RESOURCES


home.aspx
   
Proofpoint Enterprise Archive Demo - Data Archiving Solutions PROOFPOINT ENTERPRISE ARCHIVE DEMO - DATA ARCHIVING SOLUTIONS

video

Apr 22, 2019

Proofpoint Enterprise Archive provides a secure and searchable central repository of a wide range of content types without the headaches of managing an in-house email archive. It is a cloud-based data archiving solution that will simplify your legal discovery, regulatory compliance and end-user data...

Read More

Top 10 best practice for successful multi-cloud management TOP 10 BEST PRACTICE FOR SUCCESSFUL MULTI-CLOUD MANAGEMENT

whitepaper

Apr 22, 2019

A multi-cloud world is quickly becoming the new normal for many enterprises. But embarking on a cloud journey and managing cloud-based services across multiple providers can seem overwhelming. Today, IT users have a choice. Corporate IT departments know that if they don’t react, they may find themse...

Read More

Passwords, passwords everywhere PASSWORDS, PASSWORDS EVERYWHERE

blog article

Apr 21, 2019

Throughout our blogs and guidance, the NCSC have said how important it is to change your password policies (if necessary) to make it easier for users to choose 'good' ones. This includes using password blacklists (that is, making sure your users can't choose any passwords commonly found ...

Read More

56 Must Know Data Breach Statistics for 2019 56 MUST KNOW DATA BREACH STATISTICS FOR 2019

infographic

Apr 20, 2019

Varonis spent a lot of time compiling a whole bunch of data breach stats that are very good ammo for budget requests. They also created an infographic with a quick executive summary. Did you know that Boeing actually had an inside data breach that lasted for 30 years and cost over $2 billion? Here i...

Read More

Fortinet Increases Customer Confidence in the Cloud FORTINET INCREASES CUSTOMER CONFIDENCE IN THE CLOUD

video

Apr 19, 2019

Cybersecurity vendor Fortinet natively integrates with Oracle Cloud Infrastructure to ensure secure, highly available workloads at scale.

Read More

Hybrid Cloud Gets More Secure and Efficient with IBM Cloud Private HYBRID CLOUD GETS MORE SECURE AND EFFICIENT WITH IBM CLOUD PRIVATE

video

Apr 19, 2019

IBM Cloud Private is the Kubernetes platform for your enterprise. Among developers, IT architects, and chief information officers, there is a reluctance to move their critical applications to the cloud due to concerns about: 1. Security, 2. Efficiency, 3. Software/data across multiple clouds, 4. Non...

Read More

Cisco Trust Scope and Scale CISCO TRUST SCOPE AND SCALE

infographic

Apr 18, 2019

Our journey to trust starts with protecting our own network. And, our network is big. Really Big.  In just one day, Cisco handles 1.2 Trillion Security events. A security event is anything that could have information security implications. Such as, authentications or spam emails or anti-virus a...

Read More

What are the 6 data protection principles of the GDPR? WHAT ARE THE 6 DATA PROTECTION PRINCIPLES OF THE GDPR?

blog article

Apr 18, 2019

The GDPR (General Data Protection Regulation) outlines six principles that organisations must follow when collecting, processing and storing individuals’ personal data. Data controllers are responsible for complying with those principles, and they must have documented proof of how the organisa...

Read More

Why your development team should care about software compliance WHY YOUR DEVELOPMENT TEAM SHOULD CARE ABOUT SOFTWARE COMPLIANCE

blog article

Apr 18, 2019

Software compliance isn’t just a concern of security, development, and legal executives. Your developers and development managers should care about it too. Here’s why. How do you evaluate the quality of an application? A simple quality checklist would include these software performance c...

Read More

Red Teaming: Internet of Things Security (IOT) RED TEAMING: INTERNET OF THINGS SECURITY (IOT)

video

Apr 17, 2019

Consumer products that connect into an organization’s enterprise network could be used by an attacker as an initial foothold to access critical company assets. Mandiant’s robust IOT methodology tests all inputs into those consumer devices to see where security vulnerabilities may exist. ...

Read More

The Synopsys Cybersecurity Research Center (CyRC): Advancing the state of software security THE SYNOPSYS CYBERSECURITY RESEARCH CENTER (CYRC): ADVANCING THE STATE OF SOFTWARE SECURITY

blog article

Apr 17, 2019

The Synopsys Software Integrity Group is pleased to announce the public launch of CyRC (Cybersecurity Research Center). Our mission is simple—to advance the state of software security through research, innovation, and evangelism. More specifically, we strive to provide resources and informatio...

Read More

10 steps to GDPR compliance: How prepared are you? 10 STEPS TO GDPR COMPLIANCE: HOW PREPARED ARE YOU?

blog article

Apr 16, 2019

It’s not too late to comply with the GDPR (General Data Protection Regulation). The Regulation might have come into effect last year, but it’s requirements need to be regularly reviewed. As such, it doesn’t matter what your compliance posture was six months or a year ago. All that ...

Read More

Cyber attack powerlessness in the energy industry? CYBER ATTACK POWERLESSNESS IN THE ENERGY INDUSTRY?

blog article

Apr 16, 2019

Imagine one of your employees clicked on an email link that let attackers into your network. Imagine that you couldn’t produce energy, have lost control of your systems, and were sitting at the mercy of a ransom-seeking hacker or foreign nation-state intent on exercising political leverage. Wh...

Read More

 Curso sobre o Microsoft 365 Business CURSO SOBRE O MICROSOFT 365 BUSINESS

whitepaper

Apr 16, 2019

Descubra como o Microsoft 365 Business pode tornar sua tecnologia mais gerenciável ao mesmo tempo em que melhora a produtividade dos funcionários. Você descobrirá formas de: Ajudar a reduzir os riscos com uma segurança constante Aumentar a produtividade juntos Trabalhar de qualquer lugar

Read More

IBM Resiliency Orchestration with Cyber Incident Recovery IBM RESILIENCY ORCHESTRATION WITH CYBER INCIDENT RECOVERY

video

Apr 15, 2019

IBM Resiliency Orchestration with Cyber Incident Recovery can help organizations safeguard their business-critical applications and data and mitigate the impact of cyber incidents.

Read More

Breaking Down 5 Different Types of Malware Every Small Business Should Know BREAKING DOWN 5 DIFFERENT TYPES OF MALWARE EVERY SMALL BUSINESS SHOULD KNOW

blog article

Apr 15, 2019

Modern malicious software — or malware for short — has reached unprecedented levels of sophistication, and as the attack landscape continues to evolve, new threats will undoubtedly emerge. Malware affecting websites poses a special danger to businesses. Even some of the world’s lar...

Read More

From .tk Redirects to PushKa Browser Notification Scam FROM .TK REDIRECTS TO PUSHKA BROWSER NOTIFICATION SCAM

blog article

Apr 15, 2019

In the past couple of years, we’ve been tracking a long-lasting campaign responsible for injecting malicious scripts into WordPress sites. This campaign leverages old vulnerabilities (patched a long time ago) found in a variety of outdated themes and plugins. However, it also adds new vulnerab...

Read More

What is a Whaling Attack? Identify & Prevent Whale Phishing WHAT IS A WHALING ATTACK? IDENTIFY & PREVENT WHALE PHISHING

blog article

Apr 15, 2019

Are your company executives vulnerable to an attack? A whaling attack is very similar to a phishing attack, just with bigger targets such as the c-suite. In this article, learn how to stay ahead of the threat and prevent a data breach. What is a Whaling Attack? A whaling attack is a spear phishing a...

Read More

The Importance of Securing Sensitive Data in a 5G World THE IMPORTANCE OF SECURING SENSITIVE DATA IN A 5G WORLD

blog article

Apr 15, 2019

The pace of change within communications networks is happening at speeds not seen since the shift from circuit-switched networks to IP began a couple of decades ago. Today, we are in the midst of the next major transformation to hit communications networks: the evolution to a new, 5G- and IPv6-enabl...

Read More

Protect Your Online Business from Credential Stuffing PROTECT YOUR ONLINE BUSINESS FROM CREDENTIAL STUFFING

whitepaper

Apr 15, 2019

Fraudsters use bots to validate stolen login credentials by the thousands, often stealthily — on websites like yours. Bots are responsible for between 30% and 70% of the total traffic to websites today, yet most companies have inadequate visibility into attacks. How can you tell if a login attempt i...

Read More

A Comprehensive and Achievable Guide to Less Risk A COMPREHENSIVE AND ACHIEVABLE GUIDE TO LESS RISK

whitepaper

Apr 15, 2019

Contrary to current perception, you are not safe behind the perimeter — because the perimeter itself no longer exists. Traditional hub-and-spoke networking architectures, and the castle-and-moat security they utilize, aren’t amenable for today’s burgeoning cloud-and-mobile world. This is a problem t...

Read More

 Anatomy of a Breach ANATOMY OF A BREACH

whitepaper

Apr 15, 2019

Organizations across all industries are not immune to threats, especially those posed by weak or compromised user credentials. As employees use more apps and devices and create different identities across corporate and social accounts, it’s easier than ever for hackers to breach corporate systems. W...

Read More

FTC Announces New Cybersecurity Requirements, Privacy Rule Update FTC ANNOUNCES NEW CYBERSECURITY REQUIREMENTS, PRIVACY RULE UPDATE

blog article

Apr 13, 2019

In March, the Federal Trade Commission announced proposed updates to two key privacy and security regulations, the Safeguards Rule and Privacy Rule. Both rules implement regulations under the federal Gramm Leach Bliley Act, and the FTC seeks comments for both. The FTC’s proposed update to the ...

Read More

MasterCard, Microsoft Team with Federal Agencies and Nonprofit to Launch Cyber Talent Initiative MASTERCARD, MICROSOFT TEAM WITH FEDERAL AGENCIES AND NONPROFIT TO LAUNCH CYBER TALENT INITIATIVE

blog article

Apr 13, 2019

Mastercard, in collaboration with Microsoft, Workday and the nonprofit, nonpartisan Partnership for Public Service, launched the Cybersecurity Talent Initiative – a public-private partnership to recruit the nation’s best minds to defend against global cyberattacks. The Cybersecurity Tale...

Read More

Tips To Scan And Remove Those Nasty Viruses From Your Phone TIPS TO SCAN AND REMOVE THOSE NASTY VIRUSES FROM YOUR PHONE

blog article

Apr 12, 2019

Before we explore the possibility if mobile phones can get virus, let’s learn more about the viruses itself. We all are very well familiar with computer viruses. They are malicious programs that infect and corrupt the files present in the computer, disrupting its performance and wreaking havoc...

Read More

How to Get an Umbrella Account HOW TO GET AN UMBRELLA ACCOUNT

video

Apr 12, 2019

Cisco Umbrella is a cloud security platform that provides you with a first line of defense against threats on the internet, wherever your users go. Learn how to get an Umbrella account here on Cisco Tech Talks. For additional support information.

Read More

Securing a Business Network Using Umbrella and Cisco Small Business Access Points SECURING A BUSINESS NETWORK USING UMBRELLA AND CISCO SMALL BUSINESS ACCESS POINTS

video

Apr 12, 2019

Cisco Umbrella is a cloud security platform that provides the first line of defense against threats on the internet. Learn more about how it can protect your wireless network from malicious malware or ransomware here. For additional support information.

Read More

How to Prevent Mirai Botnet DDoS Attacks? HOW TO PREVENT MIRAI BOTNET DDOS ATTACKS?

blog article

Apr 12, 2019

Mirai is a self-propagating botnet virus that infects internet-connected devices by turning them into a network of remotely controlled bots or zombies. This network of bots, known as a botnet, is mostly used to launch DDoS attacks. The Mirai botnet code infects internet devices that are poorly prote...

Read More

A Look at Hacking Trends A LOOK AT HACKING TRENDS

infographic

Apr 12, 2019

Hackers have more room to work with the progressive move towards mobile payments and the steady decline of brick-and-mortar stores in favor of ecommerce sites. This movement opens up opportunities to steal your information through tactics like formjacking and DDoS attacks that can be devastating for...

Read More

IoT, GDPR and More Cybersecurity Trends in 2019 IOT, GDPR AND MORE CYBERSECURITY TRENDS IN 2019

blog article

Apr 12, 2019

TÜV Rheinland released its Cybersecurity Trends 2019, a report that contains eight important developments in cybersecurity. TREND 1: Cybersecurity has become a topic for the management level Until recently, lack of cybersecurity was not seen as a business risk, but as an IT problem. Despite yea...

Read More

Jenseits der DSGVO: So reagieren Sie auf die sich ständig ändernden gesetzlichen Anforderungen JENSEITS DER DSGVO: SO REAGIEREN SIE AUF DIE SICH STÄNDIG ÄNDERNDEN GESETZLICHEN ANFORDERUNGEN

whitepaper

Apr 12, 2019

Die Gesetze und Bestimmungen zur Speicherung und Weitergabe von Daten ändern sich ständig, da sich Regierungen auf dem neusten Stand hinsichtlich digitaler Innovationen halten. Darüber hinaus sind die Vorschriften, die Ihr Unternehmen einhalten muss, von Land zu Land unterschiedlich. Die Daten-Compl...

Read More

How IT Governance can help with your cyber security concerns HOW IT GOVERNANCE CAN HELP WITH YOUR CYBER SECURITY CONCERNS

blog article

Apr 11, 2019

Cyber security is a complex topic, so we wouldn’t be surprised if you had questions about what your organisation should be doing. The threat of data breaches grows each year, organisations process more information than ever and the regulatory landscape is becoming a minefield to navigate. Fort...

Read More

Compliance & Data Security Solutions Software Info | Digital Defenses COMPLIANCE & DATA SECURITY SOLUTIONS SOFTWARE INFO | DIGITAL DEFENSES

blog article

Apr 11, 2019

In my years working with technology and security data in the information security industry, I’ve heard numerous people confuse the word “compliance” with “security”.  We’ve all heard the stories in the news about an organization or company that was supposedly...

Read More

Making personal data secure: a major challenge facing businesses MAKING PERSONAL DATA SECURE: A MAJOR CHALLENGE FACING BUSINESSES

infographic

Apr 11, 2019

Data volumes growing at an incredible rate, company data being lost in increasing amounts. IT decision-makers in the public and private sectors in 18 countries have given their opinion on whether their data security strategy is fit for purpose. DELL EMC recently revealed the results of its third Glo...

Read More

Global Threat Intelligence Report GLOBAL THREAT INTELLIGENCE REPORT

whitepaper

Apr 11, 2019

As organizations continue to move toward digital transformation, the challenges they face are evolving. True transformation requires exploring new ways of doing business while reducing cost, increasing efficiency and realizing a greater return on investment. Cautiously navigating these new frontiers...

Read More

New Cybersecurity Office to Open in West Virginia NEW CYBERSECURITY OFFICE TO OPEN IN WEST VIRGINIA

blog article

Apr 11, 2019

Legislation signed by West Virginia Governor creates a new cybersecurity office within the Office of Technology to assess the vulnerabilities of state agencies and unify security policies. The new office has the authority to set standards for cybersecurity and is charged with managing the cybersecur...

Read More

More Than Half of Organizations with Cybersecurity Incident Response Plans Fail to Test Them MORE THAN HALF OF ORGANIZATIONS WITH CYBERSECURITY INCIDENT RESPONSE PLANS FAIL TO TEST THEM

blog article

Apr 11, 2019

A vast majority of organizations are still unprepared to properly respond to cybersecurity incidents, with 77 percent of survey respondents indicating they do not have a cybersecurity incident response plan applied consistently across the enterprise. The 2019 Cyber Resilient Organization study from ...

Read More

The Ping is the Thing: Popular HTML5 Feature Used to Trick Chinese Mobile Users into Joining Latest DDoS Attack THE PING IS THE THING: POPULAR HTML5 FEATURE USED TO TRICK CHINESE MOBILE USERS INTO JOINING LATEST DDOS ATTACK

blog article

Apr 11, 2019

DDoS attacks have always been a major threat to network infrastructure and web applications. Attackers are always creating new ways to exploit legitimate services for malicious purposes, forcing us to constantly research DDoS attacks in our CDN to build advanced mitigations. We recently investigated...

Read More

 Crash Course in Azure Active Directory CRASH COURSE IN AZURE ACTIVE DIRECTORY

whitepaper

Apr 11, 2019

Azure Active Directory is a critical component of digital transformation and creating a truly modern workplace. Azure AD gives organizations a simple, elegant way to provide effortless user experiences, unlock IT efficiencies, and enhance security. Download “Crash course in Azure Active Directory” a...

Read More

 See why a modern workplace is essential to productivity and engagement SEE WHY A MODERN WORKPLACE IS ESSENTIAL TO PRODUCTIVITY AND ENGAGEMENT

whitepaper

Apr 11, 2019

Fostering a culture where your employees can feel creative and effective is crucial to meeting your goals—but it often requires the right tools to do it. In this whitepaper, you'll learn how Microsoft 365 can: How to promote employee community and engagement Why you need to ensure employees can be p...

Read More

Remote Access and Security Challenges & Opportunities REMOTE ACCESS AND SECURITY CHALLENGES & OPPORTUNITIES

whitepaper

Apr 11, 2019

Remote access is important and growing, but how secure is it? IDC Research surveyed more than 300 IT professionals to gain insight into the specific threats and challenges faced by providing access to employees and third parties. Read this report to learn about: How secure remote access really is Th...

Read More

Enforce a Zero Trust Security Model in Today ENFORCE A ZERO TRUST SECURITY MODEL IN TODAY'S HOSTILE ENVIRONMENT

whitepaper

Apr 11, 2019

Companies of all types are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new cloud and DevOps workflows to build their digital business, security has not kept pace. As infrastruc...

Read More

Why Does Linux Need Data Loss Prevention? WHY DOES LINUX NEED DATA LOSS PREVENTION?

blog article

Apr 10, 2019

Linux has earned a reputation of being the most secure operating system, but despite this, it still has its own security flaws. Deploying a secure operating system is an important starting point for every business, but even the most secure networks can be invaded. Similarly to the myth of the invuln...

Read More

Seqrite MobiSMART for GDPR Compliance SEQRITE MOBISMART FOR GDPR COMPLIANCE

blog article

Apr 10, 2019

It has almost been a year now that the General Data Protection Regulation (GDPR) has come into effect. A landmark legislation in the history of data protection, GDPR has changed the way enterprises approach cybersecurity. With its many definitions and focus on data protection and security, enterpris...

Read More

How To Keep Better Tabs on Your Connected Apps HOW TO KEEP BETTER TABS ON YOUR CONNECTED APPS

blog article

Apr 10, 2019

Not that long ago, before data breaches dominated daily headlines, we felt secure with our social media apps. Conveniently, every website seemed to allow logging in with Facebook or Twitter instead of creating a whole new password, and families of apps quickly became their own industry. Third-party ...

Read More

Attacks on Closed WordPress Plugins ATTACKS ON CLOSED WORDPRESS PLUGINS

blog article

Apr 10, 2019

The WordPress plugin repository team may “close” plugins and restrict downloads when they become aware of a security issue that the developer cannot fix quickly. However, bad actors are actively monitoring the WordPress plugin repository, paying close attention to these closed plugins. T...

Read More

IBM Resilient - Automation in Incident Response IBM RESILIENT - AUTOMATION IN INCIDENT RESPONSE

video

Apr 10, 2019

Reduce time of response and accelerate learning skills of your security team with IBM Resilient Incident Response Platform® (IRP) - put the right information in front of the right person at the right time through effective dynamic playbooks.

Read More

IBM Resilient - Incident Enrichment IBM RESILIENT - INCIDENT ENRICHMENT

video

Apr 10, 2019

IBM Resilient Incident Response Platform® (IRP) helps you decide whether a cyber alert is a true security incident or a false positive - Find out how you can reduce the time of response.

Read More

Three Reasons Cybercriminals Continue to Succeed in Breaching Some of the Biggest Brands THREE REASONS CYBERCRIMINALS CONTINUE TO SUCCEED IN BREACHING SOME OF THE BIGGEST BRANDS

blog article

Apr 10, 2019

In 2018, we witnessed some of the biggest data breaches ever – affecting businesses and consumers alike. From social media, hospitality, healthcare and even mail delivery, 2018 proved that there is no escaping cybersecurity flaws, regardless of the type of business or its popularity. For examp...

Read More

Two Out of Three Hotels Inadvertently Leak Guests TWO OUT OF THREE HOTELS INADVERTENTLY LEAK GUESTS' PRIVATE DATA

blog article

Apr 10, 2019

Two out of three hotel websites inadvertently leak guests' booking details and personal data to third-party sites, including advertisers and analytics companies, according to research by Symantec Corp. The study looked at more than 1,500 hotel websites in 54 countries that ranged from two-star t...

Read More

Cybersecurity Innovation and the Patent Landscape CYBERSECURITY INNOVATION AND THE PATENT LANDSCAPE

blog article

Apr 10, 2019

It can be expected that costs associated with cybercrime will rise in the near to medium term and have a material impact on the global economy – while putting individual citizens’ and corporations’ important data at risk by cyber criminals. The White House estimates that in 2016, m...

Read More

Biometric Authentication BIOMETRIC AUTHENTICATION

video

Apr 10, 2019

It can be difficult to keep track of all credentials we need to remember daily. By integrating Daon's biometric authentication with Oracle Identity Cloud Service, we can make this process faster, easier, and more secure.

Read More

Anatomy of a Cloud-Native Data Breach ANATOMY OF A CLOUD-NATIVE DATA BREACH

blog article

Apr 10, 2019

Migrating computing resources to cloud environments opens up new attack surfaces previously unknown in the world of premise-based data centers. As a result, cloud-native data breaches frequently have different characteristics and follow a different progression than physical data breaches. Here is a ...

Read More

The most common causes of data breaches and how you can spot them THE MOST COMMON CAUSES OF DATA BREACHES AND HOW YOU CAN SPOT THEM

blog article

Apr 09, 2019

The longer a breach goes undetected, the more embarrassing it is for the organisation in question. But what’s a good target for identifying an incident? According to Ponemon Institute’s 2018 Cost of a Data Breach Study, it’s 100 days. The average cost of an incident discovered with...

Read More

Network Security within a Converged Plantwide Ethernet Architecture NETWORK SECURITY WITHIN A CONVERGED PLANTWIDE ETHERNET ARCHITECTURE

whitepaper

Apr 09, 2019

The prevailing trend in Industrial Automation and Control System (IACS) networking is the convergence of technology, specifically IACS operational technology (OT) with information technology (IT). Converged Plantwide Ethernet (CPwE) helps to enable IACS network and security technology and OT-IT pers...

Read More

10 Tips To Protect Your Emails From Getting Hacked 10 TIPS TO PROTECT YOUR EMAILS FROM GETTING HACKED

blog article

Apr 09, 2019

What is the most common form of communication in an organisation? Yes, you are right, it is email. It has truly revolutionized the way we contact and keep in touch with the people, be it in the vicinity or abroad. Currently, there are over 2 billion active email users around the world because it&rsq...

Read More

JCry – A Ransomware written in Golang JCRY – A RANSOMWARE WRITTEN IN GOLANG

blog article

Apr 09, 2019

For several months, QH Labs has been observing an upswing in ransomware activity. We found a new ransomware which is written in Go lang. Malware authors are finding it easy to write ransomware in Go lang rather than traditional programming languages. Infection of Jcry ransomware starts with a compro...

Read More

SMBS MIDMARKET CONTINUE TO BE MASSIVE CYBERTHREAT TARGETS SMBS MIDMARKET CONTINUE TO BE MASSIVE CYBERTHREAT TARGETS

blog article

Apr 09, 2019

If you’re making the case for cyber resilience at your small to medium-sized organization, there is a whole slew of new data out there to help make your argument. Our ongoing blog series Bridging the Cyber Divide is all about helping you—the IT/security professional at a small-to-medium ...

Read More

 e-Book: ????????? ??????????? E-BOOK: ????????? ???????????

whitepaper

Apr 09, 2019

??????????????????????????????????????????????????????????????????????????????e-Book?????????????: ????????????????????????????????????????????????????????? ??????? 4 ???? ???????????????????????????????????? Windows Defender ?????? ?????Azure Backup ?????????? ???????????????????????????? ?????????...

Read More

 GDPR ????????: ? ???????????? ???? GDPR ????????: ? ???????????? ????

whitepaper

Apr 09, 2019

????????? ???????????????????????????????????????????????????????????????????????????????????????????????? ??????????????????????????? ???? eBook ????????????????????????????????????????????? ?????????? IT ?????????????????????????????????? ????????????????????????????? ?????????????????????????????...

Read More

 Microsoft 365 Business ?? ?????? MICROSOFT 365 BUSINESS ?? ??????

whitepaper

Apr 09, 2019

Microsoft 365 Business ???????????????????????????????????????????????????????????? ?????????????????? ???????????????? ???????????

Read More

Four Tips to Help Tidy Up Your Tech FOUR TIPS TO HELP TIDY UP YOUR TECH

blog article

Apr 08, 2019

This spring, many of us will roll up our sleeves and get down to business decluttering our homes. Garage sales will be held, basement storage rooms will be re-organized, and donations will be made.  Shouldn’t the same thing happen in our digital lives? After all, the average American will...

Read More

DDoS Targeting WordPress Search DDOS TARGETING WORDPRESS SEARCH

blog article

Apr 08, 2019

Have you ever stopped to think about how many resources a search engine has or if your website could handle the same amount of search traffic that Google does? Search engines play an important role on the internet and with how websites perform. One may say that they are the actual doorway to the onl...

Read More

Whirlpool IBM Services: Deploying SAP on the cloud at a global scale WHIRLPOOL IBM SERVICES: DEPLOYING SAP ON THE CLOUD AT A GLOBAL SCALE

video

Apr 08, 2019

See what benefits #Whirlpool gets from running #SAP in a managed cloud environment on a global scale. Why run managed SAPApplications on the cloud? + Operational efficiency and security benefits: Improved security and compliance reporting for workloads; faster delivery of services and applications t...

Read More

Are You Using Safe Android Antivirus? ARE YOU USING SAFE ANDROID ANTIVIRUS?

blog article

Apr 08, 2019

Tread carefully when it comes to Android security products – and never take an app provider’s claims at face value. In light of recent research showing that the majority of antivirus apps are pretty much useless, these messages are more relevant than ever. Here’s why many antivirus...

Read More

DEALING WITH CYBERSECURITY STRESS DEALING WITH CYBERSECURITY STRESS

blog article

Apr 08, 2019

You may be feeling stress at this very moment, but do you really understand what it is and where it comes from, especially as an IT Security professional? What is Stress Really? What do you consider stressful?  How do you spot stressful situations? According to WebMD, stress is: “the body...

Read More

Kaspersky Lab & Probrand Group: True partnership delivers True Cybersecurity KASPERSKY LAB & PROBRAND GROUP: TRUE PARTNERSHIP DELIVERS TRUE CYBERSECURITY

video

Apr 08, 2019

Probrand provides IT products, managed services and solutions to more than 3,500 customers, predominantly SMEs in the West Midlands and public sector organisations throughout the UK. Kaspersky Lab’s relationship with Probrand has developed over time, with its Endpoint Security for Business cyb...

Read More

Card-Scraping Malware Compromised AeroGrow Customer Payment Data CARD-SCRAPING MALWARE COMPROMISED AEROGROW CUSTOMER PAYMENT DATA

blog article

Apr 08, 2019

Ecommerce company AeroGrow International is the latest high-profile breach after its buy page was infected with credit card scraping malware for more than four months, AeroGrow announced in a letter to its customers and to the California Office of the Attorney General. The malicious code was probabl...

Read More

87% of organisations have an insufficient cyber security budget 87% OF ORGANISATIONS HAVE AN INSUFFICIENT CYBER SECURITY BUDGET

blog article

Apr 08, 2019

Although organizations are devoting more resources to cyber security in order to tackle the growing threat of data breaches, 87% say they don’t have the budget to meet their needs, a new report has found. According to the EY Global Information Security Survey 2018–19, organizations are f...

Read More

 Teamarbeit mit Cloudlösungen transformieren TEAMARBEIT MIT CLOUDLÖSUNGEN TRANSFORMIEREN

whitepaper

Apr 08, 2019

Nutzen Sie Produktivitätslösungen, die nur die Cloud bereitstellen kann. Office 365 bietet moderne, mobil einsetzbare Tools für Produktivität und Kommunikation mit Sicherheit der Enterprise-Klasse. Erfahren Sie, wie Sie: eine effektivere Zusammenarbeit und Kreativität fördern die IT-Infrastruktur un...

Read More

 A crash course in security management: the keys to a better security posture A CRASH COURSE IN SECURITY MANAGEMENT: THE KEYS TO A BETTER SECURITY POSTURE

whitepaper

Apr 08, 2019

The way you manage your data and device security is a top priority in an evolving cyberthreat landscape. Protecting your organization and improving security management starts with three key requirements: Visibility that helps you understand the security state and risks across resources Built-in sec...

Read More

 Identify weak links in your security IDENTIFY WEAK LINKS IN YOUR SECURITY

whitepaper

Apr 08, 2019

Security vulnerabilities in your company can be exploited in a number of ways, like cyberattacks or intentional breaches from within. And in an increasingly mobile world, with workers spread out geographically, working across multiple devices, the attack surface is larger than ever. Get your free s...

Read More

 E-bok: Lär dig att utforma en effektiv cyberförsvarsstrategi E-BOK: LÄR DIG ATT UTFORMA EN EFFEKTIV CYBERFÖRSVARSSTRATEGI

whitepaper

Apr 08, 2019

Få råd om hur du kan förbättra organisationens säkerhet genom att hitta ställen där säkerheten inte kommit i främsta rummet, mildra riskerna och snabbt reagera på riktade attacker. Ladda ner e-boken "Anatomy of a Breach: How Hackers Break In—and How You Can Fight Back" och läs om: de fyra stegen i e...

Read More

 Snabbkurs i Microsoft 365 Business SNABBKURS I MICROSOFT 365 BUSINESS

whitepaper

Apr 08, 2019

Se hur Microsoft 365 Business kan göra tekniken mer hanterbar och samtidigt öka produktiviteten. Upptäck bland annat olika sätt att: Bidra till att minska säkerhetsriskerna, med hjälp av ständigt aktiv säkerhet Uppnå mer tillsammans Arbeta var som helst

Read More

Making Our Security Portfolio Simpler — and Better MAKING OUR SECURITY PORTFOLIO SIMPLER — AND BETTER

blog article

Apr 07, 2019

Since its inception in 2009, Incapsula has been a proud part of Imperva, the analyst-recognized cybersecurity leader. However, cybersecurity needs are evolving, and so are we. On April 7th, we will officially retire Incapsula.com. All of the great Incapsula web site content that wasn’t already...

Read More

Remote Support Security in Cloud Whitepaper REMOTE SUPPORT SECURITY IN CLOUD WHITEPAPER

whitepaper

Apr 05, 2019

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to your organization. BeyondTrust can help your support organization stay secure and compliant, while improving the efficiency and success of your organization with ...

Read More

BEWARE – New BEWARE – NEW 'CREATIVE' PHISHING ATTACK YOU REALLY SHOULD PAY ATTENTION TO

blog article

Apr 05, 2019

A cybersecurity researcher who last month warned of a creative phishing campaign has now shared details of a new but similar attack campaign that has specifically been designed to target mobile users. Just like the previous campaign, the new phishing attack is also based on the idea that a malicious...

Read More

Mobile applications: How to reduce fraud and increase trust MOBILE APPLICATIONS: HOW TO REDUCE FRAUD AND INCREASE TRUST

blog article

Apr 05, 2019

Applications have won mobile, that’s no longer news. As most organizations leverage mobile apps to enhance their users’ online experience, the whole mobile ecosystem is evolving accordingly. Cybercriminals and greedy individuals see in applications a surface to make money out of. Governm...

Read More

IT leaders need to be wary of becoming addicted to gambling on cybersecurity IT LEADERS NEED TO BE WARY OF BECOMING ADDICTED TO GAMBLING ON CYBERSECURITY

blog article

Apr 05, 2019

Winning a bet is one of life’s little pleasures. People make bets all the time. Many people even like to place wagers on the outcome of those bets. The trouble is gambling can become an addiction. What many organizations don’t realize is just how often CISOs and CIOs are now routinely ga...

Read More

Security testers breach university cyber defences in two hours SECURITY TESTERS BREACH UNIVERSITY CYBER DEFENCES IN TWO HOURS

blog article

Apr 05, 2019

More than 50 universities in the UK have had their lack of cyber defences exposed, with security testers breaching their systems in under two hours. The tests were conducted by Jisc, the agency that provides Internet services to the UK’s universities and research centres. The organization&rsqu...

Read More

68% of Tested Antivirus Apps Put Android Users at Risk 68% OF TESTED ANTIVIRUS APPS PUT ANDROID USERS AT RISK

blog article

Apr 05, 2019

Any time a user downloads a vulnerable or malicious mobile app, they could put your organization’s data at risk. Ironically, some malicious apps masquerade as ways to improve security, which can ensnare your most well-intentioned users. Research by AV-Comparatives, and independent organization...

Read More

 9 Mission-Critical Steps to Prep for an IT Move 9 MISSION-CRITICAL STEPS TO PREP FOR AN IT MOVE

whitepaper

Apr 05, 2019

Involta is an award-winning national IT service provider and consulting firm. Involta helps organizations plan, manage and execute hybrid IT strategies using a broad range of services including colocation, cloud computing, managed IT, cybersecurity, fiber and network connectivity. Involta has indus...

Read More

Paliz, the PowerShell downloader in a ZIP and beyond PALIZ, THE POWERSHELL DOWNLOADER IN A ZIP AND BEYOND

blog article

Apr 04, 2019

Threat actors regularly come up with new techniques for malware downloaders to hide and execute their code with the expectation that they can fool antivirus solutions for some time. Paliz is an archive that carries malicious code in an unusual location. ZIP Archive Contents. This malware arrives via...

Read More

2019 SONICWALL CYBER THREAT REPORT 2019 SONICWALL CYBER THREAT REPORT

infographic

Apr 04, 2019

Know their plans. Know their attacks. Know how to stop them. A cyberattack is personal. At its core, they strip organizations, their employees, partners and customers of intellectual property, identities, privacy, reputation and monetary assets. Follow the attack trends to understand how and where c...

Read More

State of Insider Threats in the Digital Workplace REPORT 2019 STATE OF INSIDER THREATS IN THE DIGITAL WORKPLACE REPORT 2019

whitepaper

Apr 04, 2019

While cybercriminals, hacktivists, and ransomware often make a big splash in the news headlines, the reality is that the biggest security threat is often right in front of you. Insiders—people already in your organization—pose a pervasive security risk, whether their behavior is maliciou...

Read More

Unsecured databases found leaking half a billion resumes on the net UNSECURED DATABASES FOUND LEAKING HALF A BILLION RESUMES ON THE NET

blog article

Apr 04, 2019

Barely a day goes by anymore without another report of sensitive data being left accessible to anyone on Elasticsearch servers or MongoDB databases that have not been properly configured. Today is no different. As ZDNet reports, researchers have discovered several exposed servers that belong to Chin...

Read More

10 Personal Cyber Security Tips 10 PERSONAL CYBER SECURITY TIPS

infographic

Apr 04, 2019

You have just read our blog on the 10 Personal Cyber Security Tips for National Cyber Security Awareness Month. We decided to turn that blog into an infographic for your viewing pleasure! More than half of U.S. consumers are now experiencing the effects of major data breaches. Becoming "Cyber A...

Read More

Phishing Education, Training Can Reduce Healthcare Cyber Risk PHISHING EDUCATION, TRAINING CAN REDUCE HEALTHCARE CYBER RISK

blog article

Apr 04, 2019

The healthcare sector is uniquely vulnerable to phishing attacks, due to high employee turnover and influx of new employees who may lack previous cybersecurity training, according to a new report published in the Journal of the American Medical Association. William Gordon, MD of Harvard Medical Scho...

Read More

National Cybersecurity Strategies: Commitment to Development NATIONAL CYBERSECURITY STRATEGIES: COMMITMENT TO DEVELOPMENT

blog article

Apr 04, 2019

In February 2019, the Cyber Policy Institute (CPI) and APNIC agreed to work together on complementary activities, particularly in the field of cyber capacity building in the Asia Pacific region. To start a conversation with the APNIC community, we are sharing some of the conclusions about a recent a...

Read More

Making the Business Case for Web Isolation MAKING THE BUSINESS CASE FOR WEB ISOLATION

whitepaper

Apr 04, 2019

The business case for any security system has an assumption that something fails. The cost of a failure includes fines and remediation efforts but also less obvious ones such as lost productivity and the loss of public trust in your brand. This white paper, Making the Business Case for Web Isolation...

Read More

Isolation: A Part of the Modern Security Architecture ISOLATION: A PART OF THE MODERN SECURITY ARCHITECTURE

whitepaper

Apr 04, 2019

Security architectures have evolved over the years as the threat landscape has changed, and isolation could improve your security posture more than any other technology available today. Isolation has the potential to do more for your security than AI, threat intelligence or pen testing. Download thi...

Read More

How to Spot a Fake Android App HOW TO SPOT A FAKE ANDROID APP

infographic

Apr 03, 2019

Most of us know to think twice before downloading a mobile app from a source other than Google Play™. But not everything from there is safe, either. Researchers have discovered hundreds of fraudulent Android apps that can compromise your security and privacy. Consult this infographic to know s...

Read More

Phishing Attacks – What is Phishing? PHISHING ATTACKS – WHAT IS PHISHING?

blog article

Apr 03, 2019

Although phishing attacks can occur against individuals, we will primarily focus on attacks against organizations in this post.  We will use the term organization to represent governments, educational and healthcare institutions, and commercial businesses, but we will draw distinctions in the &...

Read More

MICROSOFT SECURITY INTELLIGENCE REPORT: ASIA PACIFIC CYBER THREAT LANDSCAPE MICROSOFT SECURITY INTELLIGENCE REPORT: ASIA PACIFIC CYBER THREAT LANDSCAPE

infographic

Apr 03, 2019

As cyberattacks continue to increase in frequency and sophistication, understanding prevalent cyberthreats and how to mitigate their impact has become an imperative for every individual and organization in Asia Pacific.

Read More

Hijacked Email Reply Chains HIJACKED EMAIL REPLY CHAINS

blog article

Apr 03, 2019

Although phishing has been around in various forms since the 1980s, our research shows it continues to evolve—and remains a major threat. These days, phishing tactics have gotten so sophisticated, it can be difficult to spot a scam—particularly in the case of hijacked email reply chains....

Read More

Different Types of Cyber Attacks DIFFERENT TYPES OF CYBER ATTACKS

infographic

Apr 03, 2019

Different Types of 11 CYBER ATTACKS. An important part et protecting your business from potential cyber-attack is to understand the threat landscape. This infographic outlines the common cyber-attacks likely to affect your business, with the aim of helping you detect and prevent these attacks stokin...

Read More

Not just for Processing: How Kafka Streams as a Distributed Database Boosted our Reliability and Reduced Maintenance NOT JUST FOR PROCESSING: HOW KAFKA STREAMS AS A DISTRIBUTED DATABASE BOOSTED OUR RELIABILITY AND REDUCED MAINTENANCE

blog article

Apr 03, 2019

The Apache Kafka Streams library is used by enterprises around the world to perform distributed stream processing on top of Apache Kafka. One aspect of this framework that is less talked about is its ability to store local state, derived from stream processing. In this blog post we describe how we t...

Read More

Alarming Cyber Security Facts and Stats ALARMING CYBER SECURITY FACTS AND STATS

infographic

Apr 03, 2019

One of the biggest challenges that humankind will face in the next two decades is cyber-attacks. With each passing day cyberattack grow globally in size, sophistication and cost. And no one seems immune from the potential risk of cyber-attacks. Ransomware is becoming a global phenomenon and cryptocu...

Read More

How to manage web application security with Coverity HOW TO MANAGE WEB APPLICATION SECURITY WITH COVERITY

blog article

Apr 03, 2019

Organizations in many industries use web applications to collect and handle information such as credit card numbers, emails, and customer behavior data. They rely on these web apps to run their businesses and gain a competitive edge. Clearly, many organizations are enjoying the automation and wealth...

Read More

INSIDER THREAT PROTECTION: HOW ORGANIZATIONS ADDRESS THE INEVITABLE INSIDER THREAT PROTECTION: HOW ORGANIZATIONS ADDRESS THE INEVITABLE

blog article

Apr 03, 2019

At Mimecast we are blessed to have more than 33,000 customers for our email security, archiving, web security and security awareness training services. And staying connected and engaged with these customers is key to our mutual success. But how best to do this? TechValidate While there is no one way...

Read More

SANS Reviews the CB Predictive Security Cloud SANS REVIEWS THE CB PREDICTIVE SECURITY CLOUD

blog article

Apr 03, 2019

Understanding the Landscape. Day by day, it is becoming more challenging to keep endpoints secure. In the SANS “Endpoint Protection and Response” survey from 2018, 42% of respondents indicated at least one of their endpoints had been compromised, and another 20% didn’t know if any ...

Read More

How to Recover Your Gmail, Facebook or Yahoo Account [Updated 2019] HOW TO RECOVER YOUR GMAIL, FACEBOOK OR YAHOO ACCOUNT [UPDATED 2019]

blog article

Apr 03, 2019

So you just got hacked and lost access to your email or social media account. What now? First, let’s start with what you shouldn’t do: panic. You’re not the first person to go through this, and you will not be the last. Big companies know this and have come up with ways for you to ...

Read More

Toyota suffers second data breach in five weeks TOYOTA SUFFERS SECOND DATA BREACH IN FIVE WEEKS

blog article

Apr 03, 2019

Toyota has disclosed a data breach that may have affected up to 3.1 million customers. It’s the second time the car manufacturer has been breached in the last five weeks. In a statement released on 29 March 2019, the organisation confirmed that several of its Asian subsidiaries were targeted b...

Read More

Tax-themed Email Campaigns Target 2019 Filers TAX-THEMED EMAIL CAMPAIGNS TARGET 2019 FILERS

blog article

Apr 03, 2019

Every year, Proofpoint observes a seasonal uptick in tax-related malware and phishing campaigns leading up to annual tax filing deadlines. In 2017, these campaigns focused on phishing and increasingly sophisticated social engineering, as well as banking Trojans and ransomware. In 2018, we observed s...

Read More

IBM Resiliency Orchestration with Cyber Incident Recovery IBM RESILIENCY ORCHESTRATION WITH CYBER INCIDENT RECOVERY

whitepaper

Apr 03, 2019

Cyberattacks continue to plague organizations of all sizes. While IT security teams are getting better at preventing cyberattacks from happening, attacks remain a matter of “when” one will occur (if it hasn’t already) rather than “if” it will happen. A business disrupti...

Read More

 Remote Access and Security Challenges & Opportunities REMOTE ACCESS AND SECURITY CHALLENGES & OPPORTUNITIES

whitepaper

Apr 03, 2019

Remote access is important and growing, but how secure is it? IDC Research surveyed more than 300 IT professionals to gain insight into the specific threats and challenges faced by providing access to employees and third parties. Read this report to learn about: How secure remote access really is T...

Read More

 Enforce a Zero Trust Security Model in Today ENFORCE A ZERO TRUST SECURITY MODEL IN TODAY'S HOSTILE ENVIRONMENT

whitepaper

Apr 03, 2019

Companies of all types are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new cloud and DevOps workflows to build their digital business, security has not kept pace. As infrastru...

Read More

Malware Campaigns Sharing Network Resources: r00ts.ninja MALWARE CAMPAIGNS SHARING NETWORK RESOURCES: R00TS.NINJA

blog article

Apr 02, 2019

We recently noticed an interesting example of network infrastructure resources being used over a period of time by more than one large scale malware campaign (e.g redirected traffic, cryptomining). This was discovered when reviewing sources of the various malicious domains used in a recent WordPress...

Read More

Vulnerability Management Metrics: The Final Frontier VULNERABILITY MANAGEMENT METRICS: THE FINAL FRONTIER

blog article

Apr 02, 2019

Operational Vulnerability Reports. An alarming yet common trend among organizations is to run a report that contains all the vulnerabilities under a particular system-owner and send them a very large report. Some organizations have matured beyond this point to provide reports that include everything...

Read More

Emerson Hospital Reports Third-party Vendor Breach from May 2018 EMERSON HOSPITAL REPORTS THIRD-PARTY VENDOR BREACH FROM MAY 2018

blog article

Apr 02, 2019

Concord, Massachusetts-based Emerson Hospital is notifying 6,300 patients that their data was potentially breached nearly one year ago, due to insider wrongdoing at one of its vendors. According to a statement released on March 8, the data breach occurred during a weeklong period from May 9 to May 1...

Read More

Coding bootcamps need to get real about secure coding practices CODING BOOTCAMPS NEED TO GET REAL ABOUT SECURE CODING PRACTICES

blog article

Apr 02, 2019

It’s no secret that the world of software development has been thrust into the spotlight recently. Tech startups are popping up in “innovation districts” in cities around the world. And single-product software giants are growing floor by floor in some of the nation’s most exp...

Read More

PHISHER PLEADS GUILTY IN SCAM TARGETING HIGH-PROFILE CELEBRITIES, ATHLETES PHISHER PLEADS GUILTY IN SCAM TARGETING HIGH-PROFILE CELEBRITIES, ATHLETES

blog article

Apr 02, 2019

A phishing scam perpetrated by a man stealing sensitive personal information from high-profile individuals should provide a warning sign to organizations of all sizes: this could happen to you without the right safeguards in place. According to a report in Dark Reading, a Dacula, Ga. resident named ...

Read More

 Boostez votre efficacité commerciale avec la signature électronique BOOSTEZ VOTRE EFFICACITÉ COMMERCIALE AVEC LA SIGNATURE ÉLECTRONIQUE

whitepaper

Apr 02, 2019

En vous offrant une meilleure visibilité sur le statut des différents contrats et en vous permettant d’une part de collecter des informations, afin de supprimer la nécessité de ressaisir les données, et d’autre part d’envoyer des rappels, la signature électronique vous permet de vous concentrer sur...

Read More

 The Best of Akamai’s Security Research and Intelligence from 2018 THE BEST OF AKAMAI’S SECURITY RESEARCH AND INTELLIGENCE FROM 2018

whitepaper

Apr 02, 2019

Take a look back at the most important and impactful news and research from 2018. The State of the Internet / Security: A Year in Review report helps you prepare for the year ahead by summarizing the trends, attacks, and security events that indicate how the threat landscape is evolving. The report ...

Read More

 A Comprehensive and Achievable Guide to Less Risk A COMPREHENSIVE AND ACHIEVABLE GUIDE TO LESS RISK

whitepaper

Apr 02, 2019

Contrary to current perception, you are not safe behind the perimeter — because the perimeter itself no longer exists. Traditional hub-and-spoke networking architectures, and the castle-and-moat security they utilize, aren’t amenable for today’s burgeoning cloud-and-mobile world. This is a problem ...

Read More

 엣지 보안이 필요한 7 가지 이유 엣지 보안이 필요한 7 가지 이유

whitepaper

Apr 02, 2019

복잡하고 끊임없이 변화하는 오늘날의 디지털 생태계에서 공격의 취약점을 줄이고 보안 운영을 더욱 단순화하도록 설계된 지능적이고 완벽한 보안 전략이 필요합니다. 이 보안 백서에서는 보안 전략을 최우선 과제로 삼아야하는 7 가지 이유를 설명합니다.

Read More

 ???:???????????? ???:????????????

whitepaper

Apr 02, 2019

??????????????????????????????,????????????,????????????????????????????????????? ??????????????,??????????????,??????????????????,???????????????: - ??????????? - ?????????????????? - ???????????

Read More

 ?????????????? ??????????????

whitepaper

Apr 02, 2019

??????????????????,?????????,?????????,???????????????????????,???????????7????

Read More

One-Minute Whitepaper: Anatomy of Account Takeover Attacks ONE-MINUTE WHITEPAPER: ANATOMY OF ACCOUNT TAKEOVER ATTACKS

whitepaper

Apr 02, 2019

Learn the most common methods used to execute account takeover attacks and what an organization can do to protect against them.

Read More

C-LEVEL FRAUD AND SPEAR-PHISHING ACROSS INTERNATIONAL BOUNDARIES C-LEVEL FRAUD AND SPEAR-PHISHING ACROSS INTERNATIONAL BOUNDARIES

blog article

Apr 01, 2019

Cave drawing found in southern France showing early spear-fishing have been dated back 16,000 years, and whaling has been practiced as an organized industry as early as 875 AD. While spear-fishing started out as an effective way to provide sustenance for early man and whaling started out as a means ...

Read More

The 4 Most Common Lures of Phishing Attacks THE 4 MOST COMMON LURES OF PHISHING ATTACKS

infographic

Apr 01, 2019

This infographic from Inspired eLearning covers the most common types of phishing attacks. Whether its through email, phone call, text message, or USB baiting, learn about how these attacks can occur, common statistics, and prevention tips.

Read More

Oracle Cloud Access Security Broker Demo ORACLE CLOUD ACCESS SECURITY BROKER DEMO

video

Apr 01, 2019

Using Oracle Cloud Access Security Broker, blend third-party data, apply machine learning, and forecast the best course of action.

Read More

How to be Secure in the Challenging Business Landscape HOW TO BE SECURE IN THE CHALLENGING BUSINESS LANDSCAPE

blog article

Apr 01, 2019

Data security is far from a side issue, of interest only to big players. On the contrary, it applies in equal measure to start-ups, small- and medium-sized enterprises, and global consortia. Even though the scale of issues each of these need to grapple with is completely different, security should b...

Read More

The Value of Threat Intelligence Feeds for Web Apps THE VALUE OF THREAT INTELLIGENCE FEEDS FOR WEB APPS

blog article

Mar 31, 2019

Because the threat landscape is constantly evolving and more volatile than ever, businesses need a solution that can keep up with the known threats that target their web-facing applications and services. New cyberthreats are hitting the market at an alarming rate. Emerging botnets like DrainerBot an...

Read More

Cisco AMP for Endpoints: Exploit Prevention CISCO AMP FOR ENDPOINTS: EXPLOIT PREVENTION

whitepaper

Mar 30, 2019

Memory attacks penetrate via endpoints and malware evades security defenses by exploiting vulnerabilities in applications and operating system processes. A majority of these attacks operate in the memory space of the exploited application and remain untouched by most security solutions once they gai...

Read More

10 Cybersecurity Myths That You Need to Know About 10 CYBERSECURITY MYTHS THAT YOU NEED TO KNOW ABOUT

infographic

Mar 29, 2019

If there is one thing that a business needs to focus on more than anything else particularly in the modern era, it is cybersecurity. The fact of the matter is that your data is often your most precious resource, so figuring out a way that make cybersecurity your top priority is something that you sh...

Read More

Turning Data into Metrics: A Vulnerability Management Story TURNING DATA INTO METRICS: A VULNERABILITY MANAGEMENT STORY

blog article

Mar 29, 2019

Cybersecurity Metrics in Business Context. As such, we as security professionals need to ensure we are providing data to the business, so they understand what it is we do and how it is we go about protecting them. The question herein is: What metrics should we provide? As technical folks, it’s...

Read More

2019 CYBERTHREAT DEFENSE REPORT 2019 CYBERTHREAT DEFENSE REPORT

infographic

Mar 29, 2019

CyberEdge Group’s sixth annual Cyberthreat Defense Report reveals how IT security professionals perceive the security posture of their organizations, the challenges they face in establishing e ective cyberthreat defenses, and the plans they have to overcome those challenges. Read on to learn a...

Read More

Here Are the Free Ransomware Decryption Tools You Need to Use HERE ARE THE FREE RANSOMWARE DECRYPTION TOOLS YOU NEED TO USE

blog article

Mar 29, 2019

If your computer gets infected with ransomware, follow the steps below to recover your data: Step 1: Do not pay the ransom because there is no guarantee that the ransomware creators will give you access to your data. Step 2: Find any available backups you have, and consider keeping your data backups...

Read More

Do your employees care about cyber security? DO YOUR EMPLOYEES CARE ABOUT CYBER SECURITY?

blog article

Mar 29, 2019

A recent report has found that just 15% of IT decision makers in small organisations “completely agree” that their employees have a good understanding of cyber security, and 20% believe their employees don’t care about cyber security at all. What’s more worrying is that despi...

Read More

Data Protection Regulations in Latin America DATA PROTECTION REGULATIONS IN LATIN AMERICA

blog article

Mar 28, 2019

The EU’s General Data Protection Regulation (GDPR) has created a domino effect across the world as its biggest trade partners rushed to align their existing data protection legislations to its strict requirements or passed new laws based on its example, in hopes of ensuring business operations...

Read More

Speed, Privacy, and Control on the Web SPEED, PRIVACY, AND CONTROL ON THE WEB

whitepaper

Mar 28, 2019

More than ever before, the discussion of network security is intersecting with the interests of business, government, and popular media. The Transport Layer Security (TLS) protocol is perhaps the best modern example of this. There are stakeholders on all sides who demand both a secure end-to-end con...

Read More

What are Man in the Middle Attacks & How to Prevent MITM Attack With Examples WHAT ARE MAN IN THE MIDDLE ATTACKS & HOW TO PREVENT MITM ATTACK WITH EXAMPLES

blog article

Mar 28, 2019

What is a Man in the Middle Attack? How Does it Work? A Man-in-the-Middle (MITM) attack happens when a hacker inserts themselves between a user and a website. This kind of attack comes in several forms. For example, a fake banking website may be used to capture financial login information. The fake ...

Read More

How to protect sensitive data by managing your risk HOW TO PROTECT SENSITIVE DATA BY MANAGING YOUR RISK

blog article

Mar 28, 2019

No organization wants its applications to contain vulnerabilities that enable the theft of its sensitive data. The potential for brand damage, legal liability, compliance sanctions, and loss of business could be crippling. But no organization can spend all its time and money making its applications ...

Read More

Mergers and Acquisitions: When Their Attack Surface Becomes Your Attack Surface MERGERS AND ACQUISITIONS: WHEN THEIR ATTACK SURFACE BECOMES YOUR ATTACK SURFACE

blog article

Mar 28, 2019

When it comes to cybersecurity, mergers and acquisitions (M&As) are like a marriage. When two companies walk down the aisle together, one’s cybersecurity problems become the other’s baggage—whether they disclose it or not. The first half of 2018 saw $2.5 trillion in mergers in ...

Read More

Cyber Security Edge Analytics CYBER SECURITY EDGE ANALYTICS

blog article

Mar 28, 2019

For most, “analytics” represents a broad term, and rightfully so. As the prevailing winds of digital transformation continue to push interconnection to the digital edge, a plethora of real-time analytics requirements (and capabilities) have irreversibly raised the ante for immediately av...

Read More

Why Virus Protection for Android is Needed Today? WHY VIRUS PROTECTION FOR ANDROID IS NEEDED TODAY?

blog article

Mar 28, 2019

How does malware infect Android smartphones? The location and behavior of the user are two main influential factors that provide opportunities for hackers to infect Android devices. Hackers disguise android malware as legitimate mobile applications on websites and app stores. Unknowingly, users down...

Read More

ASUS pushes out urgent security update after attackers hacked its automatic Live Update tool ASUS PUSHES OUT URGENT SECURITY UPDATE AFTER ATTACKERS HACKED ITS AUTOMATIC LIVE UPDATE TOOL

blog article

Mar 27, 2019

Taiwan-based technology giant ASUS is advising concerned customers to run a newly-created diagnostic tool on their Windows computers after hackers pushed out malware to what some security researchers have estimated to be as many as one million PCs using ASUS’s own Live Update software tool. As...

Read More

Threat hunting with Cisco THREAT HUNTING WITH CISCO

video

Mar 27, 2019

Combine Cisco endpoint security, malware analysis, and DNS protection with Cisco Threat Response, and users go from exposed to empowered in seconds. To learn more, visit: http://cs.co/6052EwMEi.

Read More

The cyber-physical convergence is accelerating—and so are the risks THE CYBER-PHYSICAL CONVERGENCE IS ACCELERATING—AND SO ARE THE RISKS

blog article

Mar 27, 2019

The fact that a cyber attack can have physical consequences is not exactly breaking news. The use of the computer worm Stuxnet to destroy nearly a thousand, or about a fifth, of the centrifuges in Iran’s Natanz nuclear enrichment facility is now a decade in the rearview. The warnings of a &ldq...

Read More

Data Breach Liabilities - PCI Penalties, GDPR and a Warranty DATA BREACH LIABILITIES - PCI PENALTIES, GDPR AND A WARRANTY

blog article

Mar 27, 2019

Data breaches seem to be a regular feature in the news nowadays, especially since GDPR regulation kicked in last year. This higher frequency of articles announcing newly-hacked-victim-organizations gives an idea of the growing scale of the security problem - a trend that we have been talking and war...

Read More

SUPPLY-CHAIN ATTACKS IN THE REAL WORLD: BRIDGING THE CYBER DIVIDE SUPPLY-CHAIN ATTACKS IN THE REAL WORLD: BRIDGING THE CYBER DIVIDE

blog article

Mar 27, 2019

Any business in the B2B space is part of a supply chain, whether you feed into larger businesses or those larger businesses feed into you. If you find yourself as a smaller business feeding into larger ones, you are more susceptible to attacks than some in your organization may think. In a previous ...

Read More

How to Avoid Being a Victim of Scam Phone Calls HOW TO AVOID BEING A VICTIM OF SCAM PHONE CALLS

blog article

Mar 27, 2019

Scam phone calls are anything but new. You may even think they’ve almost become extinct. Even if it’s great to watch them decrease year by year, we hate to admit they are still happening. One day you may get a call from a friendly and overly-polite support technician, who claims your com...

Read More

Healthcare Phishing Statistics: 2019 HIMSS Survey Results HEALTHCARE PHISHING STATISTICS: 2019 HIMSS SURVEY RESULTS

blog article

Mar 27, 2019

In the healthcare industry, phishing is the initial point of compromise in most significant security incidents, according to a recent report from the Healthcare Information and Management Systems Society (HIMSS). And yet, 18% of healthcare organizations fail to conduct phishing tests, a finding HIMS...

Read More

There’s No Day Off for Cybersecurity Professionals THERE’S NO DAY OFF FOR CYBERSECURITY PROFESSIONALS

blog article

Mar 27, 2019

The last 12 months saw large corporations, from hotels to internet giants, hit the headlines after suffering crippling data breaches—and it seems like this pattern is set to continue in the coming years. The sheer magnitude and frequency of these attacks is evidence that no matter the size or ...

Read More

ARE YOU A VICTIM OF A CYBER ATTACK? ARE YOU A VICTIM OF A CYBER ATTACK?

infographic

Mar 27, 2019

The digitally progressing world is posing as a roadmap to a number of cyberattacks. Anyone and everyone whose data has an online presence are susceptible to these cyber threats. These threats are just inexorable. Bringing awareness to them will help with understanding the severity of the situation. ...

Read More

How to Deliver on DevSecOps While Winning Support from the DevOps Team HOW TO DELIVER ON DEVSECOPS WHILE WINNING SUPPORT FROM THE DEVOPS TEAM

blog article

Mar 27, 2019

As an engineering leader for more than 20 years, I’ve experienced the journey from waterfall to agile to DevOps and now DevSecOps with my teams. While much has been written about the DevSecOps movement from the perspective of developer and security professionals, I aim to share insight from a ...

Read More

Location data leaks from family tracking app database LOCATION DATA LEAKS FROM FAMILY TRACKING APP DATABASE

blog article

Mar 27, 2019

An app called Family Locator, which allows family members to keep track of one another recently experienced an exposed database issue of the worst kind. Specifically: the MongoDB database was left exposed with no password, like so many other recent infosec tales of woe. The end result is the locatio...

Read More

Plugin vulnerabilities exploited in traffic monetization schemes PLUGIN VULNERABILITIES EXPLOITED IN TRAFFIC MONETIZATION SCHEMES

blog article

Mar 26, 2019

In their Website Hack Trend Report, web security company Sucuri noted that WordPress infections rose to 90 percent in 2018. One aspect of Content Management System (CMS) infections that is sometimes overlooked is that attackers not only go after the CMSes themselves—WordPress, Drupal, etc.&mda...

Read More

Navigating the Asia Pacific Cybersecurity Landscape, Needs and Trends NAVIGATING THE ASIA PACIFIC CYBERSECURITY LANDSCAPE, NEEDS AND TRENDS

video

Mar 26, 2019

Stephen Dane, Managing Director, Global Security Sales Organization, APJC, sheds light on the cybersecurity business challenges, needs and opportunities in Asia Pacific by deep diving into Cisco's latest CISO Benchmark Study.

Read More

DDoS Protection Requires Looking Both Ways DDOS PROTECTION REQUIRES LOOKING BOTH WAYS

blog article

Mar 26, 2019

Service availability is a key component of the user experience. Customers expect services to be constantly available and fast-responding, and any downtime can result in disappointed users, abandoned shopping carts, and lost customers. Consequently, DDoS attacks are increasing in complexity, size and...

Read More

 EMA: Defining the Future of Network Visibility Fabrics EMA: DEFINING THE FUTURE OF NETWORK VISIBILITY FABRICS

whitepaper

Mar 26, 2019

Security and network performance tools are unable to or weren’t built to handle and analyze traffic at higher bandwidths. Read Enterprise Management Associates new research report, “Next Generation Network Packet Brokers: Defining the Future of Network Visibility Fabrics” to learn how to reduce unne...

Read More

 Security at the Speed of Your Network SECURITY AT THE SPEED OF YOUR NETWORK

whitepaper

Mar 26, 2019

Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a ce...

Read More

How to Choose a Website Security Provider HOW TO CHOOSE A WEBSITE SECURITY PROVIDER

blog article

Mar 25, 2019

As more people are creating websites and becoming aware of website security, companies are popping up everywhere to help with the problem. And just like website security plugins, not all website security services are created equal. Here at Sucuri, we believe that you should do your website security ...

Read More

Cisco and Dimension Data: Protecting businesses CISCO AND DIMENSION DATA: PROTECTING BUSINESSES

video

Mar 25, 2019

Dimension Data and Cisco provide industry-leading cybersecurity technologies and services that protect clients against evolving threats.

Read More

Some aspects of info security haven SOME ASPECTS OF INFO SECURITY HAVEN'T CHANGED MUCH IN THEORY

blog article

Mar 25, 2019

You may be interested to know that most every modern cybersecurity technique used today is based on methodologies developed and used thousands of years ago. So, in the spirit of those who don’t know their past are doomed to repeat it, let’s look at how modern cybersecurity has evolved fr...

Read More

3059 android malware detected per day in 2018 – Are you still counting on free android antivirus for protection? 3059 ANDROID MALWARE DETECTED PER DAY IN 2018 – ARE YOU STILL COUNTING ON FREE ANDROID ANTIVIRUS FOR PROTECTION?

blog article

Mar 22, 2019

The incidents of cyber-attacks on smartphones, especially those working on the popular Android operating system, have been on a constant rise. However, a major reason people still continue to go in for android smartphones, is the fact that these are mostly cheap to buy. However, the year 2018 ended ...

Read More

Don’t Let Cloud Threats Rain on Your Parade DON’T LET CLOUD THREATS RAIN ON YOUR PARADE

blog article

Mar 22, 2019

Our recent blog post detailing how cybercriminals compromise cloud accounts provides crucial insight into attacks on Microsoft Office 365 and Google G Suite specifically.  40% of all tenants have at least one compromised account in their environment as a result of these brute force and phishing...

Read More

Researchers go hunting for Netflix’s Bandersnatch RESEARCHERS GO HUNTING FOR NETFLIX’S BANDERSNATCH

blog article

Mar 22, 2019

A new research paper from the Indian Institute of Technology Madras explains how popular Netflix interactive show Bandersnatch could fall victim to a side-channel attack. In 2016, Netflix began adding TLS (Transport Layer Security) to their video content to ensure strangers couldn’t eavesdrop ...

Read More

Facebook Password Breach: What You Need to Know FACEBOOK PASSWORD BREACH: WHAT YOU NEED TO KNOW

blog article

Mar 22, 2019

Yesterday Facebook disclosed during a routine security review they discovered “some” user passwords were being stored unencrypted, but the passwords were not visible to anyone outside of Facebook. Facebook’s definition of “some” doesn’t really illustrate the full ...

Read More

Millions of Facebook Passwords Kept in Plain Text for Employees to Access MILLIONS OF FACEBOOK PASSWORDS KEPT IN PLAIN TEXT FOR EMPLOYEES TO ACCESS

blog article

Mar 22, 2019

Perhaps we should all change our Facebook passwords to play it safe, following news that Facebook kept, from as early as 2012, “hundreds of millions” of user account passwords in plain text, making them available to some 20,000 employees, writes KrebsOnSecurity following a tip from a sou...

Read More

North Carolina’s Orange County Hit by Third Ransomware Attack in Six Years NORTH CAROLINA’S ORANGE COUNTY HIT BY THIRD RANSOMWARE ATTACK IN SIX YEARS

blog article

Mar 22, 2019

Orange County in North Carolina suffered its third ransomware infection in six years, the local government announced on its website on Monday. The attack, probably stemming from a phishing email, a very common practice in such situations, crippled the county’s IT infrastructure and left a numb...

Read More

Cyber Attacks on Financial Institutions are the Modern-Day Bank Robbery CYBER ATTACKS ON FINANCIAL INSTITUTIONS ARE THE MODERN-DAY BANK ROBBERY

blog article

Mar 22, 2019

The financial sector has long been a target of cyber thieves. But despite their robust security postures, they continue to be the focus of some of the most innovative attack campaigns. Cybercriminals are laser focused on crafting attacks that will yield the most amount of revenue for the least amoun...

Read More

Password Security : 3 Helpful Tips To Make Your Passwords As Secure As Possible PASSWORD SECURITY : 3 HELPFUL TIPS TO MAKE YOUR PASSWORDS AS SECURE AS POSSIBLE

blog article

Mar 22, 2019

Today, almost everyone is on the internet, yet many people still have not learned lessons about securing online passwords. Password security is a legitimate issue, and if you overlook it, it could put you at great risks. While advanced techniques such as fingerprints and facial recognition have beco...

Read More

When Is a Data Breach a Data Breach? WHEN IS A DATA BREACH A DATA BREACH?

blog article

Mar 21, 2019

A data breach remains a common headline in the news cycle. A different company, website or social network reports a security issue almost daily. If it feels like using the internet has become a risky endeavor, the feeling is accurate. But what exactly classifies an event as a data breach? The world ...

Read More

Mobile security event collection for SIEM software MOBILE SECURITY EVENT COLLECTION FOR SIEM SOFTWARE

blog article

Mar 21, 2019

Maintaining a safe digital framework can be a tricky task for large organizations’ IT teams. To help them, some solutions such as security information and event management (SIEM) softwares are specifically designed to group and analyze large amounts of data and make them comprehensible at a hu...

Read More

Want to secure your apps? Build security in with the right toolchain WANT TO SECURE YOUR APPS? BUILD SECURITY IN WITH THE RIGHT TOOLCHAIN

blog article

Mar 21, 2019

Is it worth making more than a minimal effort to avoid data breaches? The answer ought to be obvious by now. As Tim Mackey, technical evangelist at Synopsys, noted at RSA Conference in San Francisco in early March, data breaches are “serious business.” The price that breached companies p...

Read More

Digital Vision for Cybersecurity DIGITAL VISION FOR CYBERSECURITY

whitepaper

Mar 21, 2019

Atos Digital Vision series aims to provide a thoughtful and informed view of the opportunities brought about by digital services. It demonstrates how these opportunities are being harnessed by governments, markets and businesses to help deliver innovative solutions that benefit their customers and c...

Read More

Evotech Solution Delivers Value with Oracle Infrastructure EVOTECH SOLUTION DELIVERS VALUE WITH ORACLE INFRASTRUCTURE

video

Mar 21, 2019

Evotech Solution is a technology integrator in Peru and Chile that, through Oracle Converged Infrastructure offerings, has been able to improve performance and security while reducing costs for clients.

Read More

Are hackers gonna hack anymore? Not if we keep reusing passwords ARE HACKERS GONNA HACK ANYMORE? NOT IF WE KEEP REUSING PASSWORDS

blog article

Mar 21, 2019

Enterprises have a password problem, and it’s one that is making the work of hackers a lot easier. From credential stuffing to brute force and password spraying attacks, modern hackers don’t have to do much hacking in order to compromise internal corporate networks. Instead, they log in ...

Read More

Why you need to start thinking about supply chain cyber security WHY YOU NEED TO START THINKING ABOUT SUPPLY CHAIN CYBER SECURITY

blog article

Mar 21, 2019

A lot of businesses are already addressing the need to have an understanding of their own cyber security risks and looking at measures to ensure that their business is suitably protected.  The next step on the road to managing your cyber security is to think about your supply chain and whether ...

Read More

Security Leadership Series: You Know Cybersecurity is More Than Compliance. But, Do They? SECURITY LEADERSHIP SERIES: YOU KNOW CYBERSECURITY IS MORE THAN COMPLIANCE. BUT, DO THEY?

blog article

Mar 21, 2019

How do you know if your cybersecurity program is truly working? That’s the million-dollar (or for most businesses, the tens-of-thousands of dollar) question. And, if you’re lucky enough to be able to dedicate resources to your organization’s cybersecurity program, this is an import...

Read More

WOW, Phishing Attacks Are Now More Common Than Malware WOW, PHISHING ATTACKS ARE NOW MORE COMMON THAN MALWARE

blog article

Mar 21, 2019

Microsoft’s security team is uniquely positioned to analyze trends in cyber security threats. Their frequent Security Intelligence Reports (SIR) are an excellent indicator of these trends. Redmond's numbers are based on their internal scan of O365 email addresses. Get the latest SIR here. ...

Read More

THE HOTTEST CYBERSECURITY SKILLS OF 2019 THE HOTTEST CYBERSECURITY SKILLS OF 2019

blog article

Mar 21, 2019

Cybersecurity Ventures estimated 3.5 million unfilled cybersecurity jobs by 2021, and the United States is moving on pace to hit half-a-million or more unfilled cybersecurity positions by 2021. [1] We are just a couple of months into 2019, and looking at the above statistics, we can expect to have m...

Read More

HTTPS: Privacy vs. Security, and Where End Users and Security Culture Fit In HTTPS: PRIVACY VS. SECURITY, AND WHERE END USERS AND SECURITY CULTURE FIT IN

blog article

Mar 20, 2019

Since the dawn of IT, there’s been a very consistent theme among admins: end users are the weakest link in your network, organization, security strategy, fill-in-the-blank. We’ve all heard the stories, and even experienced them first-hand. An employee falls for a phishing scam and the wh...

Read More

Data Centric Security Infrastructure DATA CENTRIC SECURITY INFRASTRUCTURE

whitepaper

Mar 20, 2019

Hybrid environments give new challenges to information compliance and security groups. The dynamic nature of knowledge, users, and applications need extra measures to confirm that the organization’s critical information is tracked, understood, and guarded continually. The risks aren't theo...

Read More

Is the Private or Public Cloud Right for Your Business? IS THE PRIVATE OR PUBLIC CLOUD RIGHT FOR YOUR BUSINESS?

blog article

Mar 20, 2019

It wasn’t a very long time ago when cloud computing was a niche field that only the most advanced organizations were dabbling with. Now the cloud is very much the mainstream, and it is rare to find a business that uses IT that doesn’t rely on it for a part of its infrastructure. But if y...

Read More

How to Become a Bug Bounty Hunter : Zerodium offers $500K for a Hyper-V Zero-Day HOW TO BECOME A BUG BOUNTY HUNTER : ZERODIUM OFFERS $500K FOR A HYPER-V ZERO-DAY

blog article

Mar 20, 2019

A zero-day vulnerability is the name given to a newly-identified software security flaw. If left unfixed, it offers hackers the opportunity to create a ​package designed to specifically target that bug in order to compromise user systems. This type of ​package is known as a zero-day exploit.

Read More

Here are 10 Reasons why Cyber Security Needs to be Top Priority in 2019 HERE ARE 10 REASONS WHY CYBER SECURITY NEEDS TO BE TOP PRIORITY IN 2019

infographic

Mar 20, 2019

Cybercrime is on the rise! Every year, more and more incidents are registered and with attacks becoming more complex and devastating, it is becoming even harder for organizations to keep up with cybercriminals. The damages caused by a cyber attack goes far beyond revenue loss. We are amidst a digita...

Read More

Network Security IPv6 Security for IPv4 Engineers NETWORK SECURITY IPV6 SECURITY FOR IPV4 ENGINEERS

whitepaper

Mar 20, 2019

This document provides an overview of IPv6 security that is specifically aimed at IPv4 engineers and operators. Rather than describing IPv6 in an isolated manner, it aims to re-use as much of the existing IPv4 knowledge and experience as possible. It highlights the security issues that affect both p...

Read More

Consumers May Lose Sleep Over These Two New Magecart Breaches CONSUMERS MAY LOSE SLEEP OVER THESE TWO NEW MAGECART BREACHES

blog article

Mar 20, 2019

We’ve seen Magecart conduct numerous high-profile digital credit card-skimming attacks against major international companies like British Airways, Ticketmaster, and Newegg. These Magecart groups have won unprecedented attention for themselves. Security professionals have Magecart firmly on the...

Read More

Cloud Database Security—What Is There to Know? CLOUD DATABASE SECURITY—WHAT IS THERE TO KNOW?

blog article

Mar 20, 2019

The recent Oracle and KPMG Cloud Threat Report 2019 uncovers some interesting facts about cloud database security: 73% of respondents feel the public cloud is more secure than what they can deliver in their own data center and are moving to the cloud. 71% of organizations indicated that a majority o...

Read More

How the GDPR Raises Public Awareness About Privacy HOW THE GDPR RAISES PUBLIC AWARENESS ABOUT PRIVACY

blog article

Mar 20, 2019

Data privacy rights have advanced since the European Union’s General Data Protection Regulation (GDPR) rules took effect nearly a year ago in May 2018. GDPR outlines privacy protection and control for EU citizens and requires companies to notify users about their data collection practices and ...

Read More

Building Holistic Security Into your DevOps and Throughout your Organization BUILDING HOLISTIC SECURITY INTO YOUR DEVOPS AND THROUGHOUT YOUR ORGANIZATION

blog article

Mar 20, 2019

The motivation to introduce DevOps in most organizations is to increase the speed by which feature enhancements and new developments are brought to users in a way that aligns with business goals. Speed, in and of itself, is not a bad motivation; especially when aligned with business goals that inclu...

Read More

MOVING EMAIL TO THE CLOUD? CYBER RESILIENCE IS A MUST MOVING EMAIL TO THE CLOUD? CYBER RESILIENCE IS A MUST

blog article

Mar 20, 2019

Microsoft's announcement that it has launched its first cloud data centers in Africa—one in Cape Town, another in Johannesburg—is a cause for celebration among South Africa's business sector. As we hurtle into the Fourth Industrial Revolution, access to cloud infrastructure will ...

Read More

FILELESS MALWARE: UNDERSTANDING THE INVISIBLE CYBERATTACK FILELESS MALWARE: UNDERSTANDING THE INVISIBLE CYBERATTACK

blog article

Mar 20, 2019

Fileless Malware: What It Stands For? Fileless malware, or non-malware, is a zero-footprint attack that does not depend on any malicious software to spread and infect the user’s machine. It, instead, finds existing vulnerabilities in the machine and takes advantage of it. Fileless malware illu...

Read More

How to Secure Your Online Brand HOW TO SECURE YOUR ONLINE BRAND

blog article

Mar 20, 2019

What is online brand security? As we outlined in our Practical Guide to Reducing Digital Risk, the integrity of brand and identity is essential in protecting a business. Adversaries are routinely impersonating businesses and critical online services to target customers and significant business trans...

Read More

Tips To Keep Your Small To Medium-Size Business (SMB’s) Data Safe & Secure TIPS TO KEEP YOUR SMALL TO MEDIUM-SIZE BUSINESS (SMB’S) DATA SAFE & SECURE

blog article

Mar 20, 2019

With all the data breaches and frauds taking place every day, it’s no secret that new business owners and marketers need to be more aware of the cyber threats that can drastically affect their business as well as personal data. Many business owners think that their data and assets are protecte...

Read More

The Intersections between Cybersecurity and Diversity THE INTERSECTIONS BETWEEN CYBERSECURITY AND DIVERSITY

blog article

Mar 20, 2019

Cybersecurity and diversity are high-value topics that are most often discussed in isolation. Both topics resonate with individuals and organizations alike. However, the intersections between cybersecurity and diversity are often overlooked. As nations and organizations seek to protect their critica...

Read More

Attacking the internal network from the public Internet using a browser as a proxy ATTACKING THE INTERNAL NETWORK FROM THE PUBLIC INTERNET USING A BROWSER AS A PROXY

whitepaper

Mar 19, 2019

At Forcepoint we continually seek to improve the protection our products provide. To this end, we often investigate unusual or potentially novel attack techniques. One such recent topic of research has been attacks against localhost and the internal network, launched from the public Internet. Though...

Read More

Breaking Research: LockerGoga Ransomware Impacts Norsk Hydro BREAKING RESEARCH: LOCKERGOGA RANSOMWARE IMPACTS NORSK HYDRO

blog article

Mar 19, 2019

It has been reported today that Norsk Hydro either switched to manual mode or temporarily stopped aluminum production at several plants following a cyberattack. The Norwegian National Security Authority and local media in Norway describe the incident as a ransomware attack by a malware called Locker...

Read More

Office 365 Security Features Demystified OFFICE 365 SECURITY FEATURES DEMYSTIFIED

blog article

Mar 19, 2019

Microsoft has numerous Office 365 security features built in to help you monitor activity, protect data, identify threats, and manage identity, access, and privileges. But getting the most out of those tools can be difficult, particularly for mid-sized organizations. Integrating them with data from ...

Read More

Cyber Security Incident Response and Reporting Process CYBER SECURITY INCIDENT RESPONSE AND REPORTING PROCESS

blog article

Mar 19, 2019

Ever since we launched our customizable cyber security incident response template, I’ve been amazed by its volume of downloads. I quickly realized that the increasing cyber threats from criminal hackers, malware and ransomware is starting to be taken seriously by organizations large and small,...

Read More

Google Play is flooded with hundreds of unsafe anti-virus products GOOGLE PLAY IS FLOODED WITH HUNDREDS OF UNSAFE ANTI-VIRUS PRODUCTS

blog article

Mar 19, 2019

A new study conducted by AV-Comparatives, a well-respected independent testing agency, has closely examined whether 250 security products for Android smartphones are capable of protecting users at all. The test evaluated whether Android anti-virus products available in the official Google Play store...

Read More

HOW TO KEEP SPIDER WEBS, BUGS OR INSECTS AWAY FROM SECURITY CAMERAS HOW TO KEEP SPIDER WEBS, BUGS OR INSECTS AWAY FROM SECURITY CAMERAS

blog article

Mar 19, 2019

If you have security cameras outside your home, you might be wondering why spiders love to spin cobwebs across camera lenses. The truth is, spiders don’t actually love your cameras—they love the bugs attracted to the infrared light emitting from your camera. This can be a real issue for ...

Read More

BEC Goes Mobile as Cybercriminals Turn to SMS BEC GOES MOBILE AS CYBERCRIMINALS TURN TO SMS

blog article

Mar 19, 2019

Business email compromise (BEC) is a term that encompasses a variety of techniques and tactics that cybercriminals leverage to obtain money or data via identity deception. Despite the evolution and repurposing of this suite of associated tactics, one constant has remained throughout—the corres...

Read More

5 Best Enforced Encryption Features 5 BEST ENFORCED ENCRYPTION FEATURES

blog article

Mar 18, 2019

Faced with increasingly restrictive data protection regulations and the very real threat of cyberattacks, businesses big and small have recently made data security a top priority. But, as they invest in complex strategies to protect data within their company networks, they often overlook one of the ...

Read More

Roles and Responsibilities of CyberSecurity Experts ROLES AND RESPONSIBILITIES OF CYBERSECURITY EXPERTS

infographic

Mar 18, 2019

Depending on the role you are involved in within cybersecurity, your responsibilities will vary. For instance if you are a cryptographer, you are expected to write code that a hacker cannot crack, and if you are a vulnerability assessor you have to spot system vulnerabilities and fix them. But the e...

Read More

Like Football, Your Cybersecurity Defense Needs a Strong Offense LIKE FOOTBALL, YOUR CYBERSECURITY DEFENSE NEEDS A STRONG OFFENSE

blog article

Mar 18, 2019

History credits Revolutionary War hero George Washington with being among the first to vocalize this concept, later famously echoed by heavyweight boxing champ Jack Dempsey and football god Vince Lombardi. And it’s easy to see what they mean. The idea is that being proactive—going on the...

Read More

Arbitrary Directory Deletion in WP-Fastest-Cache ARBITRARY DIRECTORY DELETION IN WP-FASTEST-CACHE

blog article

Mar 18, 2019

The WP-Fastest-Cache plugin authors released a new update, version 0.8.9.1, fixing a vulnerability (CVE-2019-6726) present during its install alongside the WP-PostRatings plugin. According to seclists.org: A successful attack allows an unauthenticated attacker to specify a path to a directory from w...

Read More

Detecting Cyberattacks Through the Ever-evolving Cybersecurity Industry DETECTING CYBERATTACKS THROUGH THE EVER-EVOLVING CYBERSECURITY INDUSTRY

blog article

Mar 18, 2019

Cybersecurity has come a long way since its inception in the 1990s.1 In the beginning, hackers were generally considered a nuisance, and their hacks – which were pretty limited in terms of their scope – were designed more to cause trouble than harm. When the internet began to take centre...

Read More

Chinese Hackers Targeting Universities in Attempting to Gain Military secrets CHINESE HACKERS TARGETING UNIVERSITIES IN ATTEMPTING TO GAIN MILITARY SECRETS

blog article

Mar 18, 2019

iDefense, a cybersecurity intelligence unit of Accenture Security, has recently reported that at least 27 different universities in the United States, Canada, and Southeast Asia have been targeted by the attackers including the University of Hawaii, Massachusetts Institute of Technology (MIT) and th...

Read More

Endpoint Protector for Better Security at RSAC 2019 ENDPOINT PROTECTOR FOR BETTER SECURITY AT RSAC 2019

blog article

Mar 15, 2019

Organized for the 28th time in San Francisco, the RSA Conference 2019 tackled with the idea of “Better”. This year’s theme was about what defines better in the field of cybersecurity and what can organizations do to better their security outcomes. Is it about new tools for building...

Read More

Post Coinhive, What’s Next for Cryptojacking? POST COINHIVE, WHAT’S NEXT FOR CRYPTOJACKING?

blog article

Mar 15, 2019

In late February, the notorious cryptojacking script engine called Coinhive abruptly announced the impending end to its service. The stated reason: it was no longer economically viable to run. Coinhive became infamous quickly following its debut as an innovative javascript-based cryptomining script ...

Read More

Joomla! Releases 3.9.4 Addressing New Security Vulnerabilities JOOMLA! RELEASES 3.9.4 ADDRESSING NEW SECURITY VULNERABILITIES

blog article

Mar 15, 2019

The latest version of the Joomla! 3.x series was released on March 12, 2019. Version 3.9.4 addresses four security flaws and 28 bug fixes, which includes a high-priority access level vulnerability. Three of the four security flaws are cross-site scripting (XSS) vulnerabilities, which have been ident...

Read More

Uncommon Radixes Used in Malware Obfuscation UNCOMMON RADIXES USED IN MALWARE OBFUSCATION

blog article

Mar 15, 2019

Some JavaScript features allow for pretty interesting obfuscation techniques. For example, did you know that virtually any English word can be used as a valid number? I recently decoded a credit card stealing script injected at the bottom of a js/varien/js.js file: There were several layers of obfus...

Read More

SSL Based Cyber-attacks Increase by 400% Over the Last Year SSL BASED CYBER-ATTACKS INCREASE BY 400% OVER THE LAST YEAR

blog article

Mar 15, 2019

A new report found that last year there had been a 400% increase in SSL-based phishing threats, criminals are increasingly using encryption as part of their toolkit to evade detection and launch malware. When data is encrypted, it cannot be accessed and exploited by unauthorised users. If you are se...

Read More

New Customization Center Gives Organizations More Control of Training Content NEW CUSTOMIZATION CENTER GIVES ORGANIZATIONS MORE CONTROL OF TRAINING CONTENT

blog article

Mar 15, 2019

We are excited to announce the launch of a new feature that will enable our customers to deliver security awareness training that more effectively meets unique organizational goals. The self-service Customization Center in the Proofpoint Security Education Platform gives program administrators acces...

Read More

Atos codex private IOT platform ATOS CODEX PRIVATE IOT PLATFORM

infographic

Mar 14, 2019

Gain visibility and control over sensitive IoT data for compliance. Reduce attack surface for business-critical IoT applications. Reduce latency and improve IoT application performance. The result of a unique Global Strategic Alliance between Siemens and Atos with joint innovation and investment pro...

Read More

System security in a safety critical context SYSTEM SECURITY IN A SAFETY CRITICAL CONTEXT

whitepaper

Mar 14, 2019

A common interest and collaborative effort of system operators and suppliers. Most control room operators have a strong focus on safety: air traffic management during all phases of operation, emergency services answering calls and coordinating first responders, vessel traffic and railway operation. ...

Read More

How the 5G Telco Market is Transforming with Lessons Learned from the Enterprise HOW THE 5G TELCO MARKET IS TRANSFORMING WITH LESSONS LEARNED FROM THE ENTERPRISE

blog article

Mar 14, 2019

Over the past six months, more people in the general populace have begun using the term 5G in their regular conversations. It was a big focus at the recently-concluded MWC Barcelona event in February. And high-profile publications like TIME and BusinessWeek are writing articles to explain 5G to the ...

Read More

PROTECT DATA ACROSS ANY PLATFORM AND ANY LOCATION PROTECT DATA ACROSS ANY PLATFORM AND ANY LOCATION

whitepaper

Mar 14, 2019

Digital transformation is changing the way every enterprise operates. The trailblazers who were first on the journey are now looking at dividing the data workload across public and private cloud, but many are finding that protecting data across multiple platforms is a significant challenge.

Read More

IBM Security Product Professional Services IBM SECURITY PRODUCT PROFESSIONAL SERVICES

video

Mar 14, 2019

Learn more about the benefits of IBM Security Product Professional Services—a team of trusted experts who help organizations assess, build and deploy an integrated security ecosystem that reduces complexity and provides the intelligence needed to understand and adapt to advanced threats.

Read More

What is a Computer Virus and how do they work? WHAT IS A COMPUTER VIRUS AND HOW DO THEY WORK?

blog article

Mar 14, 2019

How does a Computer Virus Spread. A computer virus spreads through removable media, internet downloads, and e-mail attachments. In other words, a virus spreads while the user is viewing an infected advertisement, visiting an infected website, opening the attachment in the email, or clicking on an ex...

Read More

VOICE SECURITY ++ VOICE SECURITY ++

whitepaper

Mar 14, 2019

Many systems claim to be secure, provide secure functionality, and may even be validated by an accredited security industry. However, what does it mean to be a good — or even usable — voice-based security system? What makes a secure voice platform exceptional? In this paper, we present f...

Read More

Emotet revisited: pervasive threat still a danger to businesses EMOTET REVISITED: PERVASIVE THREAT STILL A DANGER TO BUSINESSES

blog article

Mar 14, 2019

One of the most common and pervasive threats for businesses today is Emotet, a banking Trojan turned downloader that has been on our list of top 10 detections for many months in a row. Emotet, which Malwarebytes detects as Trojan.Emotet, has been leveled at consumers and organizations across the glo...

Read More

Emsisoft Mobile Security scores top marks in AV-Comparatives’ Android Test 2019 EMSISOFT MOBILE SECURITY SCORES TOP MARKS IN AV-COMPARATIVES’ ANDROID TEST 2019

blog article

Mar 14, 2019

Mobile antivirus apps have come under close scrutiny in recent years, thanks, in no small part, to bogus security apps like Virus Shield that don’t actually do anything. Dozens of other security apps have been identified as trojans or been found to provide ineffective protection. Of course, th...

Read More

What You Need to Know About Cybersecurity in 2019 WHAT YOU NEED TO KNOW ABOUT CYBERSECURITY IN 2019

infographic

Mar 14, 2019

Cybersecurity has become one of the prevailing issues of our time - with so much of our personal data now being transmitted online, the risk of major loss is significant, and very real, which is why we all need to take precautions. Are you aware of the varying types of cybersecurity threats you now ...

Read More

The Tao of Intel Driven Security THE TAO OF INTEL DRIVEN SECURITY

whitepaper

Mar 14, 2019

The need to improve security teams’ efficiency, integrate technologies, and speed up incident response has spurred the demand for orchestration and automation. Intelligence-driven orchestration goes a step further -- it takes things like environment, situational awareness, and circumstances in...

Read More

Security Pros and Perils of Serverless Architecture SECURITY PROS AND PERILS OF SERVERLESS ARCHITECTURE

blog article

Mar 14, 2019

Serverless architectures are revolutionizing the way organizations procure and use enterprise technology. This cloud computing model can drive cost-efficiencies, increase agility and enable organizations to focus on the essential aspects of software development. While serverless architecture offers ...

Read More

Are you Protected against These Common Types of Cyber Attacks? ARE YOU PROTECTED AGAINST THESE COMMON TYPES OF CYBER ATTACKS?

blog article

Mar 14, 2019

The types of cyber-security attacks that businesses need to protect themselves from are continually growing and evolving. Keeping your company secure means having insight into the most common threats, and the categories of cyber attacks that might go unnoticed. From how to use the principle of least...

Read More

See How Hackers Crack Passwords in Real Life | Password Security | F-Secure SEE HOW HACKERS CRACK PASSWORDS IN REAL LIFE | PASSWORD SECURITY | F-SECURE

video

Mar 14, 2019

Password security is a problem impacting everybody, with weak passwords putting your business at great risk. Watch the video to see two of the most common methods hackers use to crack passwords in real life: hash cracking and brute forcing.

Read More

Making it Rain - Cryptocurrency Mining Attacks in the Cloud MAKING IT RAIN - CRYPTOCURRENCY MINING ATTACKS IN THE CLOUD

blog article

Mar 14, 2019

Organizations of all sizes have made considerable shifts to using cloud-based infrastructure for their day-to-day business operations. However, cloud security hasn't always kept up with cloud adoption, and that leaves security gaps that hackers are more than happy to take advantage of. One of th...

Read More

OneDrive for Business Security: The Mystery Is Solved ONEDRIVE FOR BUSINESS SECURITY: THE MYSTERY IS SOLVED

blog article

Mar 14, 2019

Over the past few years, organizations have gradually adopted cloud technologies for a wide range of business purposes. Usually, the cloud service utilized first is file storage. Cloud storage enables all business, from small to large, to control costs while ensuring high availability of their data....

Read More

How to Use Forensic Data to Improve Cybersecurity HOW TO USE FORENSIC DATA TO IMPROVE CYBERSECURITY

blog article

Mar 14, 2019

What’s the first thing you think of when you hear the word “forensics?” Odds are, if you’re like most Americans, the first thing you thought about was a crime & mystery show like NCIS, CSI, or Law & Order. However, forensics plays a role in cybersecurity, too. Many ne...

Read More

OT Security. At Scale OT SECURITY. AT SCALE

whitepaper

Mar 14, 2019

Modern operational technology (OT) networks are constantly evolving due to developments such as Industrial Internet of Things (IIoT), Industry 4.0, smart grid and more. To stay competitive, companies are adopting these beneficial technologies to optimize their operations and significantly cut operat...

Read More

WHY PROFESSIONALS PREFER CONTINUOUS CYBERSECURITY TRAINING WHY PROFESSIONALS PREFER CONTINUOUS CYBERSECURITY TRAINING

blog article

Mar 14, 2019

Continuous learning has many benefits and with the “ever-evolving” technology, learning is the only tool to keep yourself updated and ahead of the competition. In this article, let us see how powerful the approach of continuous training is, especially when it is applied to a cybersecurit...

Read More

Amazon Web Services’ Approach to Operational Resilience in the Financial Sector & Beyond AMAZON WEB SERVICES’ APPROACH TO OPERATIONAL RESILIENCE IN THE FINANCIAL SECTOR & BEYOND

whitepaper

Mar 13, 2019

This document is provided for informational purposes only. It represents AWS’s current product offerings and practices as of the date of issue of this document, which are subject to change without notice. Customers are responsible for making their own independent assessment of the information ...

Read More

Data protection in mobile money DATA PROTECTION IN MOBILE MONEY

whitepaper

Mar 13, 2019

The GSMA represents the interests of mobile operators worldwide, uniting more than 750 operators with over 350 companies in the broader mobile ecosystem, including handset and device makers, software companies, equipment providers and internet companies, as well as organisations in adjacent industry...

Read More

Crypto-Mining: Crypto-mining: eco and G DATA develop rules for the game CRYPTO-MINING: CRYPTO-MINING: ECO AND G DATA DEVELOP RULES FOR THE GAME

blog article

Mar 13, 2019

Crypto-mining refers to the mining of crypto currencies. The mining process consists of complicated calculations and serves to verify the transactions of crypto currencies. As a reward, the person carrying out the calculation receives coins in the respective crypto currency. The best known crypto cu...

Read More

A Machine Learning Model to Detect Malware Variants A MACHINE LEARNING MODEL TO DETECT MALWARE VARIANTS

blog article

Mar 13, 2019

For a piece of malware to be able to do its intended malicious activity, it has to be able to sneak inside a machine’s system without being flagged by cybersecurity defenses. It camouflages and packages itself to look like a benign piece of code and, when it has cleared past security filters, ...

Read More

Exposed: Cyberattacks on Cloud Honeypots EXPOSED: CYBERATTACKS ON CLOUD HONEYPOTS

whitepaper

Mar 13, 2019

Contrary to popular belief, every device is worth hacking when the process is automated. It doesn’t matter who or where you are, if you own a company big or small, or have technology in the home – every device can be monetized by an enterprising criminal. Brute force login attempts are l...

Read More

Bug bounties: A good tool, but don’t make them the only tool in security BUG BOUNTIES: A GOOD TOOL, BUT DON’T MAKE THEM THE ONLY TOOL IN SECURITY

blog article

Mar 13, 2019

Bug bounties are hot. They are everywhere. Of course, popularity doesn’t guarantee quality. Just because everybody is doing it doesn’t necessarily mean it’s the best way to maintain the security of your organization. But the word from most experts is that bug bounties are a good th...

Read More

WordPress XSS Vulnerability Can Result in Remote Code Execution (RCE) WORDPRESS XSS VULNERABILITY CAN RESULT IN REMOTE CODE EXECUTION (RCE)

blog article

Mar 13, 2019

On March 13, 2019, RIPS Technologies, a company specializing in static code analysis software, released details of a Cross-site Scripting (XSS) vulnerability they found in all versions of WordPress up to 5.1.1. The vulnerability had been disclosed on various websites under different categories. Some...

Read More

Fortinet Security Fabric Powers Digital Transformation FORTINET SECURITY FABRIC POWERS DIGITAL TRANSFORMATION

whitepaper

Mar 13, 2019

DX offers new business advantages, and organizations are rapidly adopting digital technologies to accelerate their business, deliver better customer experiences, lower costs, and improve efficiencies. Organizations are migrating workloads and applications to the cloud, resulting in an explosion of I...

Read More

Proofpoint Named One of the Most Important Companies of the Last 30 Years by SC Media PROOFPOINT NAMED ONE OF THE MOST IMPORTANT COMPANIES OF THE LAST 30 YEARS BY SC MEDIA

blog article

Mar 13, 2019

SC Media, a leading cybersecurity media outlet, recently recognized Proofpoint as one of the most important companies in the last 30 years. The accolade is part of SC Media’s 30th Anniversary Awards, which include several special categories honoring those who have shaped the cybersecurity indu...

Read More

What is Network Firewall and How does it Work? WHAT IS NETWORK FIREWALL AND HOW DOES IT WORK?

blog article

Mar 13, 2019

What is Network Firewall? A Network Firewall is a security device that reduces or denies suspicious access to enterprise intranet network or when the network is connected to the internet. It filters the traffic based on a defined set of policies. A network firewall is a mediating agent between the e...

Read More

Three Essential Mobile Security Measures THREE ESSENTIAL MOBILE SECURITY MEASURES

blog article

Mar 13, 2019

Many of us have heard of the 80/20 rule, also known as the ‘Pareto Principle.’ Applied to mobile application security, the idea is that guarding against threats with the greatest potential impact can mitigate 80% of your risk and provide the biggest bang for the buck. A defense-in-depth ...

Read More

Planning Your 2019 Cyber Security Budget: A How-To Guide PLANNING YOUR 2019 CYBER SECURITY BUDGET: A HOW-TO GUIDE

blog article

Mar 13, 2019

As we have entered the new year, all of us are busy planning our IT budgets for the year. Have you discovered how to plan your cybersecurity budget for 2019? If not, then let’s investigate some facts and figures as to why cybersecurity should remain the highest priority in creating your IT bud...

Read More

Important Cyber Security Awareness Practices for Senior Citizens IMPORTANT CYBER SECURITY AWARENESS PRACTICES FOR SENIOR CITIZENS

blog article

Mar 13, 2019

Using the internet lets you keep learning, connect with your loved ones and enjoy leisure activities. Older adults are increasingly becoming digitally savvy-but for some, the online world is a dangerous place. With more and more people are getting to grips with the Internet, cyber crimes such as onl...

Read More

Ten Active Directory Misconfigurations that Lead to Total Domain Compromise TEN ACTIVE DIRECTORY MISCONFIGURATIONS THAT LEAD TO TOTAL DOMAIN COMPROMISE

whitepaper

Mar 13, 2019

Introduction: Active Directory Security Risks Why is Microsoft Active Directory (AD) the business world’s most targeted asset? Because with just a few queries to AD from a compromised endpoint, attackers obtain all the information they need to steal domain admin credentials and move laterally ...

Read More

Clinic hit by ransomware recovers in hours thanks to solid incident response plan CLINIC HIT BY RANSOMWARE RECOVERS IN HOURS THANKS TO SOLID INCIDENT RESPONSE PLAN

blog article

Mar 13, 2019

Maffi Clinics, a chain of plastic surgery clinics in the United States, is notifying patients about a ransomware incident that briefly affected its systems. Unlike most cases involving ransomware, though, this one didn’t leave a scar, illustrating the power of strong security protocols. Accord...

Read More

The Long Road Toward Building Secure Software at Enterprise Scale THE LONG ROAD TOWARD BUILDING SECURE SOFTWARE AT ENTERPRISE SCALE

blog article

Mar 13, 2019

security of their software. Urgency to improve application security came when there was a wave of exploits and automated attacks in the form of worms and exploits started to hit. Unfortunately, since then, while software makers, software services providers, and enterprises began working to improve t...

Read More

Cybersecurity for the hospitality sector: What you need to know CYBERSECURITY FOR THE HOSPITALITY SECTOR: WHAT YOU NEED TO KNOW

blog article

Mar 13, 2019

Marriott International. Hilton. Four Seasons. Trump Hotels. InterContinental. Hard Rock Hotel. These are some of the biggest hospitality chains in the business. But there’s another detail also that connects the above names: In the last couple of years, all of them have been at the receiving en...

Read More

Q&A: Cybersecurity has become a primal battleground for AI one-upmanship Q&A: CYBERSECURITY HAS BECOME A PRIMAL BATTLEGROUND FOR AI ONE-UPMANSHIP

blog article

Mar 13, 2019

A discussion of how – and why – adversaries are using artificial intelligence to juice up malicious activities. When antivirus (AV) software first arrived in the late 1980s, the science of combating computer viruses was very straightforward. AV kept close track of known malicious files, ...

Read More

SupplyPoint Systems Protects their Data Center with Cisco NGFWs and Stealthwatch SUPPLYPOINT SYSTEMS PROTECTS THEIR DATA CENTER WITH CISCO NGFWS AND STEALTHWATCH

video

Mar 12, 2019

SupplyPoint built their security platform with a solid foundation of Cisco products, beginning with Cisco’s ASA 5508-X. Cisco and SupplyPoint worked together to create an effective and holistic security solution to protect their data centers. To learn more about secure data center solutions.

Read More

WHAT MAKES UP A MONITORED ALARM SYSTEM? WHAT MAKES UP A MONITORED ALARM SYSTEM?

blog article

Mar 12, 2019

The distinction for a monitored alarm system is people for protection. Monitored alarm systems are connected to 24/7 monitoring center operators so your home is protected against theft, fire and carbon monoxide while you are out and about. The New York Post recently reported that Americans check the...

Read More

Five Mistakes that Could Lead to a Third-Party Data Breach FIVE MISTAKES THAT COULD LEAD TO A THIRD-PARTY DATA BREACH

blog article

Mar 12, 2019

In late January, we learned that millions of financial records were leaked from Texas-based data firm Ascension because its contractor, a New York-based document management startup, had misconfigured several Elasticsearch and Amazon S3 storage servers, leaving them with no password required. Outsour...

Read More

SECURING EMAIL FOR AN ORGANIZATION SECURING EMAIL FOR AN ORGANIZATION

blog article

Mar 12, 2019

It might seem odd at first to preface an article on email security with a history lesson. Ultimately though, understanding the primary problem email was designed to solve, and the fact that security was loosely bolted on after-the-fact in tiny bursts over many decades, helps tremendously in understa...

Read More

Magecart Isn’t Just a Security Problem; It’s Also a Business Problem MAGECART ISN’T JUST A SECURITY PROBLEM; IT’S ALSO A BUSINESS PROBLEM

blog article

Mar 12, 2019

Magecart is more than just a security problem—it’s also a business problem. When threat actors breached British Airways in September resulting in the compromise of thousands of customers’ credit cards, the world got a look at what the fallout of a modern security breach looks like....

Read More

It’s Time Manufacturers Assemble a Sound Cybersecurity Effort IT’S TIME MANUFACTURERS ASSEMBLE A SOUND CYBERSECURITY EFFORT

blog article

Mar 12, 2019

Recently the ISACA (Information Systems Audit and Control Association) and the Digital Manufacturing and Design Innovation Institute (DMDII) together conducted a survey that aimed to pinpoint the current cybersecurity challenges faced by the manufacturing industry. According to the ISACA and the DMD...

Read More

Misconfigured Enterprise Box accounts leak terabytes of sensitive internal data MISCONFIGURED ENTERPRISE BOX ACCOUNTS LEAK TERABYTES OF SENSITIVE INTERNAL DATA

blog article

Mar 12, 2019

Pen-testing experts have made a worrisome discovery regarding the popular cloud storage service Box, specifically the Enterprise version used by some of the world’s biggest companies. Following up on a warning issued by infosec geeks earlier last year that failed to gain traction, Adversis res...

Read More

The Advanced Persistent Threat files: Lazarus Group THE ADVANCED PERSISTENT THREAT FILES: LAZARUS GROUP

blog article

Mar 12, 2019

We’ve heard a lot about Advanced Persistent Threats (APTs) over the past few years. As a refresher, APTs are prolonged, aimed attacks on specific targets with the intention to compromise their systems and gain information from or about that target. While the targets may be anyone or anything&m...

Read More

USE YOUR DISCRETION: CYBER AWARENESS EDUCATION FOR EMPLOYEES USE YOUR DISCRETION: CYBER AWARENESS EDUCATION FOR EMPLOYEES

blog article

Mar 12, 2019

Employees are usually left to use their discretion with corporate-owned technology on your networks pretty much all the time. As such, a lot of power is in their hands when it comes to what emails to open, what files to download, what portable media to plug in and what sites to visit. There is an as...

Read More

The 7 Deadly Cybersecurity Sins You Need to Evade THE 7 DEADLY CYBERSECURITY SINS YOU NEED TO EVADE

blog article

Mar 12, 2019

Everyone makes mistakes. The problem for businesses is that cybersecurity mistakes can often lead to data breaches, service outages, and other issues that severely impact the continued viability of the company. Yet, businesses can learn from their network security mistakes and come out stronger for ...

Read More

IBM Security Data Risk Manager Overview IBM SECURITY DATA RISK MANAGER OVERVIEW

video

Mar 11, 2019

IBM Data Risk Manager translates data security and risk into the language of business risk that the C-Suite understands. Check out this video to see how IBM Data Risk Manager’s highly visual dashboards can help business leaders easily assess and address potential risks and threats to their org...

Read More

Top 4 Things to Tell New Hires About Cybersecurity TOP 4 THINGS TO TELL NEW HIRES ABOUT CYBERSECURITY

blog article

Mar 11, 2019

The start of employment is the time to give new hires a run down on security measures for your company. Ideally, a formal training session should occur where protocols are covered for security measures. There should also be an Acceptable Use Policy (AUP) for the employee to review and sign. Policies...

Read More

CHECKING YOUR VPN FOR DATA LEAKS CHECKING YOUR VPN FOR DATA LEAKS

blog article

Mar 11, 2019

It’s hard to travel far online without running into an article or advertisement for a virtual private network (VPN). As internet security concerns have grown, so has the demand for tools and services to fight back against hackers and their malware attacks. While coming up with hard numbers is ...

Read More

Parliament works to boost Europe PARLIAMENT WORKS TO BOOST EUROPE'S CYBER SECURITY

infographic

Mar 11, 2019

Internet use and the number of connected devices continue to increase, but so do cyber threats. Parliament has approved new legislation to improve your security. Activities by cybercriminals are increasing in complexity and sophistication. On Tuesday 12 March, MEPs voted in favour of the cybersecuri...

Read More

Switching to Elasticsearch to Improve Cybersecurity at the home of the World’s Fastest Supercomputer SWITCHING TO ELASTICSEARCH TO IMPROVE CYBERSECURITY AT THE HOME OF THE WORLD’S FASTEST SUPERCOMPUTER

blog article

Mar 11, 2019

This post is a recap of a community talk given at a recent Elastic{ON} Tour event. Interested in seeing more talks like this? Check out the conference archive or find out when the Elastic{ON} Tour is coming to a city near you. The fastest supercomputer in the world, Summit, is housed at Oak Ridge Na...

Read More

Fortinet Recognized as Best Security Company at 2019 SC Magazine Awards FORTINET RECOGNIZED AS BEST SECURITY COMPANY AT 2019 SC MAGAZINE AWARDS

blog article

Mar 11, 2019

Last week at RSA Conference 2019, Fortinet won an Excellence Award for "Best Security Company" and a Trust Award for “Best UTM Security Solution” at the 2019 SC Awards held in San Francisco during RSAC. “The Excellence Award honors those organizations and individuals whos...

Read More

Multi-cloud Complicates Security MULTI-CLOUD COMPLICATES SECURITY

blog article

Mar 11, 2019

The agility and benefits of cloud computing are undeniable. Forrester predicts that the total global public cloud market will be $178 billion in 2018, up from $146 billion in 2017, and will continue to grow at a 22 percent compound annual growth rate. And IDC forecasts that by 2020, more than 90 per...

Read More

Have we become addicted to passwords? HAVE WE BECOME ADDICTED TO PASSWORDS?

blog article

Mar 11, 2019

In today’s technology age, there are creeping addictions that many have but few acknowledge. The worst pandemic of which we suffer today may actually be an addiction to passwords as the primary security perimeter to our cyber assets. Think about it for a second. How many passwords do you need ...

Read More

Jackson County pays ransomware operators $400k to regain access to computers JACKSON COUNTY PAYS RANSOMWARE OPERATORS $400K TO REGAIN ACCESS TO COMPUTERS

blog article

Mar 11, 2019

Officials in Jackson County, a rural area in the southeastern US state of Georgia, were forced over the weekend to pay hackers almost half a million dollars after a ransomware attack brought its entire fleet of computer systems to its knees. According to statescoop.com, the county government’s...

Read More

Columbia Surgical Specialists Pays Almost $15k Ransom Following Ransomware Attack COLUMBIA SURGICAL SPECIALISTS PAYS ALMOST $15K RANSOM FOLLOWING RANSOMWARE ATTACK

blog article

Mar 11, 2019

A ransomware attack on Spokane, Washington-based Columbia Surgical Specialists on Jan. 9 resulted in unauthorized access of medical records of almost 400,000 patients, the healthcare provider said in a press release. Although the FBI and security companies advise organizations not give in to hacker ...

Read More

The need for international agreements on cybersecurity THE NEED FOR INTERNATIONAL AGREEMENTS ON CYBERSECURITY

blog article

Mar 11, 2019

Over the last decade or so, it has become increasingly obvious that cybersecurity is no longer just a local issue. As the world has leaped into a digital era with communication in the blink of an eye and the click of a mouse, cybersecurity has gone beyond borders. It is now a truly global phenomenon...

Read More

 4 Reasons to Add UBA to Your SIEM 4 REASONS TO ADD UBA TO YOUR SIEM

whitepaper

Mar 11, 2019

Let’s face it — security threats are growing, both in quantity and complexity. To combat these threats, organizations are looking for new ways to address increasingly sophisticated use cases beyond what’s normally addressed through a traditional security investigation and event management (SIEM) so...

Read More

Cyber security in the manufacturing industry: A story of a targeted attack CYBER SECURITY IN THE MANUFACTURING INDUSTRY: A STORY OF A TARGETED ATTACK

blog article

Mar 10, 2019

When there is a lot to lose, cyber security needs to be a priority. Like in the manufacturing sector. Imagine a competitor releasing your prototype for a rip off price only a few weeks before you were planning to go public. Your investment in (years of) research and development would go to waste. Or...

Read More

Emsisoft releases a free decrypter for BigBobRoss Ransomware EMSISOFT RELEASES A FREE DECRYPTER FOR BIGBOBROSS RANSOMWARE

blog article

Mar 10, 2019

Our research team has uncovered a new ransomware campaign we nicknamed BigBobRoss that seems to target Comcast Business users. Fortunately, our security experts were able to identify a flaw within the ransomware’s code that can be used to decrypt encrypted files without paying the ransom. Tech...

Read More

Truth or fiction? Spending more on cybersecurity solves all the issues TRUTH OR FICTION? SPENDING MORE ON CYBERSECURITY SOLVES ALL THE ISSUES

video

Mar 10, 2019

Cisco’s CISO Steve Martino and Dimension Data’s Group Security Executive Matt Gyde sit down to discuss managing security on a global basis, budgets, and breaches. It’s all about having the strategy, people, and technology to do what you need to do.

Read More

Why Internet Security is Absolutely Needed Today WHY INTERNET SECURITY IS ABSOLUTELY NEEDED TODAY

blog article

Mar 09, 2019

The Internet thrives to be a basic yet effective digital communication medium for both personal and business purposes. While it greatly facilitates and accelerates the exchange of information around the world, the Internet remains an unsafe platform ridden with malware, phishing attacks, trojans, vi...

Read More

List of data breaches in 2018 LIST OF DATA BREACHES IN 2018

infographic

Mar 08, 2019

2018 saw some of the biggest data breaches yet, with Marriott, Under Armour and Facebook suffering breaches that affected 500 million, 150 million and 100 million people respectively. It was also the year of the GDPR (General Data Protection Regulation), which changed the way organisations handle cu...

Read More

Why you’re putting your network at risk with a defensive approach to malware WHY YOU’RE PUTTING YOUR NETWORK AT RISK WITH A DEFENSIVE APPROACH TO MALWARE

blog article

Mar 08, 2019

It’s a mad, mad, mad, malware world. The good news is that the number of malware attacks is decreasing. The bad news is that malware forms are proliferating, attackers are getting smarter, and companies are still vulnerable. Just how bad is the problem? The answer is: very. While known threats...

Read More

IoT devices a growing part of global DDoS weapon arsenals IOT DEVICES A GROWING PART OF GLOBAL DDOS WEAPON ARSENALS

blog article

Mar 08, 2019

Machine-to-machine communications are increasingly exploited in distributed denial of service (DDoS) attacks. The use of IoT devices in synchronized attacks is growing globally, with China listed as the top host country for DDoS weapons, followed at distance by the United States. The most common pro...

Read More

Google Chrome zero-day: Now is the time to update and restart your browser GOOGLE CHROME ZERO-DAY: NOW IS THE TIME TO UPDATE AND RESTART YOUR BROWSER

blog article

Mar 08, 2019

It’s not often that we hear about a critical vulnerability in Google Chrome, and perhaps it’s even more rare when Google’s own engineers are urging users to patch. There are several good reasons why you need to take this new Chrome zero-day (CVE-2019-5786) seriously. For starters, ...

Read More

The End of Coinhive; The end of cryptojacking? THE END OF COINHIVE; THE END OF CRYPTOJACKING?

blog article

Mar 08, 2019

Will Coinhive’s end lead to the end of browser-based cryptomining and cryptojacking? Cryptojacking stole the limelight away from ransomware at the end of 2017, becoming a major cyberthreat that continued into 2018. On March 8, 2019 Coinhive, the service that enables websites around the world t...

Read More

How To Move Data To A Backup Site HOW TO MOVE DATA TO A BACKUP SITE

blog article

Mar 08, 2019

There are so many techniques for moving data from one location to another that it can be hard to determine which one is right for the job. Small business owners, in particular, can become immensely stressed out when trying to figure out how to securely transfer their data, especially if sensitive cu...

Read More

CyberSecurity First Responders: Who are they and why enterprises should hire them CYBERSECURITY FIRST RESPONDERS: WHO ARE THEY AND WHY ENTERPRISES SHOULD HIRE THEM

blog article

Mar 08, 2019

In our day-to-day lives, emergencies or accidents can and do happen. It can be on the roads, in the air, on the tracks – anywhere. When an incident like this occurs, the first people on the scene are the first responders – fire-fighters in the case of a fire, a traffic officer in the cas...

Read More

Thousands of patients impacted by ransomware attack at medical billing company THOUSANDS OF PATIENTS IMPACTED BY RANSOMWARE ATTACK AT MEDICAL BILLING COMPANY

blog article

Mar 07, 2019

Following a ransomware attack at a medical billing company, thousands of patients are being warned that their highly sensitive medical information and personal details were amongst the breached data. Michigan-based Wolverine Solutions Group (WSG) says that it discovered its systems had suffered a se...

Read More

GDPR: Not heavy-handed yet, but driving data breaches into the open GDPR: NOT HEAVY-HANDED YET, BUT DRIVING DATA BREACHES INTO THE OPEN

blog article

Mar 07, 2019

With the European Union’s landmark General Data Protection Regulation (GDPR) now in place a bit more than eight months, it seems that at least one of its messages has had some major resonance: A cover-up will be worse, and more expensive, than a crime. Among its multiple mandates, GDPR require...

Read More

What is a Firewall? WHAT IS A FIREWALL?

blog article

Mar 07, 2019

A firewall is a protective barrier which safeguards computing devices from online threats. The primary purpose of the firewall software is to shield the computer from internet threats and the threats arising within the local network. Firewalls are an integral part of a sophisticated security framewo...

Read More

Zombie email rises from grave after eight years of radio silence ZOMBIE EMAIL RISES FROM GRAVE AFTER EIGHT YEARS OF RADIO SILENCE

blog article

Mar 07, 2019

In a novel twist on “What happens to our accounts when we die,” we have “what happens to our abandoned accounts while we’re still alive”. In this case, UK ISP TalkTalk kept an old customer’s email account alive some eight years after she closed it—which left...

Read More

2019 Cloud Security Research: Take the Survey and Get the Free Report 2019 CLOUD SECURITY RESEARCH: TAKE THE SURVEY AND GET THE FREE REPORT

blog article

Mar 07, 2019

Delta Risk has partnered with Cybersecurity Insiders to examine the latest trends in cloud security. Everyone who completes this comprehensive survey will receive a copy of the complete 2019 Cloud Security Report as a thank you as soon as it is published. The survey is based on real-time feedback fr...

Read More

BUSINESS SECURITY: HOW TO PREVENT INSIDER ATTACKS BUSINESS SECURITY: HOW TO PREVENT INSIDER ATTACKS

blog article

Mar 07, 2019

Most security solutions are designed to protect against outside threats. However, research shows business owners should focus more on insider attacks. According to a study conducted by Cybersecurity Insiders, 90 percent of organizations feel at risk of an insider attack, with 53 percent of responden...

Read More

5 WAYS AN ONLINE CYBERSECURITY CERTIFICATION CAN BOOST YOUR CAREER 5 WAYS AN ONLINE CYBERSECURITY CERTIFICATION CAN BOOST YOUR CAREER

blog article

Mar 07, 2019

The concept of upgrading skills without going full time has generated a lot of buzz. Simply search for “certifications in demand” in any search engine, and you will see enormous results in a fraction of a second. You will come across many certification programs belonging to different ver...

Read More

6 SKILLS REQUIRED FOR A CAREER IN DIGITAL FORENSICS 6 SKILLS REQUIRED FOR A CAREER IN DIGITAL FORENSICS

blog article

Mar 07, 2019

Digital forensics, a branch of forensic science, is an increasingly popular domain, with many lucrative and career advancement opportunities in various industries. The science of digital forensics helps track hackers, retrieve stolen data, investigate the causes of incidents, and provide digital evi...

Read More

INSIDER THREATS: THE SIGNS YOU WON’T SEE TILL YOU DO INSIDER THREATS: THE SIGNS YOU WON’T SEE TILL YOU DO

blog article

Mar 07, 2019

Insider threats are employee-performed threats that are becoming more common. According to CA Technologies, 31% of the organizations believe that insider threat causes more damage as compared to those 14% who believe damages from external threats are more acute [1]. Yet, most of the employers do not...

Read More

THE TRUTH ABOUT THE GROWING CYBERSECURITY SKILL GAP THE TRUTH ABOUT THE GROWING CYBERSECURITY SKILL GAP

blog article

Mar 07, 2019

Cybersecurity is a growing industry with a prominent issue of the skill gap. Even the World Economic Forum mentioned in its January 2019 report that the United States has over 200,000 cybersecurity skills requiring job vacancies and employers are facing a tough time to fill them [1]. This huge imbal...

Read More

Is Your Business in Danger from a Security Gap? IS YOUR BUSINESS IN DANGER FROM A SECURITY GAP?

blog article

Mar 07, 2019

in a perfect world, businesses wouldn’t have to worry about cybersecurity. Instead of worrying about becoming the next “Massive Data Breach at headline, they would be able to focus solely on growing their market share. Unfortunately, that isn’t the case. Every day, malicious actors...

Read More

Guide to Securing Microsoft Office 365 for the Enterprise GUIDE TO SECURING MICROSOFT OFFICE 365 FOR THE ENTERPRISE

whitepaper

Mar 07, 2019

The skyrocketing adoption of Microsoft Office 365 has made it a valuable target for cybercriminals. While Microsoft’s security tools and capabilities are a great start, many enterprises moving to Office 365 are finding that they need greater protection across all their cloud applications. The Palo A...

Read More

9 LATEST CYBER-ESPIONAGE AFFAIRS 9 LATEST CYBER-ESPIONAGE AFFAIRS

blog article

Mar 07, 2019

Espionage among nations is not a new phenomenon; it has existed since the early medieval period. The world of spies has evolved with the times, and we are now facing a bigger challenge under the name of cyber espionage. This new form of organized and deliberate threat uses cyber warfare techniques t...

Read More

Guide to Securing Microsoft Office 365 for the Enterprise GUIDE TO SECURING MICROSOFT OFFICE 365 FOR THE ENTERPRISE

whitepaper

Mar 07, 2019

The skyrocketing adoption of Microsoft Office 365 has made it a valuable target for cybercriminals. While Microsoft’s security tools and capabilities are a great start, many enterprises moving to Office 365 are finding that they need greater protection across all their cloud applications. The Palo A...

Read More

Comprehensive Data Security in the Cloud COMPREHENSIVE DATA SECURITY IN THE CLOUD

whitepaper

Mar 07, 2019

input#report_img { margin-right: 60px; } Data and applications reside everywhere, on the network, endpoints, and in the constantly evolving cloud ecosystem. As a result, organizations are now faced with securing a multitude of applications, users, devices and infrastructures – all hosting sensitive...

Read More

Guide to Securing Microsoft Office 365 for the Enterprise GUIDE TO SECURING MICROSOFT OFFICE 365 FOR THE ENTERPRISE

whitepaper

Mar 07, 2019

The skyrocketing adoption of Microsoft Office 365 has made it a valuable target for cybercriminals. While Microsoft’s security tools and capabilities are a great start, many enterprises moving to Office 365 are finding that they need greater protection across all their cloud applications. The Palo A...

Read More

 Stop Targeted Attacks Without Decrypting Traffic STOP TARGETED ATTACKS WITHOUT DECRYPTING TRAFFIC

whitepaper

Mar 07, 2019

Threat actors conceal their attacks in SSL traffic to evade corporate defenses. Palo Alto Networks Security Operating Platform provides ironclad protection against cyberattacks, while eliminating blind spots introduced by encrypted traffic. Magnifier behavioral analytics, a cloud-based app for the A...

Read More

Jump Into the Security Operating Platform JUMP INTO THE SECURITY OPERATING PLATFORM

whitepaper

Mar 07, 2019

Cyberattacks continue to disrupt businesses. Spending on security feels endless, and legacy security tools require analysts to manually stitch together insights from disconnected sources before acting. The Palo Alto Networks Security Operating Platform prevents successful cyberattacks through autom...

Read More

 Stop Targeted Attacks Without Decrypting Traffic STOP TARGETED ATTACKS WITHOUT DECRYPTING TRAFFIC

whitepaper

Mar 07, 2019

Threat actors conceal their attacks in SSL traffic to evade corporate defenses. Palo Alto Networks Security Operating Platform provides ironclad protection against cyberattacks, while eliminating blind spots introduced by encrypted traffic. Magnifier behavioral analytics, a cloud-based app for the A...

Read More

Read Best Practices for Executing on Zero Trust READ BEST PRACTICES FOR EXECUTING ON ZERO TRUST

whitepaper

Mar 07, 2019

The goal of the cybersecurity industry is to prevent successful cyberattacks. However, today's point product approach brings additional challenges: proliferation of products, duplicate features, increasing operational costs, and shortage of skilled resources. This traditional approach to cybersecur...

Read More

Guide to Securing Microsoft Office 365 for the Enterprise GUIDE TO SECURING MICROSOFT OFFICE 365 FOR THE ENTERPRISE

whitepaper

Mar 07, 2019

The skyrocketing adoption of Microsoft Office 365 has made it a valuable target for cybercriminals. While Microsoft’s security tools and capabilities are a great start, many enterprises moving to Office 365 are finding that they need greater protection across all their cloud applications. The Palo A...

Read More

 Stop Targeted Attacks Without Decrypting Traffic STOP TARGETED ATTACKS WITHOUT DECRYPTING TRAFFIC

whitepaper

Mar 07, 2019

Threat actors conceal their attacks in SSL traffic to evade corporate defenses. Palo Alto Networks Security Operating Platform provides ironclad protection against cyberattacks, while eliminating blind spots introduced by encrypted traffic. Magnifier behavioral analytics, a cloud-based app for the A...

Read More

Comprehensive Data Security in the Cloud COMPREHENSIVE DATA SECURITY IN THE CLOUD

whitepaper

Mar 07, 2019

Data and applications reside everywhere, on the network, endpoints, and in the constantly evolving cloud ecosystem. As a result, organizations are now faced with securing a multitude of applications, users, devices and infrastructures – all hosting sensitive data that is critical to business operati...

Read More

Combine Network and Endpoint Security for Better Visibility, Protection, and Enforcement COMBINE NETWORK AND ENDPOINT SECURITY FOR BETTER VISIBILITY, PROTECTION, AND ENFORCEMENT

whitepaper

Mar 07, 2019

The most promising weapon in the endpoint security arsenal is machine learning with its ability to quickly learn, make instant decisions, and enable rapid response to prevent threats rather than dealing with them during execution or after the fact. One of the main advantages of machine learning is t...

Read More

Jump Into the Security Operating Platform JUMP INTO THE SECURITY OPERATING PLATFORM

whitepaper

Mar 07, 2019

Cyberattacks continue to disrupt businesses. Spending on security feels endless, and legacy security tools require analysts to manually stitch together insights from disconnected sources before acting. The Palo Alto Networks Security Operating Platform prevents successful cyberattacks through autom...

Read More

5 Requirements for Effective Endpoint Protection 5 REQUIREMENTS FOR EFFECTIVE ENDPOINT PROTECTION

whitepaper

Mar 07, 2019

Organizations should select security products that provide superior security value, not just in terms of monetary cost but also in terms of its security effectiveness. This brief discusses the core measurements used to determine security effectiveness as it relates to endpoint security solutions.

Read More

Read Best Practices for Executing on Zero Trust READ BEST PRACTICES FOR EXECUTING ON ZERO TRUST

whitepaper

Mar 07, 2019

The goal of the cybersecurity industry is to prevent successful cyberattacks. However, today's point product approach brings additional challenges: proliferation of products, duplicate features, increasing operational costs, and shortage of skilled resources. This traditional approach to cybersecur...

Read More

 White Paper: 5 Mistakes When Evaluating a Next-Generation Firewall WHITE PAPER: 5 MISTAKES WHEN EVALUATING A NEXT-GENERATION FIREWALL

whitepaper

Mar 07, 2019

The firewall is the foundation of enterprise data security. All firewalls are not created equal, though and no two organizations have the same needs, risks and data flow. You need a firewall to protect against today’s advanced attacks while preserving the performance and uptime critical to foster in...

Read More

Combine Network and Endpoint Security for Better Visibility, Protection, and Enforcement COMBINE NETWORK AND ENDPOINT SECURITY FOR BETTER VISIBILITY, PROTECTION, AND ENFORCEMENT

whitepaper

Mar 07, 2019

The most promising weapon in the endpoint security arsenal is machine learning with its ability to quickly learn, make instant decisions, and enable rapid response to prevent threats rather than dealing with them during execution or after the fact. One of the main advantages of machine learning is t...

Read More

 Decryption: Why, Where and How DECRYPTION: WHY, WHERE AND HOW

whitepaper

Mar 07, 2019

The growth in encrypted (SSL/TSL) traffic traversing the Internet is on an explosive up-turn. And, unfortunately, criminals have learned to leverage the lack of visibility and identification within encrypted traffic to hide from security surveillance and deliver malware. Read this paper to learn whe...

Read More

Comprehensive Data Security in the Cloud COMPREHENSIVE DATA SECURITY IN THE CLOUD

whitepaper

Mar 07, 2019

Data and applications reside everywhere, on the network, endpoints, and in the constantly evolving cloud ecosystem. As a result, organizations are now faced with securing a multitude of applications, users, devices and infrastructures – all hosting sensitive data that is critical to business operati...

Read More

5 Requirements for Effective Endpoint Protection 5 REQUIREMENTS FOR EFFECTIVE ENDPOINT PROTECTION

whitepaper

Mar 07, 2019

Organizations should select security products that provide superior security value, not just in terms of monetary cost but also in terms of its security effectiveness. This brief discusses the core measurements used to determine securityeffectiveness as it relates to endpoint security solutions.

Read More

Combine Network and Endpoint Security for Better Visibility, Protection, and Enforcement COMBINE NETWORK AND ENDPOINT SECURITY FOR BETTER VISIBILITY, PROTECTION, AND ENFORCEMENT

whitepaper

Mar 07, 2019

The most promising weapon in the endpoint security arsenal is machine learning with its ability to quickly learn, make instant decisions, and enable rapid response to prevent threats rather than dealing with them during execution or after the fact. One of the main advantages of machine learning is t...

Read More

 5 Mistakes When Evaluating a Next-Generation Firewall 5 MISTAKES WHEN EVALUATING A NEXT-GENERATION FIREWALL

whitepaper

Mar 07, 2019

The firewall is the foundation of enterprise data security. All firewalls are not created equal, though and no two organizations have the same needs, risks and data flow. You need a firewall to protect against today’s advanced attacks while preserving the performance and uptime critical to foster in...

Read More

5 Requirements for Effective Endpoint Protection 5 REQUIREMENTS FOR EFFECTIVE ENDPOINT PROTECTION

whitepaper

Mar 07, 2019

Organizations should select security products that provide superior security value, not just in terms of monetary cost but also in terms of its security effectiveness. This brief discusses the core measurements used to determine security effectiveness as it relates to endpoint security solutions.

Read More

 Decryption: Why, Where and How DECRYPTION: WHY, WHERE AND HOW

whitepaper

Mar 07, 2019

The growth in encrypted (SSL/TSL) traffic traversing the Internet is on an explosive up-turn. And, unfortunately, criminals have learned to leverage the lack of visibility and identification within encrypted traffic to hide from security surveillance and deliver malware. Read this paper to learn wh...

Read More

Importance of Gi-LAN functions consolidation in the 5G world IMPORTANCE OF GI-LAN FUNCTIONS CONSOLIDATION IN THE 5G WORLD

blog article

Mar 06, 2019

Today's LTE and 4G networks have been playing an important role in supporting mobile broadband services (e.g., video conferencing, high-definition content streaming, etc.) across millions of smart devices, such as smartphones, laptops, tablets and Internet of Things (IoT) devices. The number of ...

Read More

How to Deliver on DevSecOps with Automated Mobile AppSec Testing Tools HOW TO DELIVER ON DEVSECOPS WITH AUTOMATED MOBILE APPSEC TESTING TOOLS

blog article

Mar 06, 2019

Before I joined NowSecure, I was a cybersecurity engineer at MITRE, and confident I could do my job well with the collection of open source software (OSS) tools I used every day. After testing the NowSecure automated mobile app security testing tool, it was clear the solution could help my two colle...

Read More

How to Add SSL & Move WordPress from HTTP to HTTPS HOW TO ADD SSL & MOVE WORDPRESS FROM HTTP TO HTTPS

blog article

Mar 06, 2019

Moving a WordPress website from HTTP to HTTPS should be a priority for any webmaster. Recent statistics show that over 33% of website administrators across the web use WordPress and many of these websites have still not added an SSL certificate. Why is Important to Have a WordPress SSL Certificate? ...

Read More

Spotlight on Troldesh ransomware, aka Shade SPOTLIGHT ON TROLDESH RANSOMWARE, AKA SHADE

blog article

Mar 06, 2019

Despite the decline in the number of ransomware infections over the last year, there are several ransomware families that are still active. Ransom.Troldesh, aka Shade, is one of them. According to our product telemetry, Shade has experienced a sharp increase in detections from Q4 2018 to Q1 2019. Wh...

Read More

The not-so-definitive guide to cybersecurity and data privacy laws THE NOT-SO-DEFINITIVE GUIDE TO CYBERSECURITY AND DATA PRIVACY LAWS

blog article

Mar 06, 2019

US cybersecurity and data privacy laws are, to put it lightly, a mess. Years of piecemeal legislation, Supreme Court decisions, and government surveillance crises, along with repeated corporate failures to protect user data, have created a legal landscape that is, for the American public and America...

Read More

The Death of Passwords in the Modern Age THE DEATH OF PASSWORDS IN THE MODERN AGE

infographic

Mar 06, 2019

The complex and unreadable strings that make up a valid password are impractical for ordinary people, and companies are looking for a cleaner way to protect their accounts. Although the password protection system in the computer network has been improved, people have not. When major security vulnera...

Read More

7 uncomfortable truths about endpoint security 7 UNCOMFORTABLE TRUTHS ABOUT ENDPOINT SECURITY

whitepaper

Mar 06, 2019

Results of an independent survey of 3,100 IT managers commissioned by Sophos. To understand the realities of endpoint security today, Sophos commissioned independent research specialist Vanson Bourne to survey 3,100 IT managers across the globe. The resulting paper reveals the experiences, concerns ...

Read More

The Current State of Artificial Intelligence in Cybersecurity THE CURRENT STATE OF ARTIFICIAL INTELLIGENCE IN CYBERSECURITY

video

Mar 06, 2019

Eric Stevens, vice president of engineering and principal architect at ProtectWise, discusses the current state of artificial intelligence in cybersecurity and the company's recent report on the topic, The State of AI in Cybersecurity. This video covers these questions and more: How did you get ...

Read More

What is Managed Detection & Response? WHAT IS MANAGED DETECTION & RESPONSE?

blog article

Mar 05, 2019

MDR, which stands for Managed Detection & Response, is an all-encompassing threat detection system, which arose from the need for small/medium sized organisations who lack resources to be able to monitor their network systems in-house. It provides a cost-effective alternative to SIEM (Security I...

Read More

DARPA to Develop $10 Million Open Source Voting System DARPA TO DEVELOP $10 MILLION OPEN SOURCE VOTING SYSTEM

blog article

Mar 05, 2019

The US election might be different in 2020 thanks to a project by DARPA (Defense Advanced Research Projects Agency), the US Department of Defense research division, aiming at bullet-proofing voting machines by moving away from proprietary software that can’t be properly evaluated for bugs, wri...

Read More

Why Internet Security in 2019 Is More Important Than Ever WHY INTERNET SECURITY IN 2019 IS MORE IMPORTANT THAN EVER

blog article

Mar 05, 2019

There is no denying that a lot of tasks nowadays are performed online, our mobile phones, laptops, and tablets have become an extension of ourselves. However, internet security has become a major issue in this digital era. This is most likely due to the hackers and cyber criminals that disguise them...

Read More

Is CompTIA Security+ Worth It? A Salary Perspective IS COMPTIA SECURITY+ WORTH IT? A SALARY PERSPECTIVE

blog article

Mar 05, 2019

IT security is expected to grow 28 percent between 2016 and 2026, making this field an attractive career option. Many professionals turn to certifications to gain a competitive advantage in the marketplace. Today, we take a closer look at the CompTIA Security+ certification and ask the question &nda...

Read More

BDO women in Cyber Security: Farah Chamseddine BDO WOMEN IN CYBER SECURITY: FARAH CHAMSEDDINE

video

Mar 05, 2019

BDO proudly supports women of the future.  BDO in Brisbane's Assistant Manager, Farah Chamseddine, shares her career journey and why she enjoys managing the risks and challenges associated with Cyber Security.

Read More

A Guide to Business Endpoint Security A GUIDE TO BUSINESS ENDPOINT SECURITY

blog article

Mar 05, 2019

What is endpoint security? Endpoint security is the protection of endpoints - any and all devices that connect to your business network including laptops and mobile devices. Protecting business devices is essential, not only because they likely contain sensitive data and customer information, but th...

Read More

Cyber Risk Considerations During the M&A Process CYBER RISK CONSIDERATIONS DURING THE M&A PROCESS

blog article

Mar 05, 2019

Data breaches are a constant in today’s headlines, but in recent years the risk has been front and center of some of the most significant M&A deals. In 2017, Verizon discounted its acquisition price by $350 million when Yahoo belatedly disclosed that it experienced several massive breaches...

Read More

5 Enterprise Cybersecurity Trends You Need to Know 5 ENTERPRISE CYBERSECURITY TRENDS YOU NEED TO KNOW

video

Mar 05, 2019

Are businesses losing the fight against cyberattacks? How can businesses change the cybersecurity paradigm? VMware networking and security leader Tom Gillis dives into the five enterprise cybersecurity trends you need to know. Learn about new approaches to business security that could finally help y...

Read More

Healthcare Cyber Attacks in Numbers HEALTHCARE CYBER ATTACKS IN NUMBERS

infographic

Mar 05, 2019

The Healthcare industry is one of the most targeted sectors when it comes to phishing and broad cyber attacks. As highlighted in our previous infographic, each month at least one healthcare institution was the target of significant breaches. The number of people affected by these breaches is enormou...

Read More

Seasoned Pros Share Career Advice for Cybersecurity Success SEASONED PROS SHARE CAREER ADVICE FOR CYBERSECURITY SUCCESS

blog article

Mar 05, 2019

Whether you are just kicking off your career in cybersecurity or are in the process of building a security team, it can be difficult to know where you should focus your attention to avoid potential missteps along the way. To help, we asked some seasoned pros to share what they’ve learned over ...

Read More

For Cybersecurity to be Successful, Company Culture Matters FOR CYBERSECURITY TO BE SUCCESSFUL, COMPANY CULTURE MATTERS

blog article

Mar 05, 2019

Whether your business has only one location or is a multinational corporation, company culture matters, especially in the case of cybersecurity. When security is treated as a priority from the top down and in every office location, it has the best chance of successfully fending off attacks. Two of t...

Read More

What is a Man in the Middle Attack, and How Do I Prevent It? WHAT IS A MAN IN THE MIDDLE ATTACK, AND HOW DO I PREVENT IT?

blog article

Mar 05, 2019

Modern technologies such as Wi-Fi networks have created enormous convenience for businesses. The ability to connect computers and other assets to a network without having to run data cabling to every workstation simplifies setting up new workers and workstations. However, Wi-Fi access points have al...

Read More

What is Ripper Virus? WHAT IS RIPPER VIRUS?

blog article

Mar 05, 2019

Ripper is a type of virus that randomly infects disk write heads when its active in memory. It infects the disk writes, making the data invalid. Ripper virus can be less harmful, or it can be threatening, or it can destroy the whole system. Regardless of the intensity of the attack, be it big or sma...

Read More

Learn About Quantum Computers and Security at RSAC 2019 LEARN ABOUT QUANTUM COMPUTERS AND SECURITY AT RSAC 2019

blog article

Mar 04, 2019

We’re pleased to say that the QuintessenceLabs team has prepared an exciting display for the annual RSA Conference, all about the security risk of quantum computers and quantum cybersecurity solutions that address it. Find us on the expo floor at booth 1735 in the South Hall, not far from the ...

Read More

Backstory: Global Security Analytics Investigate and hunt at the speed of search BACKSTORY: GLOBAL SECURITY ANALYTICS INVESTIGATE AND HUNT AT THE SPEED OF SEARCH

whitepaper

Mar 04, 2019

Most organizations have already invested heavily in cybersecurity solutions. From firewalls to proxies to endpoint protection to DLP, the average firm has more than 40 types of security technologies in place, each generating telemetry that grows every year. With employees, contractors, partners, and...

Read More

Breach Readiness as a Service: Why You Need it Now BREACH READINESS AS A SERVICE: WHY YOU NEED IT NOW

blog article

Mar 04, 2019

Canada's new data breach reporting requirements, contained in Division 1.1 of PIPEDA, are in effect. Are you prepared? If you've ever thought "I don't have information that anyone would want" or "I'm too small to be a target for a cyber-attack", then you're al...

Read More

Managing Third-Party Risk MANAGING THIRD-PARTY RISK

video

Mar 04, 2019

Edwin Lim, director of professional services - APJ, Trustwave, a Singtel company . The level of integration that third-party vendors and services have in the enterprise environment is introducing risks vectors that are not well understood, says Edwin Lim of Trustwave. In this video interview at the ...

Read More

 Better Security Starts with the Basics BETTER SECURITY STARTS WITH THE BASICS

whitepaper

Mar 04, 2019

Get a complimentary copy of IDC's Solving the "Password Problem" for Better Security Despite the sophisticated cyber security measures businesses are putting in place, something as simple as password security continues to pose a major threat. Employees battle password overload every day, and aren't...

Read More

 2018 Global Password Security Statistics Report 2018 GLOBAL PASSWORD SECURITY STATISTICS REPORT

whitepaper

Mar 04, 2019

Explore the state of password security in 2018 and what you can do to stay secure. LastPass has analyzed 43,000 business to show where password habits fall short. You know password management is important. But is your business failing to invest in this easy security and productivity win? In our fir...

Read More

Human Error HUMAN ERROR'S GUIDE TO KEEPING SECURITY SIMPLE

video

Mar 03, 2019

95 % of security breaches involve human error. Yet, only 11% of global companies conduct monthly awareness training. Mimecast Awareness Training delivers effective online security training to employees in roughly three minutes a month. Each monthly training module is anchored on a short video in the...

Read More

Understanding data protection and compliance UNDERSTANDING DATA PROTECTION AND COMPLIANCE

video

Mar 02, 2019

Cloud services help you achieve compliance with lower costs and less efforts. When it comes to being compliant with various regulations or industrial standards, organizations should consider conducting risk assessments for the cloud services they are using or considering to adopt. These assessments ...

Read More

IoT and DDoS Attacks: A Match Made in Heaven IOT AND DDOS ATTACKS: A MATCH MADE IN HEAVEN

blog article

Mar 01, 2019

By 2020, Gartner predicts the total number of IoT devices will reach 20.4 billion. At the same time, DDoS attacks are on the rise, with Cisco estimating that the number of DDoS attacks exceeding 1 gigabit of traffic per second will soar to 3.1 million by 2021. This is no coincidence: IoT devices are...

Read More

Spectre, Google, and the Universal Read Gadget SPECTRE, GOOGLE, AND THE UNIVERSAL READ GADGET

blog article

Mar 01, 2019

Spectre, a seemingly never-ending menace to processors, is back in the limelight once again thanks to the Universal Read Gadget. First seen at the start of 2018, Spectre emerged alongside Meltdown as a major potential threat to people’s system security. Meltdown and Spectre. Meltdown targeted ...

Read More

Growing IT-OT Integration: Addressing the Risks It Brings GROWING IT-OT INTEGRATION: ADDRESSING THE RISKS IT BRINGS

video

Mar 01, 2019

While IT and OT integration has brought about new levels of operational efficiency, it has also introduced serious cyber risks that conventional IT security approaches might fail to address, says IBM Security's Paul Garvey.

Read More

How Triton Malware Targets Industrial Control Systems HOW TRITON MALWARE TARGETS INDUSTRIAL CONTROL SYSTEMS

video

Mar 01, 2019

Sergio Caltagirone, director of threat intelligence and analytics, Dragos. Industrial control systems run the technology used in advanced manufacturing, pharmaceuticals, electricity generation, oil and gas, power plants used by hospitals and much more. Thankfully, these systems have been relatively ...

Read More

MNOs seek stronger mobile security for customers MNOS SEEK STRONGER MOBILE SECURITY FOR CUSTOMERS

blog article

Mar 01, 2019

Avast partners with mobile carriers to provide the security consumers need. Data breaches, stolen passwords, spyware — consumers are all too familiar with the dangers of today’s digital world, and they’re worried. According to a study done by Wipro, if you take all the data theft o...

Read More

Nothing Can Disrupt a Business Faster Than a Data Breach NOTHING CAN DISRUPT A BUSINESS FASTER THAN A DATA BREACH

blog article

Mar 01, 2019

Breach readiness must take center stage for every organization. It is no longer a matter of ‘if’ a breach will occur but ‘when’. Nothing can disrupt a business faster than a data breach. Any organization that stores or handles any personally identifiable information (PII) for...

Read More

RSA RISK FRAMEWORK FOR MULTI-CLOUD RISK: MANAGING RISK IN A VIRTUALIZED WORLD RSA RISK FRAMEWORK FOR MULTI-CLOUD RISK: MANAGING RISK IN A VIRTUALIZED WORLD

whitepaper

Mar 01, 2019

Digital Transformation is a journey underway in organizations across the globe. Defined as an organization’s rapid adoption of technology and increased integration of business processes, Digital Transformation creates opportunities to gain strategic efficiencies and capabilities, by providing ...

Read More

3 Unique Ways App Development Companies Can Improve Cyber Security Processes 3 UNIQUE WAYS APP DEVELOPMENT COMPANIES CAN IMPROVE CYBER SECURITY PROCESSES

blog article

Mar 01, 2019

The modern world is addicted to the use of mobile devices. Virtually every activity or task handled electronically can be performed with a mobile device, including: shopping, banking, entertainment, and even controlling other devices in the workplace, shop, and home. No doubt, app development compan...

Read More

Coinhive, the in-browser cryptomining service beloved by hackers, is dead COINHIVE, THE IN-BROWSER CRYPTOMINING SERVICE BELOVED BY HACKERS, IS DEAD

blog article

Feb 28, 2019

If you think back to last year, Coinhive was everywhere. The service offered any website an arguably legitimate way of generating income that didn’t rely upon online adverts. And plenty of well-known sites, such as Showtime, Salon.com and The Pirate Bay, were happy to give it a go. Rather than...

Read More

Ways to Secure Your IT Network WAYS TO SECURE YOUR IT NETWORK

infographic

Feb 28, 2019

Learn the few simple things to secure your network against cybercriminals and make sure that your network is extra safe. Edit your setting to block unauthorized access to computer and network. Follow these rules that can help you control the traffic, and will not allow unauthorized access to your sy...

Read More

Do You Know How Viruses And Malware Get Into Your PC? DO YOU KNOW HOW VIRUSES AND MALWARE GET INTO YOUR PC?

blog article

Feb 28, 2019

Did you know, there are countless ways through which viruses can enter your laptops and computers? Viruses and malware are types of malicious software specially designed by cyber crooks to infect your computers. These malicious software spreads from one system to another and can wipe away all your l...

Read More

Healthcare HEALTHCARE'S CYBERSECURITY KNOWLEDGE GAP

infographic

Feb 28, 2019

Anyone in a healthcare organization can find themselves targeted through phishing and business email compromise (BEC) — some of the industry’s most pervasive and damaging cyber threats. As our new infographic shows, many employees aren’t prepared to protect against these attacks, w...

Read More

Endpoint Protection: Taking the Proactive Approach ENDPOINT PROTECTION: TAKING THE PROACTIVE APPROACH

blog article

Feb 28, 2019

An endpoint is any device that is connected to the network and has two-way communication with the network. This could include laptops, desktops, and special purpose systems like Point of Sale (POS) terminals, ATMs, ticket counters, kiosks, and servers. Until a few years ago, attackers breached the p...

Read More

Is antivirus protection necessary for my business? IS ANTIVIRUS PROTECTION NECESSARY FOR MY BUSINESS?

blog article

Feb 28, 2019

With threats like ransomware, businesses can’t afford to leave their networks and data unsecured. If you've been wondering whether your business requires antivirus protection, the short answer is yes. Even though Windows 10 has its own well-rated built-in antivirus program, Windows Defende...

Read More

How Did January Kick Off Threat Protection? HOW DID JANUARY KICK OFF THREAT PROTECTION?

blog article

Feb 28, 2019

It is often said that each new year brings more cybersecurity threats than the previous one. So, how is 2019 shaping up so far compared to 2018? Has the new year kicked off with better threat protection than the last year, or are cyber threats getting worse? Let’s look at some of the major eve...

Read More</