2018

The Subcommittee’s Cybersecurity Concepts and Priorities. In today’s connected world, where nearly all devices—from the phones in our pockets, to the refrigerators in our kitchens, to the multi-million-dollar equipment that runs our electric grid— are linked together through ...

Read More

10 Benefits of Becoming a Certified Ethical Hacker (C|EH) 10 BENEFITS OF BECOMING A CERTIFIED ETHICAL HACKER (C|EH)

whitepaper

Dec 06, 2018

The Certified Ethical Hacker (C|EH) credentialing and training program provided by EC-Council is a respected and trusted ethical hacking program in the industry. [1] The credentialing program is also used as a hiring standard for Fortune 500 organizations, cybersecurity practices, and governments. W...

Read More

The Attack Vectors to Know THE ATTACK VECTORS TO KNOW

video

Dec 06, 2018

Know the most common cybercrime attack vectors so you can protect yourself. Hackers are continuously upping their game and finding new ways to gain access to networks, data and systems. Make sure you're not the weak link that gives them a way in.

Read More

Can Cognitive Tools Succeed Where Humans Have Failed? CAN COGNITIVE TOOLS SUCCEED WHERE HUMANS HAVE FAILED?

blog article

Dec 06, 2018

Security field sees major boon coming thanks to advances in AI, machine learning, and advanced behavioral analytics. Here’s a fact: Current IT protection and prevention don't even come close to addressing all the cyber threats that corporations, governments, and utilities face every single...

Read More

The Human Factor In Cyber Security – Developers THE HUMAN FACTOR IN CYBER SECURITY – DEVELOPERS

blog article

Dec 06, 2018

About our Cyber Security Series of articles. Our Security teams have identified common challenges organisations face when dealing with Cyber Security threats and this series of articles aims to help readers identify and address these risks. The most common and often overlooked aspect of cyber securi...

Read More

Don’t Get Phished – 7 Tips to Avoid This Common Cyber Attack DON’T GET PHISHED – 7 TIPS TO AVOID THIS COMMON CYBER ATTACK

blog article

Dec 06, 2018

Phishing is the most common type of cyber-attack that impacts organizations both large and small. These attacks may take many forms, but they all share a common goal – getting you to share sensitive information such as login credentials, credit card information, or bank account details. Unfort...

Read More

How are your employees using work-issued devices? HOW ARE YOUR EMPLOYEES USING WORK-ISSUED DEVICES?

blog article

Dec 05, 2018

The holiday shopping rush is in full swing, and employees are increasingly using company-issued devices to complete their gift purchases while at work. In fact, recent research from Robert Half Technology found that 75% of employees admitted to shopping during work hours on a company device on Cyber...

Read More

Six ‘Lessons Learned’ For Mitigating DDoS Attacks SIX ‘LESSONS LEARNED’ FOR MITIGATING DDOS ATTACKS

blog article

Dec 05, 2018

The world of DDoS is dynamic and evolving. So, when considering the most important features that a DDoS Mitigation should have, it’s always worth examining them in light of recent trends and applying some lessons learned. That, however, can be a rather time-consuming assignment. But worry not....

Read More

Open Source Vulnerability Management: Be Wise — Prioritize OPEN SOURCE VULNERABILITY MANAGEMENT: BE WISE — PRIORITIZE

blog article

Dec 05, 2018

It’s safe to say that open source has made it to the big leagues. Across all industries, from healthcare to fintech to IoT and everything in between, software organizations of every size are harnessing the power of open source components to create their innovations. While open source component...

Read More

The Security Impact of the Internet of Things: Ask Bruce THE SECURITY IMPACT OF THE INTERNET OF THINGS: ASK BRUCE

video

Dec 05, 2018

In the age of the Internet of Things, computers – and security risks – are embedded in everything. What can the cyber security industry to do manage these threats? In this video, IBM Resilient’s Bruce Schneier outlines the specific threats that IoT devices present, as well as strat...

Read More

Formjacking: Targeting Popular Stores Near You FORMJACKING: TARGETING POPULAR STORES NEAR YOU

blog article

Dec 05, 2018

Symantec examines the technical aspects of formjacking and details a new campaign affecting top shopping sites. Formjacking, the use of malicious JavaScript code to steal credit card details and other information from payment forms on the checkout web pages of e-commerce sites, has been making headl...

Read More

SuperCom is well funded and becoming a big player in the cyber security world SUPERCOM IS WELL FUNDED AND BECOMING A BIG PLAYER IN THE CYBER SECURITY WORLD

video

Dec 05, 2018

Supercom (NASDAQ:SPCB) President, Americas, Ordan Trabelsi joined Steve Darling from the Proactive Investors in Los Angeles at the LD MIcro show to talk about their global secure solutions integrator and technology company for governments and other consumers facing organizations around the world. In...

Read More

Protecting Data To, From and In the Cloud PROTECTING DATA TO, FROM AND IN THE CLOUD

whitepaper

Dec 05, 2018

Adoption of cloud computing in all forms continues to grow. Many organizations are making use of SaaS applications like Microsoft Office 365, Salesforce and workforce applications such as Dropbox and similar cloud storage and collaboration tools. In the SANS cloud security survey from 2016, 55 perce...

Read More

What Cyberstalking Is and How to Prevent It WHAT CYBERSTALKING IS AND HOW TO PREVENT IT

blog article

Dec 05, 2018

When carried out sensibly and securely, communication through social networks and other online public forums can be beneficial, both socially and professionally. However, if you’re not careful, it can lead to numerous undesirable consequences, one of which is cyberstalking. Cyberstalking is st...

Read More

Why Layered Cybersecurity Matters WHY LAYERED CYBERSECURITY MATTERS

video

Dec 05, 2018

SonicWall President and CEO Bill Conner and CTO John Gmuender walk you through the current cyber threat landscape, explore the importance of automated real-time breach detection and prevention, and address how to mitigate today’s most modern cyberattacks. For more information please visit www....

Read More

NRCC Email Hack Highlights Lack of Visibility & Proactive Threat Hunting at Political Organizations NRCC EMAIL HACK HIGHLIGHTS LACK OF VISIBILITY & PROACTIVE THREAT HUNTING AT POLITICAL ORGANIZATIONS

blog article

Dec 05, 2018

Earlier this week, Politico reported that the National Republican Congressional Committee (NRCC) suffered a major attack prior to the 2018 U.S. midterm elections, with thousands of sensitive emails from four senior aides exposed to an outside intruder. While the impact of this breach is still unfold...

Read More

What is Email Virus and How to Avoid Them? WHAT IS EMAIL VIRUS AND HOW TO AVOID THEM?

blog article

Dec 05, 2018

In general, a computer virus or worm is a self-replicating program capable of being spread by emails or by inserting copies of itself into other documents or programs. Viruses that spread via email are capable of knocking out systems burdened by the huge amounts of generated emails, thus causing sev...

Read More

AppSec Is Dead, but Software Security Is Alive & Well APPSEC IS DEAD, BUT SOFTWARE SECURITY IS ALIVE & WELL

blog article

Dec 04, 2018

Mobile, cloud, the Internet of Things (IoT), microservices, and artificial intelligence have made software more complex. However, for most organizations the emphasis remains on speed over security, rather than building security into the DevOps process. Traditional security approaches have slowed the...

Read More

6 Security Tips to Consider While You Travel 6 SECURITY TIPS TO CONSIDER WHILE YOU TRAVEL

blog article

Dec 04, 2018

Following the “8 Ways to Avoid the Cybersecurity Grinch” blog post, it seems like a follow-up is in order given the recent Marriott Breach disclosure.  It is important to note that when we travel, similar to when we shop, we are putting our trust in the organizations we are dealing ...

Read More

CYBER SECURITY – GETTING THE ESSENTIALS IN PLACE CYBER SECURITY – GETTING THE ESSENTIALS IN PLACE

blog article

Dec 04, 2018

Cyber attacks are real. They’re complicated and they’re not going away. In part one of this blog series, we outlined the risks and consequences of cyber crime, and why cyber security is now a whole of business concern. In this post, we’ll delve into how to ensure you’re in th...

Read More

How to Fight Phishing Attacks: Real-World Examples and Solutions HOW TO FIGHT PHISHING ATTACKS: REAL-WORLD EXAMPLES AND SOLUTIONS

blog article

Dec 04, 2018

At Proofpoint, we have seen a rise in highly targeted phishing attacks. 30% of organizations whose O365 environments we've analyzed suffered compromised accounts, mostly via brute force attacks on their O365 credentials. Sometimes these phishing attacks lead to compromised accounts that attacker...

Read More

Cybersecurity in Europe is Improving: Thank You GDPR? CYBERSECURITY IN EUROPE IS IMPROVING: THANK YOU GDPR?

blog article

Dec 04, 2018

After years of debate over whether to impose new cybersecurity regulations on companies, General Data Protection Regulation (GDPR) laws went into effect in Europe in May 2018. Already we’ve seen several data breach victims ordered to pay fines under the new rules and cookie disclosure notices ...

Read More

THE DARK SIDE OF THE FORSSHE A landscape of OpenSSH backdoors THE DARK SIDE OF THE FORSSHE A LANDSCAPE OF OPENSSH BACKDOORS

whitepaper

Dec 04, 2018

A little more than three years ago we started hunting for OpenSSH backdoors being used in-the-wild. While we are always trying to improve defenses against Linux malware by discovering and analyzing examples, the scope of this hunt was specifically to catch server-side OpenSSH backdoors. Unfortunatel...

Read More

Proactive Cyber-security with HPE Gen 10 Servers PROACTIVE CYBER-SECURITY WITH HPE GEN 10 SERVERS

video

Dec 04, 2018

HPE Gen 10 includes the HPE Silicon Root of Trust, which provides a level of protection at the control plane via iLO 5. One of the key changes HPE made in their own manufacturing supply chain is to design their own silicon that contains a fingerprint in the silicon from the factory so that detecting...

Read More

2018 Sees API Breaches Surge With No Relief in Sight 2018 SEES API BREACHES SURGE WITH NO RELIEF IN SIGHT

blog article

Dec 04, 2018

Last year the OWASP Top 10 committee was prophetic in at least one of its inclusions in the update to its industry benchmark list. For the first time, the group included insecure APIs as one of the most common attack vectors that developers need to avoid adding to their code when creating software. ...

Read More

Dell detects data breach, informs customers after a month DELL DETECTS DATA BREACH, INFORMS CUSTOMERS AFTER A MONTH

blog article

Dec 04, 2018

It took Dell almost a full month to inform its customers that their information was stolen following a security incident which occurred on November 9, 2018, reads a notice on the computer company’s website. The company reset customer passwords without informing them early on that their data ma...

Read More

Fork Bomb Virus FORK BOMB VIRUS

blog article

Dec 04, 2018

Fork bomb is also called wabbit or rabbit virus that was crafted by malicious hackers to launch denial-of-service attack on the target system. The virus replicates itself and corrupts the available system resources. It slows down the performance of the system or sometimes can cause system crashes du...

Read More

Is The Supply Chain The New Cyber Abyss? IS THE SUPPLY CHAIN THE NEW CYBER ABYSS?

blog article

Dec 03, 2018

We all know that Target lost its CEO along with $164M dollars when a small HVAC contractor that was part of the supply chain was breached, allowing hackers into Target’s network. However, you may not be aware that banks spent over $200M reissuing Target credit cards. And, what about Chinese te...

Read More

Here Are 2018 HERE ARE 2018'S MOST ALARMING SCAM STATISTICS

blog article

Dec 03, 2018

The end of the year is a time when people often engage keep an eye on societal trends. One characteristic to be aware of about 2018 is that it was a year full of scams. Here are six of the most eye-opening and worrisome statistics: 1. Spam Comprised More Than Half of Email Traffic in May 2018. Many ...

Read More

CrowdStrike Expands Public Sector Footprint as DLT Reinvests in Partner Ecosystem CROWDSTRIKE EXPANDS PUBLIC SECTOR FOOTPRINT AS DLT REINVESTS IN PARTNER ECOSYSTEM

blog article

Dec 03, 2018

In a recent blog post, DLT Chief Technology Officer David Blankenhorn shared his insight on DLT’s evolution to a government solutions aggregator: “At DLT, we are doubling down on our key capabilities. DLT has had a partner ecosystem for many years, but we are now reinvesting in that ecos...

Read More

3 Trends That Make Automation a Must for Securing Industrial Control Systems 3 TRENDS THAT MAKE AUTOMATION A MUST FOR SECURING INDUSTRIAL CONTROL SYSTEMS

blog article

Dec 03, 2018

Every time I flip a light switch or run water for my daily shower, I’m not thinking of the potential security risks within our power plants or water suppliers. I just take it for granted that the computers working behind the scenes keep things running smoothly. These computers, also known as I...

Read More

Tis the Season to be Phishing TIS THE SEASON TO BE PHISHING

blog article

Dec 03, 2018

The holiday season is upon us once again. The conference call on-hold music has become more cheerful, the annual company party is coming up, and the holiday sales are making their way into circulars, popup ads, and emails. For many of us, these sights and sounds instill a familiar warmth and reminde...

Read More

What is Shamoon Virus? WHAT IS SHAMOON VIRUS?

blog article

Dec 03, 2018

Shanmoon was discovered by Seculert, Symantec, and Kaspersky Lab on 16 August 2012 that targets 32-bit NT kernel versions of Microsoft Windows. It is a modular virus and is also known as W32.DisTrack. This virus was crafted for cyber-warfare as it spread the malicious-content from an infected machin...

Read More

Bell DDoS Security Brief BELL DDOS SECURITY BRIEF

infographic

Dec 02, 2018

This infographic looks at distributed denial of service (DDoS) attack trends over the past year based on the insights Bell gathers as it operates Canada’s largest voice and data network. Across Canada and around the world, the DDoS threat is on the rise. Bell detected a sharp climb in DDoS att...

Read More

Don’t Let the Grinch Steal Christmas: A Timeline of Holiday Season Magecart Activity DON’T LET THE GRINCH STEAL CHRISTMAS: A TIMELINE OF HOLIDAY SEASON MAGECART ACTIVITY

blog article

Nov 30, 2018

The retail, travel and hospitality industries face difficult security challenges year-round, but November through to the end of the year is the time that keeps the security professionals in these industries especially busy. The holiday shopping season is a time for financially motivated actors to at...

Read More

Survive and thrive with Digital Business Transformation for Banking SURVIVE AND THRIVE WITH DIGITAL BUSINESS TRANSFORMATION FOR BANKING

whitepaper

Nov 30, 2018

To not only survive but thrive midst the large-scale disruption faced by the banking industry, large investments are being made in IT transformation. Low interest rates, regulatory pressure to cut fees, growing competition from new ‘digitally-native’ entrants and the disintermediation of...

Read More

5 Qualities Your Next Chief Information Security Officer (CISO) Should Have 5 QUALITIES YOUR NEXT CHIEF INFORMATION SECURITY OFFICER (CISO) SHOULD HAVE

blog article

Nov 30, 2018

In a world where dataism has become the new normal for organisations, security has become a high priority. Or at least, it should be a top priority for organisations. Unfortunately, the reality is different, and every year, many consumers still become the victim of one of the hundreds of data breach...

Read More

What makes a strong password? WHAT MAKES A STRONG PASSWORD?

blog article

Nov 30, 2018

Even social media giant Facebook has been ordered to step up data protection as 29 million of its user’s passwords were exposed in 2018. Creating a strong and secure password is a critical step in protecting confidential data and networks. Your infrastructure can come under attack from cyber c...

Read More

Red team testing: hacking and lying your way to data RED TEAM TESTING: HACKING AND LYING YOUR WAY TO DATA

blog article

Nov 30, 2018

We at Bulletproof provide a range of different cyber security services, including penetration tests, managed SIEM, and compliance consultancy. Though undoubtedly the most interesting (and cool) service we offer are our red team assessments. So, what is a red team test? Put simply, a red team test is...

Read More

How to react to a ransomware attack HOW TO REACT TO A RANSOMWARE ATTACK

infographic

Nov 30, 2018

Cyber criminals use ransomware to take control of your data or systems. They offer to release them if you pay them a ransom. The National Crime Agency (NCA) strongly advises you not to pay. Many victims never get their data back and known ‘payers’ are often targeted again. Read the Natio...

Read More

Cyber Security and the Industrial Internet of Things CYBER SECURITY AND THE INDUSTRIAL INTERNET OF THINGS

whitepaper

Nov 30, 2018

The Industrial Internet of Things (IIoT) and Industry 4.0 (I4.0) are transforming discrete manufacturing. Early adopters have already made extensive use of IIoT technology to radically improve factory efficiency and product quality. This has unleashed new competitive pressures for manufacturers acro...

Read More

Which Software Offers The Best Virus Protection in 2019? WHICH SOFTWARE OFFERS THE BEST VIRUS PROTECTION IN 2019?

blog article

Nov 30, 2018

Computers today not just need protection from viruses but from the whole lot of malware (spyware, adware etc.,) including the unpredictable zero-day malware. In other words, we are living in an age were virus protection alone is not going to be enough to safeguard your computers. Therefore, let&rsqu...

Read More

What is CryptoWall? WHAT IS CRYPTOWALL?

blog article

Nov 30, 2018

CryptoWall belongs to the ransomware family that uses advanced techniques to infiltrate computers and hides from its victims. Simply put, the Cryptowall is a Trojan horse that encrypts files on the jeopardized computer and then proceeds to threaten the user to pay a ransom to have the files decrypte...

Read More

Enabling Cyber Security at scale with speed ENABLING CYBER SECURITY AT SCALE WITH SPEED

whitepaper

Nov 29, 2018

Improve cyber Responsiveness and mission effectiveness. Federal agencies and private entities alike are facing great challenges in areas such as cyber situational awareness, defense of cyber physical systems, and shortages in qualified staff. The burden on individuals to do the work required in thes...

Read More

Partner Perspectives: Notes from the Field: Extending Carbon Black Visibility to Undetected Malware PARTNER PERSPECTIVES: NOTES FROM THE FIELD: EXTENDING CARBON BLACK VISIBILITY TO UNDETECTED MALWARE

blog article

Nov 29, 2018

Daniel LaVoie is a Senior Solutions Specialist at ReversingLabs. On a recent customer visit, I asked the company’s Director of Security Operations how ReversingLabs came to be deployed as a part of their SOC tool set. The answer was quite interesting, and one that I wanted to share with our bl...

Read More

Top 5 Threat Hunting Myths: “EDR Is Threat Hunting” TOP 5 THREAT HUNTING MYTHS: “EDR IS THREAT HUNTING”

blog article

Nov 29, 2018

The cybersecurity landscape is in a constant state of change and, as many organizations have learned, it’s no longer a matter of if you’ll face a cyberattack, but when. In today’s world, attackers intentionally look normal to evade automated defenses. With the rise of ransomware, f...

Read More

THE STATE OF CYBERSECURITY IN 2018 THE STATE OF CYBERSECURITY IN 2018

infographic

Nov 29, 2018

As cyberattacks continue to increase, the threat landscape and defense techniques in IT are constantly shifting to combat issues. Now more than ever, defenders are evolving their own set of technological advances to combat threats. What you need to know Source: “State of Cybersecurity 2018 Par...

Read More

Kaspersky Security Bulletin 2018 STORY OF THE YEAR: MINERS KASPERSKY SECURITY BULLETIN 2018 STORY OF THE YEAR: MINERS

whitepaper

Nov 29, 2018

Cryptocurrency miners that infect the computers of unsuspecting users essentially operate according to the same business model as ransomware programs: the victim’s computing power is harnessed to enrich the cybercriminals. Only in the case of miners, it might be quite a while before the user n...

Read More

8 Ways to Avoid the Cybersecurity Grinch This Holiday Season 8 WAYS TO AVOID THE CYBERSECURITY GRINCH THIS HOLIDAY SEASON

blog article

Nov 29, 2018

According to the Carbon Black Threat Analysis Unit (TAU), organizations should expect to see a spike in potential cyberattacks starting with Black Friday/Cyber Monday and continuing through the holiday shopping season. TAU’s analysis across Carbon Black’s global endpoint footprint &ndash...

Read More

The Hunt for 3ve THE HUNT FOR 3VE

whitepaper

Nov 29, 2018

Every year brings new levels of sophistication and innovation in cybercrime, and the last year was no exception. Over the course of last year, we investigated one of the most complex and sophisticated ad fraud operations we have seen to date. We named this operation “3ve” (pronounced &ld...

Read More

Cyber Security: IEC 62443 Certification supports Charter of Trust CYBER SECURITY: IEC 62443 CERTIFICATION SUPPORTS CHARTER OF TRUST

video

Nov 29, 2018

In the digital age, cybersecurity is a basic prerequisite if companies are going to be able to protect their critical infrastructures and sensitive data, and ensure uninterrupted business operations. “Confidence that the security of data and networked systems is guaranteed is a key element of ...

Read More

Data Privacy In 2019 DATA PRIVACY IN 2019

blog article

Nov 28, 2018

It’s been a big year for data privacy. The world’s strictest data protection standard to date, the European Union’s General Data Protection Regulation (GDPR), became enforceable in May 2018 and its reach stretches far beyond Europe’s borders. GDPR applies to any company that ...

Read More

The Likelihood of a Cyber Attack Compared THE LIKELIHOOD OF A CYBER ATTACK COMPARED

infographic

Nov 28, 2018

While the cost of a cyber attack is often discussed, we seldom hear about just how common these attacks actually are. Numerous security experts believe that a cyber attack or breach of catastrophic proportions is no longer a matter of if, but a matter of when. According to the World Economic Forum&r...

Read More

Cybersecurity in the banking industry CYBERSECURITY IN THE BANKING INDUSTRY

video

Nov 28, 2018

DeloittePerspective: It's Day 3 of CyberCredence week and we are talking about #cybersecurity within banks.  Watch Munjal Kamdar, Partner, Deloitte India talk about the top 3 trends shaping the future of banks. SecurityDoneRight RiskAdvisory.

Read More

Pattern Recognition, Analysis and Profiling for Investigations and Threat Hunting PATTERN RECOGNITION, ANALYSIS AND PROFILING FOR INVESTIGATIONS AND THREAT HUNTING

blog article

Nov 28, 2018

We’ve received a few questions about what we cover in our Pattern Recognition, Analysis and Profiling class. If you are a cyber investigator or analyst – or any role that requires you to extract meaningful information for threat hunting or investigative activities – understanding h...

Read More

G DATA Techblog: Malware Analysis with a Graph Database G DATA TECHBLOG: MALWARE ANALYSIS WITH A GRAPH DATABASE

blog article

Nov 28, 2018

As an anti-virus vendor, we analyse several hundred thousand of potential malware samples per day. We have to classify these new samples which means first of all that we simply have to decide whether the sample is benign or malicious. In case it is malicious, we want to know whether it belongs to a ...

Read More

Phishing Sites Using Lock Symbol to Prove Legitimacy PHISHING SITES USING LOCK SYMBOL TO PROVE LEGITIMACY

blog article

Nov 28, 2018

When accessing a website, the green padlock on the left corner indicates that the connection between the website and user is secure. Security experts have all been recommending that users only access websites where there is a site identity button or a padlock appearing in the address bar. A padlock ...

Read More

The Importance of "S" in "CISO" THE IMPORTANCE OF "S" IN "CISO"

blog article

Nov 28, 2018

A Chief Information Security Officer is the brigadier general of the security force of an organization. While the c-suite normally looks at the financial and overall management of an organization, it is up to the CISO to bring in the security aspect, keeping the organization safe from data breaches ...

Read More

Exabeam’s 2019 Cybersecurity Predictions EXABEAM’S 2019 CYBERSECURITY PREDICTIONS

blog article

Nov 28, 2018

When it comes to predicting the future, how do you anticipate the moves of our world’s underground cyber criminals, hackers and rogue nations? While they don’t all agree, Exabeam’s top security sleuths share their predictions for 2019. Tariff, trade, and geopolitical differences wi...

Read More

FireEye Tips and Insights Series: Investigating Network Security Callback Alerts FIREEYE TIPS AND INSIGHTS SERIES: INVESTIGATING NETWORK SECURITY CALLBACK ALERTS

video

Nov 28, 2018

In this installment of the Tips and Insights series, Jason Forcht describes how to investigate callback alerts in the FireEye Network Security system. FireEye Network Security (NX) is an effective cyber threat protection solution that helps organizations minimize the risk of costly breaches by accur...

Read More

The Endless Cycle of ERP Securitys THE ENDLESS CYCLE OF ERP SECURITYS

blog article

Nov 28, 2018

In the movie Groundhog Day, Bill Murray’s character begins to go mad from reliving the same day over and over again. For IT teams, this plot can be quite similar to securing ERP systems. Security is a process and securing ERP systems is addressed by people following processes. There is this co...

Read More

What’s Next? Webroot’s 2019 Cybersecurity Predictions WHAT’S NEXT? WEBROOT’S 2019 CYBERSECURITY PREDICTIONS

blog article

Nov 27, 2018

At Webroot, we stay ahead of cybersecurity trends in order to keep our customers up-to-date and secure. As the end of the year approaches, our team of experts has gathered their top cybersecurity predictions for 2019. What threats and changes should you brace for? General Data Protection Regulation ...

Read More

Red Teaming Service Overview RED TEAMING SERVICE OVERVIEW

video

Nov 27, 2018

Red Team Assessments test an organization’s ability to protect it’s critical assets by emulating a no-holds-barred cyber attack scenario. FireEye Mandiant experts use global frontline intelligence to simulate the tactics, techniques, and procedures (TTPs) of actual threat actors. This pr...

Read More

Vulnerability Assessments Overview: An Essential Component to Your Cyber Security Program VULNERABILITY ASSESSMENTS OVERVIEW: AN ESSENTIAL COMPONENT TO YOUR CYBER SECURITY PROGRAM

blog article

Nov 27, 2018

In this week’s blog we’ll share a vulnerability assessments overview and discuss how they can help you find holes in your security programs before malicious hackers can take advantage of them. Lauren Bellero spoke with Keith Melancon to get his thoughts on this topic. Keith oversees Delt...

Read More

What Is Ransomware? Definite Guide WHAT IS RANSOMWARE? DEFINITE GUIDE

blog article

Nov 27, 2018

The 2018 Verizon Data Breach Investigations Report (DBIR) declares ransomware “the most prevalent variety of malware”. Over 181 million ransomware attacks happened in the first six months of 2018. That is a 229 per cent increase in ransomware attacks reported compared to the same period ...

Read More

2018 Cost of Data Breach vs. Cybersecurity Response Plans and Solutions 2018 COST OF DATA BREACH VS. CYBERSECURITY RESPONSE PLANS AND SOLUTIONS

blog article

Nov 27, 2018

Now more than ever, enterprises have an obligation to handle the personal data of their customers. To complete numerous financial transactions or register for various services, people disclose their private information to enterprises with an expectation that they will protect their personal data. Un...

Read More

NYDFS Cybersecurity Regulations: A glimpse into the future NYDFS CYBERSECURITY REGULATIONS: A GLIMPSE INTO THE FUTURE

blog article

Nov 27, 2018

The cybersecurity regulation (23 NYCRR 500) adopted by the New York State Department of Financial Services (NYDFS) is nearly two years old. The 2017 bill, the first of its kind, will be fully implemented as of March 1st, 2019. Leading up to that date, companies have had to meet several milestones in...

Read More

What is zero-day exploit WHAT IS ZERO-DAY EXPLOIT

blog article

Nov 27, 2018

A zero-day exploit is a software flaw or a vulnerability. Hackers use this as an exploit to attack the user’s system even before the software vendor identifies it and a security patch fix is available. These zero-day exploits can go unnoticed for a long time and are commonly sold for large sum...

Read More

Cyber Hygiene: Five Ways to Make Your Bed CYBER HYGIENE: FIVE WAYS TO MAKE YOUR BED

blog article

Nov 26, 2018

“Cyber Hygiene”:  you know the term, but what does it really mean? Some say it is an ill-defined set of practices for individuals to follow (or ignore). Others say it is a measure of an organization’s overall commitment to security.  Still, others think of “cyber hy...

Read More

Cisco Visual Networking Index: Forecast and Trends, 2017–2022 CISCO VISUAL NETWORKING INDEX: FORECAST AND TRENDS, 2017–2022

whitepaper

Nov 26, 2018

Global network access/Connectivity trends (Fixed/Mobile/Wi-Fi) Traffic from wireless and mobile devices will account for 71 percent of total IP traffic by 2022. By 2022, wired devices will account for 29 percent of IP traffic, and Wi-Fi and mobile devices will account for 71 percent of IP traffic. I...

Read More

Symantec Government Symposium Redefines the Cyber Conversation SYMANTEC GOVERNMENT SYMPOSIUM REDEFINES THE CYBER CONVERSATION

blog article

Nov 26, 2018

A renewed push needed for a rethink – and a redefinition – how to approach cyber security One of the long-standing tenants of cyber security is the belief that the attackers have an advantage. That makes sense as cyber security, for the most part, has been a reactionary process that iden...

Read More

Cybersecurity and Banking: 3 Trends to Watch in 2019 CYBERSECURITY AND BANKING: 3 TRENDS TO WATCH IN 2019

blog article

Nov 26, 2018

Banks have always been at the forefront of enterprise cybersecurity. Their enormous stores of cash and consumer data have made them a top target for hackers, and the threat of financial losses, regulatory consequences, and reputational damage has spurred them to innovate and accelerate the field of ...

Read More

3 cyber security threats you need to prepare for 3 CYBER SECURITY THREATS YOU NEED TO PREPARE FOR

blog article

Nov 26, 2018

The key to reducing the damage that data breaches can cause is to spot them quickly. Ponemon Institute’s 2018 Cost of a Data Breach Study found that, on average, organisations that identified a breach within 100 days saved more than $1 million (€880,000) per incident. But to be able to sp...

Read More

Sharing Best Practices at Cybersecurity for SAP Customers SHARING BEST PRACTICES AT CYBERSECURITY FOR SAP CUSTOMERS

blog article

Nov 26, 2018

Whether you're just beginning to define the cybersecurity strategy for your SAP infrastructure, or want to brush up on the latest practices, SAPInsider’s Cybersecurity for SAP Customers offers you a chance to network with peers who have similar challenges and meet vendors who hope to contr...

Read More

Putin Cyberthreat PUTIN CYBERTHREAT

video

Nov 26, 2018

Vladimir Putin is a bigger menace than most people know. A new report links Russia to a cyberattack aimed at a petrochemical plant in Saudi Arabia. Putin’s Russia poses a clear danger to the U.S. and other free nations, so why is the mainstream news-media not paying attention? Vladimir Putin i...

Read More

Petya Ransomware Attack: What is it and How can it be stopped? PETYA RANSOMWARE ATTACK: WHAT IS IT AND HOW CAN IT BE STOPPED?

blog article

Nov 26, 2018

The latest ransomware in the cyberspace called “Petya” is infecting computers around the world at an incredible speed. It uses a vulnerability in the Windows OS that Microsoft patched in March 2017 — notably, it is the same virus that was exploited by the recent and prolific WannaC...

Read More

VirtualBox Unpatched Zero-Day Vulnerability and Exploit Released Online VIRTUALBOX UNPATCHED ZERO-DAY VULNERABILITY AND EXPLOIT RELEASED ONLINE

blog article

Nov 25, 2018

A Major Oracle VirtualBox Zero-Day vulnerability and exploit were released by a disgruntled security researcher. The vulnerability affects versions of VirtualBox up to 5.2.20. The vulnerability allows a malicious actor with administrator or root access on the guest OS to bypass the guest OS and exec...

Read More

SECURITY AND YOUR BUSINESS SECURITY AND YOUR BUSINESS

infographic

Nov 23, 2018

49% of CEOs surveyed said that a cyber-attack is now a case of ‘when’ instead of ‘if’. 76% of security breaches are financially motivated which include cryptocurrency demands. 60% of small and medium-sized businesses say attacks are becoming more severe and more sophisticated...

Read More

Kaspersky Security Bulletin: THREAT PREDICTIONS FOR INDUSTRIAL SECURITY IN 2019 KASPERSKY SECURITY BULLETIN: THREAT PREDICTIONS FOR INDUSTRIAL SECURITY IN 2019

whitepaper

Nov 23, 2018

The past few years have been very intense and eventful when it comes to incidents affecting the information security of industrial systems. That includes new vulnerabilities, new threat vectors, accidental infections of industrial systems and detected targeted attacks. In response, last year we deve...

Read More

How many times have you come to accept a certain “truth” that eventually turned out to be complete fiction? HOW MANY TIMES HAVE YOU COME TO ACCEPT A CERTAIN “TRUTH” THAT EVENTUALLY TURNED OUT TO BE COMPLETE FICTION?

blog article

Nov 23, 2018

From “the world is flat” to “the Earth is the center of the universe” to “the government would never monitor my emails: these mass beliefs in something that were ultimately proven to be a myth was usually to the detriment of those who refused to accept reality over thei...

Read More

Kaspersky Security Bulletin: THREAT PREDICTIONS FOR 2019 KASPERSKY SECURITY BULLETIN: THREAT PREDICTIONS FOR 2019

whitepaper

Nov 23, 2018

There’s nothing more difficult than predicting. So, instead of gazing into a crystal ball, the idea here is to make educated guesses based on what has happened recently and where we see a trend that might be exploited in the coming months. Asking the most intelligent people I know, and basing ...

Read More

Clearswift Wins DLP Award at Computer Security Excellence Awards CLEARSWIFT WINS DLP AWARD AT COMPUTER SECURITY EXCELLENCE AWARDS

blog article

Nov 22, 2018

The Clearswift team is delighted to announce our 2018 Computer Security Excellence Award Win for Data Loss Prevention (email and web).  The awards dinner was held on November 22nd at the London Marriott Hotel in London with our UK team present to accept the award and celebrate our win! Overview...

Read More

NSW cyber security industry development strategy 2018 NSW CYBER SECURITY INDUSTRY DEVELOPMENT STRATEGY 2018

whitepaper

Nov 22, 2018

The rapid evolution of new technologies and the emergence of smart devices has led to greater interconnectedness between people and businesses around the world. This has also led to an increased probability of businesses and people becoming targets of malicious cyber activity, and increased awarenes...

Read More

COMPLIANCE KNOW-HOW FOR OFFICE 365 COMPLIANCE KNOW-HOW FOR OFFICE 365

infographic

Nov 22, 2018

Phishing. Phishing attacks are the most successful method of stealing username & password information. User account attacks are up by 300% in 2018 with over 200 million phishing emails every month! Ensure remote workers, regardless of location, are authenticated and authorized BEFORE accessing y...

Read More

Threat Intelligence Platforms: Open Source vs. Commercial THREAT INTELLIGENCE PLATFORMS: OPEN SOURCE VS. COMMERCIAL

whitepaper

Nov 22, 2018

As a member of a maturing security team evaluating threat intelligence platforms (TIPs), you may be asking yourself whether you should use an open source solution like Malware Information Sharing Platform (MISP), or buy a TIP from one of many vendors offering solutions. In this whitepaper, we discus...

Read More

Like, share and destroy: How to protect your business from the social media threat LIKE, SHARE AND DESTROY: HOW TO PROTECT YOUR BUSINESS FROM THE SOCIAL MEDIA THREAT

blog article

Nov 22, 2018

Social media is now the window to any business. 83% of organizations use social media as a marketing tactic, making it the most popular marketing tool. It is updated far more regularly than any website and businesses build a following based on publishing engaging content regularly. While businesses ...

Read More

What is NotPetya? How to Prevent this Virus from Infecting WHAT IS NOTPETYA? HOW TO PREVENT THIS VIRUS FROM INFECTING

blog article

Nov 22, 2018

NotPetya virus outwardly resembles the Petya ransomware in many ways, however, the fact is that it’s different and a lot more dangerous than Petya. When Petya affected numerous systems even the best antivirus and virus removal programs failed to deduct it. It brought many systems to a grinding...

Read More

Seven Top Cyber Tactics for Happy Holidays Online SEVEN TOP CYBER TACTICS FOR HAPPY HOLIDAYS ONLINE

blog article

Nov 21, 2018

Tis the season – for dropping your guard. According to Google Trends, online searches on phishing plummet every year over the holiday period. It's natural – after all, you're with your loved ones, you're full of good food, perhaps a little good drink and you're filled wit...

Read More

5 technologies for safer data centers 5 TECHNOLOGIES FOR SAFER DATA CENTERS

whitepaper

Nov 21, 2018

From online retail and mobile banking, through to cloud business productivity applications and digital infrastructure management, there is now an abundance of data that needs to be managed and stored in data centers. However, the increasing value of information has made data centers a prime target f...

Read More

Incident Response Plan 101: How to Build One, Templates and Examples INCIDENT RESPONSE PLAN 101: HOW TO BUILD ONE, TEMPLATES AND EXAMPLES

blog article

Nov 21, 2018

What is an Incident Response Plan and Why Do You Need One? An incident response plan helps IT staff identify, respond to and recover from cybersecurity incidents. The objective of an incident response plan is to prevent damages like service outage, data loss or theft, and illicit access to organizat...

Read More

How to Save the Cybersecurity Industry HOW TO SAVE THE CYBERSECURITY INDUSTRY

video

Nov 21, 2018

In this video, Cylance experts talk about how and why traditional antivirus products are failing and what can be done to halt this trend.  Speakers: Stuart McClure, Chairman and CEO of Cylance. Malcolm Harkins, Chief Security and Trust Officer at Cylance. Gabe Deale, Worldwide VP of Sales Engin...

Read More

What is a Logic Bomb? WHAT IS A LOGIC BOMB?

blog article

Nov 21, 2018

The term logic bomb refers to the malware also called slag code which gets activated by a response to an event. For instance, launching an application or when a specific date/time is reached – it triggers the logic bomb malware to start running on a computer. Online fraudsters make use of the ...

Read More

6 Steps to Build a Holistic Security Strategy with Microsoft 365 6 STEPS TO BUILD A HOLISTIC SECURITY STRATEGY WITH MICROSOFT 365

whitepaper

Nov 21, 2018

Download this executive brief to learn how Cognitive can change the face of regulatory compliance.

Read More

Managing Risk to Your Network Infrastructure: A Matter of Trust MANAGING RISK TO YOUR NETWORK INFRASTRUCTURE: A MATTER OF TRUST

whitepaper

Nov 20, 2018

Cyber attacks targeting the network infrastructure have become increasingly sophisticated and damaging. Today’s evolving threat landscape requires business leaders to approach security differently. In addition to deploying multilayered security solutions that provide defense in-depth, organiza...

Read More

The Battle Against Insider Threats and Why You Need Behavior-based Cybersecurity Strategies THE BATTLE AGAINST INSIDER THREATS AND WHY YOU NEED BEHAVIOR-BASED CYBERSECURITY STRATEGIES

blog article

Nov 20, 2018

Insider threats are a growing concern for all organizations—one that is increasingly difficult to manage using conventional security technologies. Unlike other types of security threats, insider threats are complicated by the fact that only some are caused by intentional malicious insiders. &l...

Read More

Shifting Left in the Cybersecurity Defense Lifecycle SHIFTING LEFT IN THE CYBERSECURITY DEFENSE LIFECYCLE

blog article

Nov 20, 2018

Identifying your risk posture should be the first objective of all cybersecurity programs. Yet, this is where organizations often fail, due to weak visibility and understanding during the crucial “identify” phase of the cybersecurity lifecycle. Focusing on protect, detect, respond, recov...

Read More

No organisation is immune to cyber attacks NO ORGANISATION IS IMMUNE TO CYBER ATTACKS

blog article

Nov 20, 2018

Hackers are becoming more skilled and sophisticated, and this is leaving Irish business owners and their systems extremely vulnerable and unable to protect themselves against cyber security threats. One of the most common tools a company can use to defend themselves against hackers is a penetration ...

Read More

Lax Employee Cybersecurity Habits Pose Growing Danger to Businesses LAX EMPLOYEE CYBERSECURITY HABITS POSE GROWING DANGER TO BUSINESSES

blog article

Nov 20, 2018

Employees’ cybersecurity habits are bad and getting worse. New research illustrates a workforce less committed to security best practices, despite an increased focus on cybersecurity awareness in the workplace. This years’ Market Pulse Survey by SailPoint Technologies reveals that 75% of...

Read More

Enforce a Zero Trust Security Model in Today’s Hostile Environment ENFORCE A ZERO TRUST SECURITY MODEL IN TODAY’S HOSTILE ENVIRONMENT

whitepaper

Nov 19, 2018

Companies of all types are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new cloud and DevOps workflows to build their digital business, security has not kept pace. The prolifera...

Read More

Lazy Passwords Become Rocket Fuel for Emotet SMB Spreader LAZY PASSWORDS BECOME ROCKET FUEL FOR EMOTET SMB SPREADER

blog article

Nov 19, 2018

As featured in the 2018 State of Cybercrime Report released this week by Secureworks®, a small list of cybercrime malware is making the greatest impact in today's threat landscape, including — but not exclusively limited to — malware families like Emotet. Emotet is a modular down...

Read More

How to Promote Cyber Security Inside Your Company HOW TO PROMOTE CYBER SECURITY INSIDE YOUR COMPANY

blog article

Nov 19, 2018

As business are digitizing, companies get more and more vulnerable in front of cyberattacks. The numbers are impressive: in 2025 is expected to be 75 billion connected devices. Considering that more than 300.000 new malware programs are created every day, the risk is real. According to a recent McKi...

Read More

Phish Insight - Test Your Employees Cyber Security Awareness PHISH INSIGHT - TEST YOUR EMPLOYEES CYBER SECURITY AWARENESS

video

Nov 19, 2018

In this Video Dave Spilker talks about NE-INC's ability to setup a cyber security test with phishing emails for businesses to test their employees. It's a great way to make sure your employees are trained to spot Phishing emails that can compromise your business security.

Read More

The impact of DDoS attacks on Dutch enterprises THE IMPACT OF DDOS ATTACKS ON DUTCH ENTERPRISES

whitepaper

Nov 19, 2018

Long ago, the name ‘DDoS attack’ was something for ICT staff to deal with. A number of incidents has changed this: a massive DDoS on Dutch Banking Services in 2013 and large-scale attacks aimed at Dutch services in January 2018. The latter affected the entire country. Both caused a great...

Read More

Ransomware Threat Alarmingly High for SMBs as They Place Security on the Back Burner RANSOMWARE THREAT ALARMINGLY HIGH FOR SMBS AS THEY PLACE SECURITY ON THE BACK BURNER

blog article

Nov 19, 2018

Small and medium-sized businesses are still a top target for ransomware attacks, and the number of attacks will most likely increase in 2019, according to a recent survey of MSPs. Over half of MSPs confirmed their clients experienced at least one ransomware attack in the first half of the year, whil...

Read More

How to Choose the best Antivirus Software of 2019 HOW TO CHOOSE THE BEST ANTIVIRUS SOFTWARE OF 2019

blog article

Nov 19, 2018

Numerous Antivirus software is circulating in the market and ascertaining the best among them is a subject of debate. There are many choices to select from because of a large number of strong rivals plus the reality that today’s best could turn one of tomorrows worst. This particular situation...

Read More

What’s Going to Happen to the Cryptocurrency Trend in 2018? WHAT’S GOING TO HAPPEN TO THE CRYPTOCURRENCY TREND IN 2018?

blog article

Nov 19, 2018

Bitcoin- the term is familiar now even to the not-so-tech-savvy layman; the internet is so full of success stories of people who have made their fortune by trading in Bitcoin. Rapper 50 Cent (whose real name is Curtis Jackson) had inadvertently made a fortune out of Bitcoin when he allowed his fans ...

Read More

2018: The New Year resolution for Cybersecurity 2018: THE NEW YEAR RESOLUTION FOR CYBERSECURITY

blog article

Nov 19, 2018

Once again, it’s that time of the year, to swear avoiding junk foods, sweets and keep in shape. To learn new arts, and promise yourself with a resolution that this year you are going to pursue your passion and stick on to it. Nevertheless, unlike those personal resolutions, which you already k...

Read More

Seven Major Threat Trends to be watched out in 2018 SEVEN MAJOR THREAT TRENDS TO BE WATCHED OUT IN 2018

blog article

Nov 19, 2018

January 2018 is over, we’re now on to the second month of the new year. Indications are that 2018 would be as eventful as 2017 was, as regards cyber crimes and cyber attacks. The much-evolved versions of the cyber threats that we had witnessed in 2017 would make their appearances in 2018 and p...

Read More

Looking Ahead: Cyber Security In 2018 LOOKING AHEAD: CYBER SECURITY IN 2018

blog article

Nov 19, 2018

2017 was a pretty rough year in terms of cybersecurity: ransomware, state-sponsored attacks, phishing scams, and big companies (like Equifax) failing to stick to security best practices (like implementing two-factor authentication) and therefore falling victims to cyber attacks. So what does 2019 ha...

Read More

ESET CYBERSECURITY BAROMETER ESET CYBERSECURITY BAROMETER

whitepaper

Nov 18, 2018

The ESET Cybersecurity Barometer Canada is a survey of public opinion about cybersecurity and cybercrime. The survey was conducted because there is a dearth of contemporary research quantifying public attitudes toward, and experience of, cybercrime. Yet public support for cybersecurity efforts, incl...

Read More

Proactive Protection: How Companies Can Secure Customer Data in a Hyper-Connected World PROACTIVE PROTECTION: HOW COMPANIES CAN SECURE CUSTOMER DATA IN A HYPER-CONNECTED WORLD

whitepaper

Nov 17, 2018

Today, digital customer experience transformations are mandatory to stay ahead in business, not optional. Customers are demanding cutting-edge digital experiences, delivered on every channel, via every device, anytime and anywhere they desire. To satisfy these customers, companies are transforming t...

Read More

What is Backdoor Virus? WHAT IS BACKDOOR VIRUS?

blog article

Nov 17, 2018

A backdoor is a malicious computer program used to provide the attacker with unauthorized remote access to a compromised PC by exploiting security vulnerabilities. This backdoor virus works in the background and hides from the user. It is quite difficult to detect as it is very similar to other malw...

Read More

Vulnerability scans vs Penetration tests VULNERABILITY SCANS VS PENETRATION TESTS

blog article

Nov 16, 2018

You’ll often find that ‘vulnerability scan’ and ‘penetration test’ are wrongly used interchangeably, creating confusion about which is the right security choice for businesses. Broadly speaking, a vulnerability scan could be thought of as a surface-level security assess...

Read More

CYBER ATTACKS IMPACT DOWNTIME, IOT AND CONTROL SYSTEMS ACCORDING TO NEW DATA CYBER ATTACKS IMPACT DOWNTIME, IOT AND CONTROL SYSTEMS ACCORDING TO NEW DATA

blog article

Nov 16, 2018

Cybersecurity threats can have serious impacts on organizations regardless of industry, and new data highlighted by CSO shows why these disruptions can be dangerous and costly. With 2018 coming to a close, now is as good a time as ever to understand where your cybersecurity vulnerabilities lie, and ...

Read More

Are you aware of the risks associated with the Cloud? ARE YOU AWARE OF THE RISKS ASSOCIATED WITH THE CLOUD?

blog article

Nov 16, 2018

According to the 2018 Bitglass Cloud Adoption Report, more than 81% of organisations have now adopted the Cloud in some form. However, moving data to the Cloud does not solve security problems – rather, it adds another element that needs addressing. Find out how to tackle this issue with our b...

Read More

Buyer beware: cyberthreats targeting e-commerce, 2018 BUYER BEWARE: CYBERTHREATS TARGETING E-COMMERCE, 2018

whitepaper

Nov 16, 2018

Caveat emptor (“buyer beware”) is the principle that it is the buyer's responsibility to spot if there is anything wrong with what they are being sold. This principle has been applied for centuries and it remains valid in the digital world. In cyberspace things aren’t always wh...

Read More

Agentless threat detection for Microsoft Azure workloads with Cisco Stealthwatch Cloud AGENTLESS THREAT DETECTION FOR MICROSOFT AZURE WORKLOADS WITH CISCO STEALTHWATCH CLOUD

blog article

Nov 16, 2018

Detecting threats, such as malware, rogue insiders, and credential abuse, within public cloud environments can be a major challenge. Traditionally, organizations have tried to solve this problem by overlaying a patchwork of agents across the cloud surface to detect bad activity. This approach requir...

Read More

Cybersecurity Education Series: What Is Malware? CYBERSECURITY EDUCATION SERIES: WHAT IS MALWARE?

blog article

Nov 16, 2018

Malware is one of the most pervasive and dangerous techniques cybercriminals employ to steal an organization’s funds and gain access to confidential data. That’s why were’ dedicating the next post in our cybersecurity education series to reviewing what it is, how it works, and what...

Read More

Managing critical file transfers MANAGING CRITICAL FILE TRANSFERS

blog article

Nov 15, 2018

While methods for digital collaboration are increasing, such as Instant Messaging, Social Media and a multitude of cloud applications, email remains a universal business communication tool for businesses. For those wanting to collaborate on a sensitive document, there are a variety of cloud-based so...

Read More

Preparing AV Engines for Fair and Independent Tests PREPARING AV ENGINES FOR FAIR AND INDEPENDENT TESTS

blog article

Nov 15, 2018

How does a cyber-security company prepare its AV engine for fair and independent tests? In our recent blog, we wrote of the importance of independent testing for anti-virus (AV) products, and how organizations such as AV-Comparatives, and AV-Test test as rigorously as possible, in an environment as ...

Read More

Synthetic identity fraud to drive $48 billion in annual losses by 2023 – Juniper Research SYNTHETIC IDENTITY FRAUD TO DRIVE $48 BILLION IN ANNUAL LOSSES BY 2023 – JUNIPER RESEARCH

blog article

Nov 15, 2018

Online payment fraud losses will reach $48 billion annually by 2023, up from the $22 billion in losses projected for 2018, a new study from Juniper Research has found. Juniper’s new research claims that a critical driver behind losses from eCommerce, airline ticketing, money transfer and banki...

Read More

Re-designing Linux Security: Do No Harm – Introduction RE-DESIGNING LINUX SECURITY: DO NO HARM – INTRODUCTION

blog article

Nov 15, 2018

The PSC now supports Linux. Cb Defense, Cb LiveOps & Cb ThreatHunter customers will now have the ability to manage and operate across all major operating systems. Securing your server and your data center workloads has changed significantly in recent years. High performance machines no longer ha...

Read More

Navigation Apps: Leading the Way? Or Following You? NAVIGATION APPS: LEADING THE WAY? OR FOLLOWING YOU?

blog article

Nov 15, 2018

In the United States alone, 84% of adults are using navigation applications, according to a recent Gallup poll. Whether they’re downloading it in an app store or the navigation capability is already built into the car, these navigation tools are taking us to the grocery store, to our grandpare...

Read More

Anti-Virus Comparative ANTI-VIRUS COMPARATIVE

whitepaper

Nov 15, 2018

We want to make clear that the results in this report are intended only to give an indication of the impact on system performance (mainly by the real-time/on-access components) of the consumer security products in these specific tests. Users are encouraged to try out the software on their own PC&rsq...

Read More

ENTERPRISE KEY MANAGEMENT ENTERPRISE KEY MANAGEMENT

whitepaper

Nov 15, 2018

Protecting the enterprise’s valuable digital assets from accidental or intentional misuse are key goals for every IT team today. Many organizations have deployed a variety of point encryption solutions as a primary method of protecting their data and to meet various compliance mandates and int...

Read More

SILENTDEFENSE™ AND THE FORESCOUT PLATFORM: CYBERSECURITY FOR CONVERGING IT/OT REQUIREMENTS SILENTDEFENSE™ AND THE FORESCOUT PLATFORM: CYBERSECURITY FOR CONVERGING IT/OT REQUIREMENTS

blog article

Nov 15, 2018

Today’s cyber threats are ever-changing and evolving. Over the last decade, we have seen malware begin to target non-enterprise devices and industrial control systems (ICS) at an alarming pace.  However, most critical infrastructure and ICS asset owners are ill-equipped for this changing ...

Read More

Optimising Security Through a Modern, Robust, Agile  Approach OPTIMISING SECURITY THROUGH A MODERN, ROBUST, AGILE APPROACH

whitepaper

Nov 14, 2018

The days of technical efficacy and "best-of-breed" functionality being the key drivers of security vendor selection are well and truly over, if they ever existed. Security buyers are more motivated by how well products and services fit in with their existing environment; how they enable be...

Read More

See Beyond the Noise: How Nuix Uncovers and Prevents Entitlement Fraud SEE BEYOND THE NOISE: HOW NUIX UNCOVERS AND PREVENTS ENTITLEMENT FRAUD

blog article

Nov 14, 2018

Benefits and social security fraud are a huge cost to taxpayers. In 2016, the White House estimated these losses at $144 billion. Fraud can take many forms from making false statements on a social security claim, misuse of benefits by a family member or friend, altering claims, duplicate billing for...

Read More

Threats and Complexity Drive Security Stack Consolidation THREATS AND COMPLEXITY DRIVE SECURITY STACK CONSOLIDATION

infographic

Nov 14, 2018

Traditionally, protecting business-critical servers from threats has fallen to a disparate suite of reactive security controls. To stay ahead of advanced threats, lateral movement and increasing attacker sophistication, many organizations plan to consolidate these tools through the use of integrated...

Read More

Detect Cyber Threats with Securonix Proxy Traffic Analyzer DETECT CYBER THREATS WITH SECURONIX PROXY TRAFFIC ANALYZER

whitepaper

Nov 14, 2018

Many organizations encounter an extremely high volume of proxy data on a daily basis. The volume of proxy data can range from 100 GB to over 1 TB an hour. Legacy security information and event management (SIEM) solutions struggle to handle this flow of data and still identify high-fidelity threats. ...

Read More

Small Business Benefits of Moving to the Cloud: Resource Friendly SMALL BUSINESS BENEFITS OF MOVING TO THE CLOUD: RESOURCE FRIENDLY

blog article

Nov 14, 2018

Small businesses never seem to have enough people or funding, and the last thing they need is for their security solution to be eating up precious resources. Your people are stretched thin and don’t really have time or budget to source new hardware or push software updates. Not to mention the ...

Read More

CRYPTOCURRENCY THREAT PREDICTIONS FOR 2019 CRYPTOCURRENCY THREAT PREDICTIONS FOR 2019

whitepaper

Nov 14, 2018

2018 saw cryptocurrency become an established part of many people’s lives, and a more attractive target for cybercriminals across the world. To some extent, the malicious mining of cryptocurrencies even prevailed over the main threat of the last few years: ransomware. However, in the second ha...

Read More

DATA SECURITY SELF- ASSESSMENT for Corporate Executives DATA SECURITY SELF- ASSESSMENT FOR CORPORATE EXECUTIVES

whitepaper

Nov 14, 2018

It should come as no surprise that companies of all sizes are taking data security more and more seriously. Similarly, in recent years, Cyber Liability Insurance has become more commonplace which has allowed the insurance industry to gain important experience with regard to how various companies org...

Read More

FireEye Endpoint Security Achieves Highest Testing Results Amongst NGAV Products FIREEYE ENDPOINT SECURITY ACHIEVES HIGHEST TESTING RESULTS AMONGST NGAV PRODUCTS

blog article

Nov 14, 2018

In the most recent AV-Comparatives Real-World Protection Test results, FireEye Endpoint Security achieved the highest detection rate among next-gen anti-virus vendors with zero false positives. FireEye was able to accomplish this result through a constant flow of innovations that originates with Fir...

Read More

Thinking Global and Acting Local to Close the Skills Gap THINKING GLOBAL AND ACTING LOCAL TO CLOSE THE SKILLS GAP

blog article

Nov 14, 2018

Cybersecurity empowers organizations to enable trust, move faster, add value and grow. In order for cybersecurity to live up to that promise, it will require an increase in talent and new skills to take on the volume and sophistication of today’s threat landscape. According to industry analyst...

Read More

What is Code Red Worm? WHAT IS CODE RED WORM?

blog article

Nov 14, 2018

Code red is a computer worm that was identified in July 2001, when computers running on Internet Information Services (IIS) web server of Microsoft were found compromised. The after effect of the attack caused a damage of billions of dollars in the summer of 2001. Marc Maiffret and Ryan Permeh emplo...

Read More

6 Steps to Plan Your Cybersecurity Projects 6 STEPS TO PLAN YOUR CYBERSECURITY PROJECTS

infographic

Nov 13, 2018

Are you managing several cybersecurity projects at the same time? Do you feel that you could manage your projects more effectively, but don’t know where to start? Related post: Best Practices for a Successful Cybersecurity Project. We’ve compiled 6 steps that will help you plan your cybe...

Read More

PRESENTING OT SECURITY RISK TO THE BOARD PRESENTING OT SECURITY RISK TO THE BOARD

whitepaper

Nov 13, 2018

ICS/SCADA and Operational Technology (OT) networks were traditionally kept separate or “air-gapped” from IT networks. However, new business requirements associated with the efficiency benefits of digitalization are forcing increased connectivity between IT and Operational Technology (OT)...

Read More

INTERNATIONAL ANTI-BOTNET GUIDE 2018 INTERNATIONAL ANTI-BOTNET GUIDE 2018

whitepaper

Nov 13, 2018

The International Anti-Botnet Guide was developed to facilitate the mitigation of botnets and other automated, distributed threats through voluntary participation and collaboration among disparate stakeholders throughout the global internet and communications ecosystem. The Guide provides informatio...

Read More

Small Companies, Big Security Concerns SMALL COMPANIES, BIG SECURITY CONCERNS

blog article

Nov 13, 2018

Many people might tend to associate security breaches and malware attacks with large enterprises. After all, the attacks that grab the big headlines generally occur against global companies or large governmental organizations. That doesn’t by any stretch mean small and mid-sized companies are ...

Read More

The Impact of Cyber Warfare on Nuclear Deterrence: A Conceptual and Empirical Overview THE IMPACT OF CYBER WARFARE ON NUCLEAR DETERRENCE: A CONCEPTUAL AND EMPIRICAL OVERVIEW

whitepaper

Nov 13, 2018

ABSTRACT Cyber war is a subject that is highly contested among strategists and experts. This brief assesses the impact of cyber operations against strategic targets and demonstrates that while cyber war is a real phenomenon, it is far from producing decisive outcomes. The cyberspace is a medium to c...

Read More

IT security basics for everyday businesses IT SECURITY BASICS FOR EVERYDAY BUSINESSES

whitepaper

Nov 13, 2018

Let’s be honest. Most people just tune out when confronted with talk of IT security doom and cybersecurity jargon. It either sounds overwhelmingly complex and daunting, or you think ‘seriously, we have nothing worth stealing so why would anyone bother breaking in?’ It doesn’t...

Read More

Cybersecurity in the CONNECTED HOSPITAL CYBERSECURITY IN THE CONNECTED HOSPITAL

infographic

Nov 13, 2018

Abbott conducted in-depth research among physicians and hospital administrators to understand the cybersecurity challenges our hospital customers face. WE SURVEYED: 300 Physicians. 100 Hospital Administrators. WHAT WE FOUND: While physicians and administrators see cybersecurity as a priority, the ma...

Read More

SAP Security Notes November ‘18: The Mobile Client Side Menace SAP SECURITY NOTES NOVEMBER ‘18: THE MOBILE CLIENT SIDE MENACE

blog article

Nov 13, 2018

Today SAP released 12 security notes for November’s SAP Security Patch Day as it is scheduled. This makes a total of 16 security notes after adding the four released since October’s patch day. Among these SAP security notes there are three that fix a number of vulnerabilities reported by...

Read More

Six Design Considerations for Your Security Data Lake SIX DESIGN CONSIDERATIONS FOR YOUR SECURITY DATA LAKE

blog article

Nov 13, 2018

Large numbers of enterprises, such as retail conglomerates, consumer banks, airlines, and insurance companies are joining the rush to set up data lakes for handling petabytes of security data and logs. But many executives and architects assume that once they finish setting up log sources, applying p...

Read More

What is Polymorphic Virus and how do you deal with it? WHAT IS POLYMORPHIC VIRUS AND HOW DO YOU DEAL WITH IT?

blog article

Nov 13, 2018

Similar to the virus which affects the human body, a computer virus is a malicious program that affects the computer to choke or bring down the normal functioning. Usually, a computer virus self-replicates by copying itself to another program. Simply put, the computer virus spreads by itself into ot...

Read More

What are the Dev, Ops, and Security journeys for secrets management? WHAT ARE THE DEV, OPS, AND SECURITY JOURNEYS FOR SECRETS MANAGEMENT?

video

Nov 12, 2018

In each level of the HashiCorp Vault maturity model, different roles—developers, operations, InfoSec—have a specific focus for building a new level of operational excellence as they progress to new stages. Learn what each persona should focus on.

Read More

Network Security in an IoT World NETWORK SECURITY IN AN IOT WORLD

video

Nov 12, 2018

Network security and the integrity of your network in both hardware and software is achieved by targeting a variety of threats from entering or spreading on the network.  So, in the age of IoT and billions of devices, what are the network security measures that combine multiple layers of defens...

Read More

CYBERSECURITY AWARENESS CYBERSECURITY AWARENESS

whitepaper

Nov 10, 2018

HOW T&C RECOGNIZED NCSAM IN OCTOBER 2018 This October, Thomas & Company joined the Department of Homeland Security to raise cybersecurity awareness across the nation during National Cybersecurity Awareness Month (NCSAM). The overarching theme for NCSAM was Cybersecurity is Our Shared Respons...

Read More

How You Can Become Part of an Elite Cybersecurity Force HOW YOU CAN BECOME PART OF AN ELITE CYBERSECURITY FORCE

video

Nov 09, 2018

The hardest part of a journey can be taking the first step👣 but at CQURE we are here to support you all the way, just like we supported Jack Perry. https://cqu.re/Story_of_Jack_Perry. Jack augments his knowledge every year by taking our annual Advanced Windows Security Course. Our aim is to bring m...

Read More

Cybersecurity in the workplace CYBERSECURITY IN THE WORKPLACE

blog article

Nov 09, 2018

Cybercriminals, however, are more likely to view your employees as the path of least resistance into an organization. In North America, for example, two top causes of breaches are careless or uninformed employee actions and phishing or other social engineering. Cybercriminals know that, and they use...

Read More

Why is cybersecurity increasingly a Reg Tech priority for regulators and financial institutions? WHY IS CYBERSECURITY INCREASINGLY A REG TECH PRIORITY FOR REGULATORS AND FINANCIAL INSTITUTIONS?

video

Nov 09, 2018

How tools and RegTech solutions can help with cybersecurity regulation requirements from various jurisdictions. Hear from Promontory Financial Group, an IBM Company's Judith Pinto to learn more. About IBM: Visit the IBM RegTech: https://ibm.biz/BdYwSY. Follow IBM RegTech on Twitter: https://twit...

Read More

7 Ways to Bridge the Cyber Security Skills Gap 7 WAYS TO BRIDGE THE CYBER SECURITY SKILLS GAP

blog article

Nov 09, 2018

Make security training compulsory and fun with a variety of on-demand media. To scale up cyber security, people who are not part of the security team also need to think and care about it.  This was a key takeaway for scalable cyber security from both the AppSec EU and Black Hat security confere...

Read More

How Can You Get More from Your AppSec Education Program? HOW CAN YOU GET MORE FROM YOUR APPSEC EDUCATION PROGRAM?

blog article

Nov 09, 2018

Forbes recently published an article titled “The Cybersecurity Talent Gap Is An Industry Crisis” – and without question, there’s a real lack of cybersecurity talent. Cybersecurity Ventures predicts about 3.5 million unfilled cybersecurity job openings by 2021! The need for cy...

Read More

What is the MyDoom Virus? WHAT IS THE MYDOOM VIRUS?

blog article

Nov 09, 2018

The MyDoom virus, also known as Novarg, is another worm capable of developing a backdoor in a victim computer’s operating system. The family of MyDoom e-mail worms continues to be an active threat because of unprotected personal computers and compromised computer systems even though the virus ...

Read More

‘Discovering’ Critical Data Stored On The Endpoint ‘DISCOVERING’ CRITICAL DATA STORED ON THE ENDPOINT

blog article

Nov 08, 2018

Ever wondered exactly how much data you have stored on your laptop?  It doesn’t take long to amass a gazillion files, some are ones you have authored, some have been sent by email, some are from the Intranet, some are from file shares, some are from the cloud, some are… well, they ...

Read More

Partner Perspectives: Endpoint Phishing Incident Response with Cofense Intelligence and Cb Response PARTNER PERSPECTIVES: ENDPOINT PHISHING INCIDENT RESPONSE WITH COFENSE INTELLIGENCE AND CB RESPONSE

blog article

Nov 08, 2018

Hunting Phished Endpoints with Cofense Intelligence™ and Carbon Black. Ransomware, business email compromise (BEC), malware infections and credential-based theft all primarily stem from a single vector of compromise – phishing. Operationalizing threat intelligence, especially when it com...

Read More

HIPAA Data Security & Privacy HIPAA DATA SECURITY & PRIVACY

whitepaper

Nov 08, 2018

Under the HIPAA mandate, covered entities and business associates are subject to the Security Rule that covers confidentiality, integrity, and availability of electronic Protected Health Information (ePHI) and the Privacy Rule that limits the uses and disclosures of PHI. These rules have long been i...

Read More

5 Ways To Avoid a Phishing Attack 5 WAYS TO AVOID A PHISHING ATTACK

blog article

Nov 08, 2018

Before diving into the 5 ways to avoid a phishing attack, we want to make sure you understand what phishing means and the risk it presents. Phishing is simply a fraudulent method of obtaining sensitive data by disguising as a trustworthy entity in an email. These attacks usually consist of fake emai...

Read More

IT Solutions END-TO-END CYBER SECURITY IT SOLUTIONS END-TO-END CYBER SECURITY

whitepaper

Nov 08, 2018

We assist nuclear operators and suppliers in complying with the most up-to-date cyber security regulatory requirements for Industrial Control Systems. Let us help you adapt to the latest in industry best practice and meet your regulatory needs, including: NIST SP800-82, NIST SP800-53, NRC RG5.71 and...

Read More

The State of Consumer Awareness Around Cybersecurity THE STATE OF CONSUMER AWARENESS AROUND CYBERSECURITY

video

Nov 08, 2018

Shaila discussing consumer awareness of cybersecurity. Laptops, mobile phones, tablets, smartwatches, and more are all often found in a modern user’s arsenal of personal devices. We rely on these devices for so many things – to wake us up, count calories, connect us to friends and loved ...

Read More

Security Alert: New Dharma Ransomware Strains Alarmingly Go Undetected By Antivirus Engines SECURITY ALERT: NEW DHARMA RANSOMWARE STRAINS ALARMINGLY GO UNDETECTED BY ANTIVIRUS ENGINES

blog article

Nov 07, 2018

Dharma ransomware is one of the oldest ransomware families in existence and yet it still wreaks havoc, undetected by security solutions. October and November saw the appearance of at least four new strains. We discovered one that goes undetected by almost all the antivirus engines on the market.&nbs...

Read More

Boston Area Business Pays it Forward with a New Boston Tradition BOSTON AREA BUSINESS PAYS IT FORWARD WITH A NEW BOSTON TRADITION

blog article

Nov 07, 2018

We have a lot of long-standing traditions that started in Massachusetts – from Thanksgiving to Patriots Day to the annual Beanpot Tournament, a popular ice hockey competition between four local colleges. As a lifelong Massachusetts resident, I’m one of the 7 million that make the state s...

Read More

Deepguard proactive on-host protection against new and emerging threats DEEPGUARD PROACTIVE ON-HOST PROTECTION AGAINST NEW AND EMERGING THREATS

whitepaper

Nov 07, 2018

This whitepaper explains the trends and developments in computing that have made host-based behavioral analysis and exploit interception necessary elements of computer security. It also provides an overview of the technology and methodology used by DeepGuard, the Host-based Intrusion Prevention Syst...

Read More

CYBERSECURITY AWARENESS: TAKE THE RIGHT APPROACH CYBERSECURITY AWARENESS: TAKE THE RIGHT APPROACH

blog article

Nov 07, 2018

There’s never been a more critical time for awareness training for cybersecurity. Attacks of all kinds are on the rise and the ubiquity of technology in the lives of end users can create opportunities for lapses in judgement, human error and avoidable mistakes. As an IT leader in your organiza...

Read More

Managing Software Security: 10 Essential Best Practices MANAGING SOFTWARE SECURITY: 10 ESSENTIAL BEST PRACTICES

infographic

Nov 07, 2018

Is your software security program up to the challenges of a rapidly accelerating software delivery environment? Most aren’t – and it’s challenging to both identify the problems and determine the best ways to manage software security in a DevOps environment. Learn some of the essent...

Read More

How to Overcome Common Cybersecurity Project Challenges HOW TO OVERCOME COMMON CYBERSECURITY PROJECT CHALLENGES

blog article

Nov 06, 2018

Are you struggling with managing your cybersecurity projects? Are you facing challenges during your project and don’t know how to deal with them? We’ve put together several common cybersecurity project challenges and propose solutions for what you can do about them. Lack of prioritizatio...

Read More

Data security overview DATA SECURITY OVERVIEW

whitepaper

Nov 06, 2018

Organizations today are facing increasing pressure to secure and protect employee data to ever higher standards. There is widespread concern regarding individual consumer and employee data privacy and security, resulting in new legislation, such as the EU’s General Data Protection Regulation (...

Read More

How Dairygold Secures Data & Critical Infrastructure with Smarttech247 & IBM Security HOW DAIRYGOLD SECURES DATA & CRITICAL INFRASTRUCTURE WITH SMARTTECH247 & IBM SECURITY

video

Nov 06, 2018

Learn how Dairygold, a leading dairy cooperative, scales their security operations and critical infrastructure to their business growth. In this real-world customer case study video, Smarttech247 and IBM Security work together to secure Dairygold’s manufacturing processes and data using IBM QR...

Read More

Faster and Smarter Incident Response with Artificial Intelligence FASTER AND SMARTER INCIDENT RESPONSE WITH ARTIFICIAL INTELLIGENCE

video

Nov 06, 2018

Overwhelming amounts of data is one of the major challenges incident response teams battle daily. Artificial intelligence can help – analyzing incident details, threat intelligence, historical context and trends to determine the true nature of an incident. In the video, IBM Resilient’s A...

Read More

THE CRITICALITY OF COORDINATED DISCLOSURE IN MODERN CYBERSECURITY THE CRITICALITY OF COORDINATED DISCLOSURE IN MODERN CYBERSECURITY

whitepaper

Nov 06, 2018

Over the past several years, the Committee on Energy and Commerce has conducted oversight of cybersecurity strategies and incidents both at federal agencies and in the private sector. As part of that work, the Committee has examined the cybersecurity capabilities of the automotive industry, sought a...

Read More

Protect Your Business in the Cloud with Axcient Fusion PROTECT YOUR BUSINESS IN THE CLOUD WITH AXCIENT FUSION

whitepaper

Nov 06, 2018

North American businesses operate in an era where the cost of downtime is more than $700 Billion annually. IT leaders are under constant pressure to protect their business with the ability to rapidly recover from a disaster or site-wide outage, thereby ensuring employees remain productive and applic...

Read More

Clearswift Endpoint Data Loss Prevention CLEARSWIFT ENDPOINT DATA LOSS PREVENTION

blog article

Nov 05, 2018

There are multiple places within your IT infrastructure where critical information is stored. These include email Inboxes, file servers, collaboration servers (some of which might be ‘in the cloud’) and endpoint devices.  All Clearswift solutions are designed to protect critical inf...

Read More

Free Symantec Service Helps Election Officials and Others Stymie Cyber Attacks FREE SYMANTEC SERVICE HELPS ELECTION OFFICIALS AND OTHERS STYMIE CYBER ATTACKS

blog article

Nov 05, 2018

Business and organizational websites deploying Symantec’s “Project Dolphin” anti-spoof proofing service at no cost. Security, trust and accuracy issues have bedeviled voting and elections from the day after elections moved beyond a simple “can we get a show of hands?” A...

Read More

BLOCKCHAIN FOR THINGS Securing high-volume IoT data transmissions BLOCKCHAIN FOR THINGS SECURING HIGH-VOLUME IOT DATA TRANSMISSIONS

whitepaper

Nov 05, 2018

BLOCKCHAIN FOR THINGS Securing high-volume IoT data transmissions by combining well-established cryptographic signatures with blockchain technology, UBIRCH has created an innovative and highly e¬ client method of securing trust in IoT data forever. We call it Blockchain for Things. IOT IS GROWIN...

Read More

IBM Cloud Data Shield with Intel Software Guard Extensions | Intel Business IBM CLOUD DATA SHIELD WITH INTEL SOFTWARE GUARD EXTENSIONS | INTEL BUSINESS

video

Nov 05, 2018

Intel and IBM are driving cloud innovation together with security as a top priority. IBM Cloud Data Shield based on Intel® Software Guard Extensions (Intel® SGX) helps enable protection of data in all of its phases – data in use, in transit and at rest.

Read More

Innovation key to cybersecurity INNOVATION KEY TO CYBERSECURITY

video

Nov 05, 2018

Pascal Dello Torre, Global head of technology – Veolia Group, talks on the sidelines of Gartner Security and Risk Management Summit 2018, about why it is important to discuss innovation when you are talking about cybersecurity.

Read More

Proofpoint Named a Visionary in the 2018 Gartner Magic Quadrant for Cloud Access Security Brokers PROOFPOINT NAMED A VISIONARY IN THE 2018 GARTNER MAGIC QUADRANT FOR CLOUD ACCESS SECURITY BROKERS

blog article

Nov 05, 2018

Many IT executives have adopted a “Cloud First” strategy to reduce computing costs and improve productivity. However, this boost to operational efficiency is closely followed by the discovery of new security and compliance risks. Security teams are plagued by cloud account compromise. Co...

Read More

VISIBILITY AND ZERO TRUST: HOW TRUSTING NO ONE IS RESTORING FAITH IN CYBERSECURITY VISIBILITY AND ZERO TRUST: HOW TRUSTING NO ONE IS RESTORING FAITH IN CYBERSECURITY

blog article

Nov 05, 2018

For years, IT security architects trusted perimeter defenses to protect enterprise networks and data. The basic premise was simple: build a rock-solid perimeter to protect the trusted network. Once inside you have far-reaching access to a big flat network. In essence, it was like Jack Byrnes’ ...

Read More

Spoofing: RFID and SMS SPOOFING: RFID AND SMS

blog article

Nov 05, 2018

First, let's start with a definition - What is Spoofing? According to ForcePoint, "Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a com...

Read More

What is Locky Ransomware? WHAT IS LOCKY RANSOMWARE?

blog article

Nov 05, 2018

Locky is one kind of latest ransomware. It was first released in 2016. The IT security geeks had discovered that the malware authors send ransomware infected emails demanding for payment through an invoice in the form of malicious Microsoft Word document that runs infectious macros. When the user op...

Read More

What is WannaCry Ransomware? WHAT IS WANNACRY RANSOMWARE?

blog article

Nov 03, 2018

The wannacry ransomware is composed of various components. Files with encryption keys. Application to encrypt data. Application to decrypt data. A copy of Tor Browser. Unlike other ransomware, wannacry has taken the internet world by storm as it created a very bad impact on almost all the business f...

Read More

The rise of smart factories and the cybersecurity risk they pose THE RISE OF SMART FACTORIES AND THE CYBERSECURITY RISK THEY POSE

infographic

Nov 03, 2018

The rise of smart factories will help the manufacturing industry considerably, as digital technology such as automation can lead to greater efficiency and accurate reproducibility, leading to optimum product quality with minimum waste. But, these connected devices expose a greater risk for hackers t...

Read More

Defning a Modern Endpoint Security Stack DEFNING A MODERN ENDPOINT SECURITY STACK

whitepaper

Nov 02, 2018

Despite record spending on cyber security, government agencies and enterprise organizations are not making significant headway in winning a battle against cybercrime. As part of an ongoing modernization initiative, the U.S. DoD is evaluating security solutions that offer the smallest footprint, lowe...

Read More

Kevin Ekbatani on Malware, Solving Puzzles and Artificial Intelligence in Security KEVIN EKBATANI ON MALWARE, SOLVING PUZZLES AND ARTIFICIAL INTELLIGENCE IN SECURITY

video

Nov 02, 2018

Problem solving used to keep Kevin Ekbatani awake at night. These days, he works with small and medium businesses to keep them protected from malware and coordinated attacks. Wrapped in Cylance green, Kevin uses Artificial Intelligence-based security solutions to keep the bad guys from using tools i...

Read More

Data security: 10 secure file sharing options and tips DATA SECURITY: 10 SECURE FILE SHARING OPTIONS AND TIPS

infographic

Nov 02, 2018

when companies decide to start securing all internal file sharing, it may seem like a confusing and even daunting task. How can something be shareable and public while also staying secure and private? It is quite a paradox. There are various kinds of platforms when it comes to secure file sharing. M...

Read More

SECURITY AND PRIVACY IN DISRUPTIVE TECHNOLOGIES IoT SENSING SOLUTION SECURITY AND PRIVACY IN DISRUPTIVE TECHNOLOGIES IOT SENSING SOLUTION

whitepaper

Nov 02, 2018

Disruptive Technologies has prioritized security and privacy throughout every part of the design and development process for our sensing solution, including chip design, sensor design, radio protocol design, cloud services and APIs. Every layer of the Disruptive sensing solution is secure, from the ...

Read More

What Is the Stuxnet Worm Computer Virus? WHAT IS THE STUXNET WORM COMPUTER VIRUS?

blog article

Nov 02, 2018

Stuxnet worm is a rootkit exploit. The Stuxnet worm is targeted at data acquisition (SCADA) systems and supervisory control. On the other side, it is vital to know that the SCADA systems are used for industrial control systems and this includes power, water, sewage plants etc. History of Stuxnet. In...

Read More

What is Zeus Malware? WHAT IS ZEUS MALWARE?

blog article

Nov 01, 2018

The Zeus malware, also known as the ZeuS or Zbot, is a Trojan Horse used to steal confidential information from the victims’ computers. The primary ways by which Zeus malware infects a computer are through phishing attacks and drive-by downloads. The Zeus Trojan was first detected when it stol...

Read More

Digital Trust in New Zealand DIGITAL TRUST IN NEW ZEALAND

infographic

Oct 31, 2018

Embrace cyber security from the start Many companies are pursuing digital transformation projects and growing connectivity is increasing the potential for cyber-attacks. Only 25% of NZ businesses are including proactive risk management 'fully from the start' of a digital transformation proje...

Read More

The value of independent anti-virus testing THE VALUE OF INDEPENDENT ANTI-VIRUS TESTING

blog article

Oct 31, 2018

Unlike many other tests in the IT industry, independent anti-virus (AV) testing is really just that: Independent. Their results provide truly useful comparisons between vendors across a range of security software products. This is both for consumers, and for security vendors looking to integrate an ...

Read More

15 Must-Do Things to Protect Your Business From A Cyber Attack 15 MUST-DO THINGS TO PROTECT YOUR BUSINESS FROM A CYBER ATTACK

infographic

Oct 31, 2018

RISK ASSESSMENT. You need to establish a baseline understanding of the risks facing your organization before you can effectively write security policies and spend money on technical controls. WRITTEN SECURITY POLICY. Policy guides employee behavior and sets expectations for how cybersecurity fits in...

Read More

Regulatory Support for Email Security REGULATORY SUPPORT FOR EMAIL SECURITY

blog article

Oct 31, 2018

Email continues to be the most common method used to gain unauthorized access to corporate systems and perpetrate cyber fraud.  More specifically, targeted business email compromise (BEC) attacks clearly stand out as a major problem.  With a recent survey indicating that 89% of organizatio...

Read More

5 Reasons Why U.S. Voting Systems Are Getting Harder to Hack 5 REASONS WHY U.S. VOTING SYSTEMS ARE GETTING HARDER TO HACK

blog article

Oct 31, 2018

Even as the Justice Department stays busy with those suspected of election meddling in the run-up to the midterms, there’s growing reason for optimism about the ability of the US electoral infrastructure to withstand attacks. While it’s still technically possible for a foreign state to a...

Read More

Internet Data Breaches Realm: 20+ Fascinating Cyber Security Facts INTERNET DATA BREACHES REALM: 20+ FASCINATING CYBER SECURITY FACTS

infographic

Oct 31, 2018

Cybercrime is on the rise, mostly because of the fact that we are becoming so dependent on the internet and are performing so many essential tasks using this tool. Cybercrime results in financial loss, emotional distress and is just generally a nuisance that anyone would want to avoid, and if you ar...

Read More

Cloud-Enabled Core Banking CLOUD-ENABLED CORE BANKING

whitepaper

Oct 30, 2018

Cloud-Enabled Core Banking. The time is now for banks to capitalize on the many benefits that can be achieved by running Core banking solutions in the cloud. This white paper explains why. Topics include recent increased confidence in cloud strategies; a definition of what cloud-based core banking m...

Read More

SamSam: Targeted Ransomware Attacks Continue SAMSAM: TARGETED RANSOMWARE ATTACKS CONTINUE

blog article

Oct 30, 2018

Ransomware group remains highly active in 2018, focusing mainly on organizations in the U.S. The group behind the SamSam ransomware (Ransom.SamSam) has continued to mount attacks against entire organizations during 2018, with fresh attacks seen against 67 different targets, mostly located in the U.S...

Read More

How to Protect Yourself From The Conficker Worm? HOW TO PROTECT YOURSELF FROM THE CONFICKER WORM?

blog article

Oct 30, 2018

A new worm called Conflicker is doing the rounds, attacking unnumbered Windows computers in the recent times. The spread of infection is going from bad to worse and is beyond control as per the reports from a security vendor. Detections of the Conflicker worm are by more than 225% since the end of 2...

Read More

HELPING NCCOE EXPLORE NEW GLOBAL FRAMEWORKS FOR SECURING IOT DEVICES HELPING NCCOE EXPLORE NEW GLOBAL FRAMEWORKS FOR SECURING IOT DEVICES

blog article

Oct 29, 2018

By 2020 there will be 29 billion connected devices, according to ABI Research1, and a growing percentage will be Internet of Things (IoT) devices that are inherently more vulnerable to attacks than traditional computing equipment. The addition of billions of unsecure (and in many cases unsecurable) ...

Read More

Importance of SSL certificate for your company website IMPORTANCE OF SSL CERTIFICATE FOR YOUR COMPANY WEBSITE

blog article

Oct 29, 2018

Anyone who browses the Internet is probably aware of the term SSL. It’s often bandied around as a term which people vaguely understand to be something connected to keeping your browsing data safe. For a lot of people, SSL is denoted by two major recognizable features: 1) Website URLs starting ...

Read More

DHS Cybersecurity Shared Services Program DHS CYBERSECURITY SHARED SERVICES PROGRAM

whitepaper

Oct 29, 2018

SCOUTPRIME ScoutPrime is a Threat Intelligence Platform (TIP) for collecting, normalizing, enriching, orchestrating, and distributing unclassified threat indicators gathered from DHS, Lookingglass, OSINT, and commercial sources. The platform provides 87 data feeds, global Internet topology of networ...

Read More

Protecting Employees from Ransomware Attacks PROTECTING EMPLOYEES FROM RANSOMWARE ATTACKS

video

Oct 29, 2018

Did you know that, every 40 seconds, a company is hit by a ransomware attack? Learn more about protecting employees against such attacks - we'll hear from product marketing manager Lorena Crowley and developer advocate Yufeng Guo as they describe malware protection in Gmail, Drive, Chrome Browse...

Read More

Protecting Employees from Phishing Websites PROTECTING EMPLOYEES FROM PHISHING WEBSITES

video

Oct 28, 2018

Learn more about how organizations can protect employees from phishing websites with product marketing manager Lorena Crowley and developer advocate Yufeng Guo.  Watch more videos from the Security on Google Cloud playlist here → http://bit.ly/2qj6QEy.

Read More

Understanding Threats will Promote the “Right Amount” of Security UNDERSTANDING THREATS WILL PROMOTE THE “RIGHT AMOUNT” OF SECURITY

whitepaper

Oct 26, 2018

This series of three cybersecurity whitepapers is intended for engineers and designers of industrial control processes and the systems that control those processes. Throughout the papers, we emphasize the point that data is not exhaust left-over from a sensor-heavy process, but it is the driver of f...

Read More

Three Key Steps to Help Protect National Infrastructure THREE KEY STEPS TO HELP PROTECT NATIONAL INFRASTRUCTURE

blog article

Oct 26, 2018

A “cyber-Pearl Harbor.” The warning from then Secretary of State Leon Panetta was stark. America was increasingly vulnerable to cyber-attacks from aggressor nation states and extremist groups and the consequences could be disastrous. It's now six years since Panetta issued his cautio...

Read More

How to solve the cybersecurity talent gap in your organization HOW TO SOLVE THE CYBERSECURITY TALENT GAP IN YOUR ORGANIZATION

infographic

Oct 26, 2018

Solving the cybersecurity talent shortage has become a major challenge for all executives—not just CISOs and CEOs, according to an infographic from Digital Guardian. In 2018, 51% of organizations said they face a cybersecurity skills shortage, up from just 23% in 2014.

Read More

Server-Side Rendering (SSR) on the Exa ® Platform Reduces Bandwidth Usage and Increases Productivity SERVER-SIDE RENDERING (SSR) ON THE EXA ® PLATFORM REDUCES BANDWIDTH USAGE AND INCREASES PRODUCTIVITY

whitepaper

Oct 26, 2018

In today’s digital world, hospitals are struggling to keep up with increasing imaging demands, while managing IT networks that are strained to the limit. Many organizations have already deeply invested in their networks and IT infrastructure, leading administrators to seek out new ways to mana...

Read More

What are boot sector viruses and how can I prevent them? WHAT ARE BOOT SECTOR VIRUSES AND HOW CAN I PREVENT THEM?

blog article

Oct 26, 2018

Computer Virus. Even before we try to understand what a boot sector virus is, let us understand what is a computer virus. In the online world, the term computer virus refers to a malicious program that auto-multiplies by copying itself to another program. Simply put, a computer virus spreads itself ...

Read More

Cyber Security Solutions and Services CYBER SECURITY SOLUTIONS AND SERVICES

whitepaper

Oct 25, 2018

Many companies’ focus on cybersecurity is increasing as they embrace digitalization and the Internet of Things (IoT). Organizations, irrespective of size and industry, are constantly under attack, and regulatory authorities are strengthening laws to protect data. As more and more behemoths lik...

Read More

5 phases for migrating healthcare workloads to Amazon Web Services 5 PHASES FOR MIGRATING HEALTHCARE WORKLOADS TO AMAZON WEB SERVICES

whitepaper

Oct 25, 2018

Healthcare organizations migrating to the cloud need a strategy that assesses risks and considers all the possibilities. Moving an entire healthcare service to a new IT environment means deciding how to migrate all three subsystems— compute, storage, and networking—and identifying the ri...

Read More

Designing for People: Proofpoint’s UX Team Reveals the Process behind a Product Refresh DESIGNING FOR PEOPLE: PROOFPOINT’S UX TEAM REVEALS THE PROCESS BEHIND A PRODUCT REFRESH

blog article

Oct 25, 2018

Whether it’s stopping attacks that target users or our passion for customer service, protection has always started with people at Proofpoint. People are also the inspiration behind one of the most sweeping UI/UX redesigns in our company’s history. Our UX/UI design team is in the middle o...

Read More

5 Common Visibility Gaps Your Enterprise Security Plan Can’t Afford 5 COMMON VISIBILITY GAPS YOUR ENTERPRISE SECURITY PLAN CAN’T AFFORD

blog article

Oct 25, 2018

Today’s cybersecurity challenges are unlike anything we’ve seen before. Your organization’s IT infrastructures now consist of the traditional network—employee laptops, desktops, various operating software, storage platforms and servers, cloud storage—plus an entirely ne...

Read More

How to Prevent Bots from Infecting Your System? HOW TO PREVENT BOTS FROM INFECTING YOUR SYSTEM?

blog article

Oct 25, 2018

What are Bots? Bots are Internet robots also known as crawlers, spiders, and web bots. They are automated programs developed for performing repetitive tasks. With the computing power available to programmers, bots have been developed to execute tasks at extremely high speeds, unbelievable for a real...

Read More

CSPi Security Solutions for Secure DevOps & Enhanced Network Security CSPI SECURITY SOLUTIONS FOR SECURE DEVOPS & ENHANCED NETWORK SECURITY

whitepaper

Oct 25, 2018

Organizations of all sizes and across all industries are the targets of an increasing number of sophisticated cyber attacks. The risk of breach is very real, and gets worse every day. The industry recognizes that approaches such as threat prevention and breach detection are ineffective. For proof, j...

Read More

The commodity problem of cybersecurity THE COMMODITY PROBLEM OF CYBERSECURITY

video

Oct 24, 2018

Ilijana Vavan and Max Frolov discuss why cybersecurity companies can’t rely on distributors to expand their partner landscape: It’s a lot of work for little money. NEXT GENERATION CYBERSECURITY FOR BUSINESS. Easy to use, ready to scale: True cybersecurity to protect against every type of...