RESOURCES


home.aspx
   
Singapore 11th for cyber threats sources, says Kaspersky SINGAPORE 11TH FOR CYBER THREATS SOURCES, SAYS KASPERSKY

blog article

Jul 17, 2019

Kaspersky’s latest data from Kaspersky Security Network (KSN) has uncovered more than two million incidents which originated from servers located in Singapore in the second quarter of 2019. This places Singapore at 11th place globally when it comes to locations with the most number of incident...

Read More

Artificial intelligence in cyber security: The savior or enemy of your business? ARTIFICIAL INTELLIGENCE IN CYBER SECURITY: THE SAVIOR OR ENEMY OF YOUR BUSINESS?

blog article

Jul 17, 2019

Artificial intelligence poses both a blessing and a curse to businesses, customers, and cybercriminals alike. AI technology is what provides us with speech recognition technology (think Siri), Google’s search engine, and Facebook’s facial recognition software. Some credit card companies ...

Read More

New cyberthreats require new ways to protect democracy NEW CYBERTHREATS REQUIRE NEW WAYS TO PROTECT DEMOCRACY

blog article

Jul 17, 2019

Starting today at the Aspen Security Forum we’re demonstrating the first voting system running Microsoft ElectionGuard as an example of how ElectionGuard can enable a new era of secure, verifiable voting. The demo shows how it’s also possible to make voting more accessible for people wit...

Read More

How Electric Utilities Can Reduce Their Cyber Risk HOW ELECTRIC UTILITIES CAN REDUCE THEIR CYBER RISK

blog article

Jul 17, 2019

A successful cyberattack against the electric grid could have enormous consequences that would ripple throughout other industries. In a January 2019 report, “Managing Cyber Risk in the Electric Power Sector,” Deloitte notes that energy is one of 16 critical infrastructure sectors identif...

Read More

Cybersecurity Tools for CPAs CYBERSECURITY TOOLS FOR CPAS

blog article

Jul 16, 2019

In a speech at Baruch College’s 18th Annual Financial Reporting Conference, PCAOB member Kathleen Hamm stated: “Technology offers the promise of combining increased efficiencies with improved effectiveness, resulting in enhanced audit quality” (May 2, 2019, http://bit.ly/2HNfgxa). ...

Read More

How to get specific security information about AWS services HOW TO GET SPECIFIC SECURITY INFORMATION ABOUT AWS SERVICES

blog article

Jul 15, 2019

We are excited to announce the launch of dedicated security chapters in the AWS documentation for over 40 services. Security is a key component of your decision to use the cloud. These chapters can help your organization get in depth information about both the built in and the configurable security ...

Read More

SailPoint Levels-Up their ABM Strategy with Intent Data SAILPOINT LEVELS-UP THEIR ABM STRATEGY WITH INTENT DATA

blog article

Jul 15, 2019

The buyer’s journey has changed in a way which leaves many sales and marketing teams struggling to find insight from within what we call the Dark Funnel. However, many technology companies are starting to build solutions to address the radical new way customers engage and buy today by collecti...

Read More

Duo Security Sets BDRs up for Success with 6sense DUO SECURITY SETS BDRS UP FOR SUCCESS WITH 6SENSE

blog article

Jul 15, 2019

The role of a Business Development Rep can be a daunting one. Knowing where to prioritize when you have over 1,000 accounts and knowing what content to reach out to them and engage them with can be an impossible task. But if you have the right intent data that can show you where the account is in th...

Read More

Mitigation Strategies for Cyber Attacks at Your Small Business MITIGATION STRATEGIES FOR CYBER ATTACKS AT YOUR SMALL BUSINESS

blog article

Jul 15, 2019

If you’re wondering how to protect your small business against a cyber attack, you’re not alone. Almost 60% of cyber attack victims are small businesses, and within two years of the first attack, the likelihood that a small business will experience another is approximately 28%. In respon...

Read More

Meet Extenbro, a new DNS-changer Trojan protecting adware MEET EXTENBRO, A NEW DNS-CHANGER TROJAN PROTECTING ADWARE

blog article

Jul 15, 2019

Recently, we uncovered a new DNS-changer called Extenbro that comes with an adware bundler. These DNS-changers block access to security-related sites, so the adware victims can’t download and install security software to get rid of the pests. From our viewpoint, this might be like sending in a...

Read More

AI Could Escalate New Type Of Voice Phishing Cyber Attacks AI COULD ESCALATE NEW TYPE OF VOICE PHISHING CYBER ATTACKS

blog article

Jul 15, 2019

Earlier this week, the Israel National Cyber Directorate (INCD) issued a warning of a new type of cyber-attack that leverages artificial intelligence technology to impersonate senior enterprise executives. The method instructs company employees to perform transactions including money transfers and o...

Read More

Cyber Security: What You Need to Know to Face the Inevitable CYBER SECURITY: WHAT YOU NEED TO KNOW TO FACE THE INEVITABLE

blog article

Jul 14, 2019

The question is not whether a cyber breach will occur – it’s when and how to best mitigate its negative impacts. While the massive malware attacks like WannaCry or NotPetya garner all the headlines, these are relative rarities in cybercrime. Joe Scargill, U.S. Secret Service Agent, expla...

Read More

Clemson and other universities work to improve cybersecurity CLEMSON AND OTHER UNIVERSITIES WORK TO IMPROVE CYBERSECURITY

blog article

Jul 14, 2019

CLEMSON - This spring, a batch of tests were sent to 100 Clemson University faculty and staff emails in an attempt to access private and personal information. A fourth of the emails were blocked by the security system, and several additional recipients alerted the university to the phishing attempt....

Read More

Unusual Linux Ransomware Targets NAS Servers UNUSUAL LINUX RANSOMWARE TARGETS NAS SERVERS

blog article

Jul 12, 2019

A rare instance of ransomware targeting Linux-based file storage systems (network-attached storage servers, specifically) has been spotted, spreading via 15 separate but related campaigns. The adversaries behind the effort are continuing their depredations on an ongoing basis, according to researche...

Read More

NATO Satellites Are At Risk of Cyber Attack NATO SATELLITES ARE AT RISK OF CYBER ATTACK

blog article

Jul 12, 2019

Military satellites are in critical threat of being attacked by malicious actors. As the threat of nation-states and hackers increases, security experts have become concerned with the attack on our infrastructure in space. The U.S and its Allies depend on satellites for military, intelligence gather...

Read More

AGENT SMITH MALWARE THAT SECRETLY REPLACES WHATSAPP SPREADS TO 25 MILLION PHONES AGENT SMITH MALWARE THAT SECRETLY REPLACES WHATSAPP SPREADS TO 25 MILLION PHONES

blog article

Jul 11, 2019

A new type of mobile malware that secretly replaces popular apps like WhatsApp on people’s phones has already infected more than 25 million devices, security researchers have revealed. Dubbed ‘Agent Smith’, the malware exploits vulnerabilities within the Android operating system to...

Read More

ZEEK-BASED SECURITY DETECTION & MITIGATION ZEEK-BASED SECURITY DETECTION & MITIGATION

blog article

Jul 11, 2019

Today, there are many open-source software projects that provide incredible value to solving a myriad of problems for security detection and mitigation, but not all frameworks necessarily translate from conception into operation easily. Zeek is different. Rooted in 20 years of research,  Zeek, ...

Read More

6 Ways to Take Your Agency’s Application Security Program to the Next Level 6 WAYS TO TAKE YOUR AGENCY’S APPLICATION SECURITY PROGRAM TO THE NEXT LEVEL

blog article

Jul 11, 2019

If your agency has already implemented some form of application security, you’re already ahead of the curve. But your program may still have room for improvement. To help you take your application security (AppSec) program to the next level, we’ve put together this list of best practices...

Read More

The Importance of Computer Security THE IMPORTANCE OF COMPUTER SECURITY

blog article

Jul 11, 2019

Computer security tactics aren't often thought about until a problem arises—and at that point, a break in security can cause harmful and potentially major issues. Because we all want to keep our computers and information safe, we have answers to some frequently asked questions about potent...

Read More

Cyber Truth or Cyber Myth? CYBER TRUTH OR CYBER MYTH?

blog article

Jul 10, 2019

As if trying to assemble a successful cybersecurity department were not difficult enough, one of the hardest battles we all find ourselves fighting is the one against well-meaning but often misleading information. Sometimes the information is wrong, but more often it is right … but only when ...

Read More

Executives’ Changing Views on Cybersecurity EXECUTIVES’ CHANGING VIEWS ON CYBERSECURITY

blog article

Jul 09, 2019

What does the shift in how cybersecurity is viewed by senior executives within organizations mean? To find out, Radware surveyed more than 260 executives worldwide and discovered that cybersecurity has moved well beyond the domain of the IT department and is now the direct responsibility of senior e...

Read More

Why Cyber Security Exercises Work: Three Real World Examples WHY CYBER SECURITY EXERCISES WORK: THREE REAL WORLD EXAMPLES

blog article

Jul 09, 2019

Cyber security exercises have become more prevalent in recent years. Despite this, many people are not familiar with them. In today's blog on why cyber security exercises work, we'll give you three real world examples you can learn from and possibly apply to your situation. Exercises are use...

Read More

Cybersecurity Considerations for IoT Product Design CYBERSECURITY CONSIDERATIONS FOR IOT PRODUCT DESIGN

blog article

Jul 09, 2019

Mitigating cyber threats is critical to the launch of a successful product. Like technology itself, the Internet of Things (IoT) security is still in its infancy and is evolving rapidly. The legislation is also developing rapidly, with cybersecurity acts in EU and California creating further regulat...

Read More

Senate Bill Would Help Small Businesses Improve Cybersecurity SENATE BILL WOULD HELP SMALL BUSINESSES IMPROVE CYBERSECURITY

blog article

Jul 09, 2019

Small businesses are more likely to lack resources to build robust cybersecurity capabilities, but Sens. Gary Peters, D-Mich., and Marco Rubio, R-Fla., are looking to address that challenge with their recently introduced Small Business Cybersecurity Assistance Act. The bill would help educate small ...

Read More

Zoom fixes major Mac webcam security flaw with emergency patch ZOOM FIXES MAJOR MAC WEBCAM SECURITY FLAW WITH EMERGENCY PATCH

blog article

Jul 09, 2019

Video conferencing provider Zoom has pushed out an emergency patch to address the zero-day vulnerability for Mac users that could potentially expose a live webcam feed to an attacker, launching you into a Zoom video chat you’d never intended to launch. The move is a surprise reversal of Zoom&r...

Read More

A peek into malware analysis tools A PEEK INTO MALWARE ANALYSIS TOOLS

blog article

Jul 09, 2019

So, what is malware analysis and why should I care? With the commercialization of cybercrime, malware variations continue to increase at an alarming rate, and this is putting many a defender on their back foot. Malware analysis — the basis for understanding the inner workings and intentions of...

Read More

Security SECURITY'S NEW FOCUS: DEFENSIBILITY

blog article

Jul 08, 2019

So, you’ve obtained the buy-in, spent the money, and have gone through the motions of creating your information security program. You’ve done what you believe to be right in terms of design, implementation and ongoing oversight, all in the interest of minimizing business risks. Framework...

Read More

Why 5G and AI will determine cybersecurity strategy for the next decade WHY 5G AND AI WILL DETERMINE CYBERSECURITY STRATEGY FOR THE NEXT DECADE

blog article

Jul 08, 2019

BI.ZONE CEO Dmitry Samartsev and World Economic Forum head of operations William Dixon analysed the most popular technologies and evaluated the cyber risks of tomorrow. Experts talked about the three technologies that are likely to determine the next decade expressed in a joint analytical article. O...

Read More

Prioritising information security during digital transformation PRIORITISING INFORMATION SECURITY DURING DIGITAL TRANSFORMATION

blog article

Jul 08, 2019

Security is on everyone’s mind these days – especially when it comes to organisations that use technology as a main component of their service offering. Growing pressure from consumer expectations is driving many companies to transform and provide customers and members with the fast, dig...

Read More

Why Sales Leaders Need to Digitally Transform Their Teams WHY SALES LEADERS NEED TO DIGITALLY TRANSFORM THEIR TEAMS

blog article

Jul 08, 2019

Three key trends are driving the need for sales leaders to digitally transform their organizations. First, b-to-b buyers are conducting more of their purchase journey in the digital arena and demanding the same kind of frictionless and seamless customer experience they enjoy as consumers. Second, th...

Read More

The Most Important Metric for Sales Leaders in Subscription Businesses to Track and Use to Drive Revenue Growth THE MOST IMPORTANT METRIC FOR SALES LEADERS IN SUBSCRIPTION BUSINESSES TO TRACK AND USE TO DRIVE REVENUE GROWTH

blog article

Jul 08, 2019

Subscription businesses that charge customers monthly for using their offerings are expanding rapidly in response to consumers’ and b-to-b buyers’ desire to try a product and walk away easily if they’re not achieving the expected value. However, the subscription-based business mode...

Read More

EVERYTHING YOU NEED TO KNOW TO GET STARTED IN CYBERSECURITY EVERYTHING YOU NEED TO KNOW TO GET STARTED IN CYBERSECURITY

blog article

Jul 08, 2019

The cybersecurity skills shortage is a pressing concern for businesses, with the current shortfall estimated to be around 2 million unfilled positions, a number that is expected to rise to around 3.5 million by 2021. If there’s an upside to this shortage, it is that for those interested in a c...

Read More

State and Local Agencies Can Boost Cybersecurity with Federal Support STATE AND LOCAL AGENCIES CAN BOOST CYBERSECURITY WITH FEDERAL SUPPORT

blog article

Jul 08, 2019

Security is not a one-time event: Everyone knows it takes constant monitoring to detect and shore up weaknesses, find and patch vulnerabilities, and stay on top of constantly evolving threats. This requires time, expertise, tools and money — but help is at hand. The U.S. Department of Homeland...

Read More

How to Secure Your Mid-Size Organization from the Next Cyber Attack HOW TO SECURE YOUR MID-SIZE ORGANIZATION FROM THE NEXT CYBER ATTACK

blog article

Jul 08, 2019

Cyber-attacks have become very common these days, and it is carried out on a full-scale. More and more mid-sized organizations are frequently targetted. However, as for the cybersecurity personnel who think that mid-sized organizations are safe, you guys need to think again! By far, the online attac...

Read More

Current Threats in Ransomware CURRENT THREATS IN RANSOMWARE

blog article

Jul 07, 2019

Ransomware “Growth” Ransomware attacks have gained prominence in recent times, and industries and governments across the world have implemented policies and advisories to counter the threat. The attack involves a malicious program that holds user or organizational data for “ransom&...

Read More

31 Must-Know Healthcare Cybersecurity Statistics For 2019 31 MUST-KNOW HEALTHCARE CYBERSECURITY STATISTICS FOR 2019

blog article

Jul 07, 2019

The healthcare industry is a prime target of hackers. The importance of cybersecurity in healthcare is an essential consideration for all organizations handling patient data. Be aware of the latest threats; read our article on the latest Healthcare Cybersecurity Statistics. Cybersecurity Healthcare ...

Read More

The critical shortage of cybersecurity expertise THE CRITICAL SHORTAGE OF CYBERSECURITY EXPERTISE

blog article

Jul 04, 2019

For many Canadians, the world of cyberattacks and hackers still seems far removed from their day-to-day activities. Perception, however, does not always match reality. Anyone employed by a sizable business in the private or public sector works in a place where cybersecurity is taken very seriously. ...

Read More

Centre for police cyber security goes live CENTRE FOR POLICE CYBER SECURITY GOES LIVE

blog article

Jul 04, 2019

It went into operation this week with an initial monitoring service that scrutinises the force’s cloud based IT estate, and the programme team is now working on a phased implementation programme to bring in other forces across England and Wales. The NMC has been set up under the National Enabl...

Read More

Critical Security Flaws in Zipato Smart Hub Let Hackers Walk into Your Home CRITICAL SECURITY FLAWS IN ZIPATO SMART HUB LET HACKERS WALK INTO YOUR HOME

blog article

Jul 04, 2019

Three security vulnerabilities in Zipato smart hubs, including a critical one, enable hackers, when combined, to break into a user’s home by easily unlocking smart locks on doors, writes TechCrunch. “Two vulnerabilities are in the design and implementation of the authentication mechanism...

Read More

How to make sense of Cybersecurity Frameworks HOW TO MAKE SENSE OF CYBERSECURITY FRAMEWORKS

blog article

Jul 04, 2019

Every time when we have something precious, it is human nature to preserve it from any external damage or threat. Be it the money, jewelry, or properties we ensure everything is safe and intact by practicing due security measures. As a result, sighting security guards is no big deal, as the world ar...

Read More

Ransomware As A Tool – LockerGoga RANSOMWARE AS A TOOL – LOCKERGOGA

blog article

Jul 03, 2019

Ransomware authors keep experimenting with the development of payload in various dimensions. In the timeline of ransomware implementations, we have seen its evolution from a simple screen locker to multi-component model for file encryption, from novice approach to a sophisticated one. The Ransomware...

Read More

Protect sensitive information with Seqrite Encryption PROTECT SENSITIVE INFORMATION WITH SEQRITE ENCRYPTION

blog article

Jul 03, 2019

Among the most important assets that an enterprise possesses, data is undoubtedly the most important. In today’s digital age, there are reams of data being processed, transmitted and disseminated every millisecond and much of the world’s economy runs on data. Hence, organizations must ta...

Read More

Finding New Approaches to Web Application Security FINDING NEW APPROACHES TO WEB APPLICATION SECURITY

blog article

Jul 03, 2019

Most of us rely on web applications for, well, just about everything, which is why a distributed denial-of-service (DDoS) attack or other Domain Name System (DNS)-related outage can have such a negative impact on a business. Because so much is centered on web services and similar technology nowadays...

Read More

Tensions Between Countries Result in Cyber Attacks TENSIONS BETWEEN COUNTRIES RESULT IN CYBER ATTACKS

blog article

Jul 02, 2019

Today, threats of espionage between governments exist for multiple reasons. It stems from the United States trading and receiving cyber-attacks with China and Iran. Threats stem from response to the tense political climate between the two countries and the United States. For China and Iran, the rece...

Read More

Smart Home Device Provider Leaks Customer Information SMART HOME DEVICE PROVIDER LEAKS CUSTOMER INFORMATION

blog article

Jul 02, 2019

Smart home management platform running on the ElasticSearch server has been leaking private data for billions of users. The publicly accessible server is owned by Orvibo, a Chinese smart home provider. Obvibo offers its customers a platform, called SmartMate, for managing smart devices in their home...

Read More

Want to Sleep Better at Night? Start Thinking Differently about Ransomware WANT TO SLEEP BETTER AT NIGHT? START THINKING DIFFERENTLY ABOUT RANSOMWARE

blog article

Jul 02, 2019

One of the most well-known ransomware attacks occurred in May 2017, when the Wannacry attack unfolded. That attack affected over 200,000 users and infected more than 300,000 computers. CBS News estimated the WannaCry attack resulted in losses upwards of $4 billion. How? When hundreds of thousands of...

Read More

Sircam: Worm, Virus, Trojan Horse? SIRCAM: WORM, VIRUS, TROJAN HORSE?

blog article

Jul 02, 2019

At Exabeam, we’re not only interested in developing the newest cybersecurity, we’re also fascinated by what we can learn from older security technologies. Each month the History of Cybersecurity 2019 Calendar features key dates in cybersecurity history, along with a related trivia questi...

Read More

Phishing, cryptocurrency attacks threaten data security – Microsoft PHISHING, CRYPTOCURRENCY ATTACKS THREATEN DATA SECURITY – MICROSOFT

blog article

Jul 02, 2019

Microsoft has advised government and business organisations to put adequate security in place to prevent cyberattacks through phishing and cryptocurrency in the coming months. Speaking at a cybersecurity roundtable in Lagos, the company said it had observed rising incidents of Enterprise Resource Pl...

Read More

4 IT Security Best Practices SMBs Need To Adopt Immediately 4 IT SECURITY BEST PRACTICES SMBS NEED TO ADOPT IMMEDIATELY

blog article

Jul 01, 2019

While cyberattacks on companies that are household names are often highly publicised and reported on, attacks on small businesses often go unnoticed by the media despite accounting for 43% of targeted attacks. These attacks might not hit the front page, but they are having a significant impact on sm...

Read More

Privacy and Data Protection in Multimedia Apps PRIVACY AND DATA PROTECTION IN MULTIMEDIA APPS

blog article

Jul 01, 2019

The mobile application (app) ecosystem has emerged to become one of the biggest global industries. Multimedia apps continue to be the most used form of communication and have not just changed the way we interact in our private lives: they have become an important means for organizations to interact ...

Read More

Qatar Issues Aviation Cybersecurity Guidelines QATAR ISSUES AVIATION CYBERSECURITY GUIDELINES

blog article

Jul 01, 2019

To help avoid disruption of civil aviation operations, the Civil Aviation Authority of Qatar and the Ministry of Communications and Transport have issued cybersecurity guidelines. CAA's new guidelines suggest organizations develop effective risk management, build a structure to respond to breach...

Read More

How To Secure The Internet Of Battlefield Things From Cyber Attacks HOW TO SECURE THE INTERNET OF BATTLEFIELD THINGS FROM CYBER ATTACKS

blog article

Jun 30, 2019

The proliferation of devices on the Internet is becoming a tidal wave. In addition to your phone, computer, video game console and television, the Internet now connects practically everything that has electronics and sensors: household appliances, heating and air conditioning systems, cars, airplane...

Read More

New Dridex Variant Slips By Anti-Virus Detection NEW DRIDEX VARIANT SLIPS BY ANTI-VIRUS DETECTION

blog article

Jun 28, 2019

A never-before-seen Dridex variant has been spotted in phishing emails using anti-virus detection evasion tactics. Researchers have spotted a variant of the Dridex banking trojan with new obfuscation capabilities that help it skirt anti-virus detection. While Dridex has been around since 2011, resea...

Read More

Cyber Attack: Securing Digital Payments In The Age Of Emerging Technologies CYBER ATTACK: SECURING DIGITAL PAYMENTS IN THE AGE OF EMERGING TECHNOLOGIES

blog article

Jun 28, 2019

About 70% of the organizations have experienced some form of cyber-attack. The attackers today are progressively building advanced technologies to target core banking systems. Patterns of fraudulent activity can only be detected on platforms that enable cross-border data flows. In recent times, Indi...

Read More

Is Being Secure and Being Compliant the Same Thing? IS BEING SECURE AND BEING COMPLIANT THE SAME THING?

blog article

Jun 28, 2019

Often times, when I ask a ConnectWise partner if they’re offering security to their SMB customers, their answer revolves around consulting on compliance. Verticals like healthcare, financial, government, and retail are low-hanging fruit for security revenue opportunities because compliance is ...

Read More

THE NEED FOR A DIVERSE CYBERSECURITY INDUSTRY IS REAL THE NEED FOR A DIVERSE CYBERSECURITY INDUSTRY IS REAL

blog article

Jun 27, 2019

The word “diversity” has become a buzzword among technical professionals and has been overused many times with little or no meaning to it. Instead of exploiting the word, brands and companies need to prove it. The reality is that cybersecurity lacks diversity, and this article will help ...

Read More

How to make cybersecurity resonate with employees HOW TO MAKE CYBERSECURITY RESONATE WITH EMPLOYEES

blog article

Jun 27, 2019

Organisations are facing increased threats from cyber attacks, and employees are often the weakest link in their defence posture. As much as you might hope that common sense would prevail, the reality is that best practices can often go in one ear and out the other. Employees who aren’t proper...

Read More

What Nonprofits Need to Know About Zero-Trust Security WHAT NONPROFITS NEED TO KNOW ABOUT ZERO-TRUST SECURITY

blog article

Jun 27, 2019

During the Cold War, the U.S.’s mantra was “trust, but verify.” In the fight against cyberattackers, the new mantra is “never trust, always verify.” Nonprofit organizations once protected their IT environments by creating a perimeter around their networks. Everyone insi...

Read More

NIST Releases IoT Cyber Security And Privacy Risks Report NIST RELEASES IOT CYBER SECURITY AND PRIVACY RISKS REPORT

blog article

Jun 27, 2019

There are many enterprises already reaping the benefits of leveraging the Internet of Things (IoT) technology and devices, however as Bain & Company reports, “The IoT could be growing even faster with better cyber security.” In fact, their research shows that customers would pay 22% ...

Read More

Drafting an Appropriate Cybersecurity Policy DRAFTING AN APPROPRIATE CYBERSECURITY POLICY

blog article

Jun 26, 2019

Cyber threats, cyberattacks, and hacks are getting more and more common so companies are forced to invest in cybersecurity systems. Even though your business may have an excellent cybersecurity plan, you’re still at risk of being attacked; it’s simply the reality of today’s world. ...

Read More

Six reasons your business needs cyber security SIX REASONS YOUR BUSINESS NEEDS CYBER SECURITY

blog article

Jun 26, 2019

Dr Bright Mawudor is the head of cyber security services at Internet Solutions Kenya. He explains why businesses cannot afford to ignore cyber security. 1. Data security Businesses collect all sorts of data in their day-to-day operations, from customer names and IDs to phone numbers and account deta...

Read More

Silex Malware Renders Internet-of-Things Devices Useless. Here’s How to Prevent It SILEX MALWARE RENDERS INTERNET-OF-THINGS DEVICES USELESS. HERE’S HOW TO PREVENT IT

blog article

Jun 26, 2019

A new malware known as Silex is bringing smart devices to their knees. The Silex malware, according to ZDNet, ruins smart devices by gaining access to and destroying a device’s storage, eliminating its firewall and removing its network configuration. From here, the device stops working. Silex ...

Read More

Malspam Emails Blanket LokiBot, NanoCore Malware With ISO Files MALSPAM EMAILS BLANKET LOKIBOT, NANOCORE MALWARE WITH ISO FILES

blog article

Jun 25, 2019

A new malicious campaign is spreading LokiBot and NanoCore trojans under the guise of an ISO file claiming to be an invoice. An ongoing spam campaign has been spotted using ISO disk image file attachments to disguise various information-stealing trojans, including LokiBot and NanoCore. Researchers s...

Read More

Suricata IDS: an overview of threading capabilities SURICATA IDS: AN OVERVIEW OF THREADING CAPABILITIES

blog article

Jun 25, 2019

A common discussion in the security industry is how to improve the effectiveness of detection and prevention systems. You can find tons of documentation and books about: The Defender's Dilemma, Blue Team vs Red Team, A Comprehensive Security Approach, among others. However, in any organization, ...

Read More

How Machine Learning Within IncMan SOAR Empowers Security Analysts HOW MACHINE LEARNING WITHIN INCMAN SOAR EMPOWERS SECURITY ANALYSTS

blog article

Jun 25, 2019

In a recent blog post we took a look at the differences between Artificial Intelligence (AI) and Machine Learning (ML) and how today there were being used within the cybersecurity industry to help fight the growing number and sophistication of cyber attacks. Artificial intelligence and machine learn...

Read More

Level of Cyber Risk to Businesses Held Steady in First Quarter According to LEVEL OF CYBER RISK TO BUSINESSES HELD STEADY IN FIRST QUARTER ACCORDING TO

blog article

Jun 25, 2019

Cyber security executives and teams—and for that matter organizations as a whole—could certainly use some good news when it comes to risk assessment, and perhaps a recent report provides just that. The Assessment of Business Cyber Risk (ABC) report released in April 2019 by the U.S. Cham...

Read More

How to Optimize Your Conversion Funnel, from ToFu to BoFu HOW TO OPTIMIZE YOUR CONVERSION FUNNEL, FROM TOFU TO BOFU

blog article

Jun 25, 2019

No matter who your customer is or what you’re selling, it’s more likely than not that your customer will have to go through several steps before choosing to buy your product or service. Think about your own shopping habits: you don’t just buy the first thing you see. The first thin...

Read More

21 Ways to Triple Your B2B E-Commerce Conversions 21 WAYS TO TRIPLE YOUR B2B E-COMMERCE CONVERSIONS

blog article

Jun 25, 2019

It takes thoughtful work to scale an e-commerce store. I’m sure you’ve had a few growing pains of your own getting to the point where you are today. However, you’re reading this because you may not be content with where your conversions are at this precise moment. You may not even ...

Read More

Could the Breadcrumb Technique Help Boost Your Landing Page Conversions? COULD THE BREADCRUMB TECHNIQUE HELP BOOST YOUR LANDING PAGE CONVERSIONS?

blog article

Jun 24, 2019

We’ve all heard the term “less is more”. And we’ve been told this applies for landing pages too. I.e. your forms should be short and only ask for only the bare minimum of required information if you want to convert. As an example, one of the main questions someone typically h...

Read More

5 ways agencies can clean up their cyber hygiene 5 WAYS AGENCIES CAN CLEAN UP THEIR CYBER HYGIENE

blog article

Jun 24, 2019

Since the concept of cyber hygiene was described by Vinton Cerf in an address to Congress in 2000, government agencies have been cognizant of maintaining a holistic view of their security posture. In fact, in recent years there have been numerous efforts made to improve how agencies maintain their c...

Read More

How Artificial Intelligence (AI) Helps Bridge the Cybersecurity Skills Gap HOW ARTIFICIAL INTELLIGENCE (AI) HELPS BRIDGE THE CYBERSECURITY SKILLS GAP

blog article

Jun 24, 2019

The widespread shortage of skilled security operations and threat intelligence resources in security operations centers (SOCs) leaves many organizations open to the increased risk of a security incident. That’s because they are unable to effectively investigate all discovered, potentially mali...

Read More

NIST issues new cyber guidelines for contractors NIST ISSUES NEW CYBER GUIDELINES FOR CONTRACTORS

blog article

Jun 24, 2019

The National Institute of Standards and Technology has issued draft security guidance to help contractors working with high-value assets protect the unclassified (but still sensitive) government data that resides on their networks against advanced persistent threats and other attacks. A draft versio...

Read More

The week in security: Rethinking security in an age of cyber insecurity THE WEEK IN SECURITY: RETHINKING SECURITY IN AN AGE OF CYBER INSECURITY

blog article

Jun 24, 2019

It might all have been easier if the Internet had never existed, but the compromise of WhatsApp reflects the ever-changing nature of attacks in today’s cybersecurity threat climate. One approach to hardening vulnerable data has been to use field-level encryption, with MongoDB storing its data ...

Read More

SME collaboration delivering effective Public Sector IT security SME COLLABORATION DELIVERING EFFECTIVE PUBLIC SECTOR IT SECURITY

blog article

Jun 24, 2019

When Becrypt began developing security technology for government more than a decade ago, relationships with Systems Integrators were the only viable route to understanding and accessing customer requirements. Our experiences today are of a vastly more diverse supply chain, with some major government...

Read More

Massive New Iranian Cyber Threat to U.S. Companies MASSIVE NEW IRANIAN CYBER THREAT TO U.S. COMPANIES

blog article

Jun 24, 2019

Russia has been responsible for probing and hacking U.S. industrial control systems and recently, the U.S. attacked Russia’s systems in retaliation. We have long-since warned companies they are on the front lines of a war with nation states such as Iran, Russia, China and North Korea. Countrie...

Read More

Easy Language Learning by Vera F. Birkenbihl – The Decoding Method EASY LANGUAGE LEARNING BY VERA F. BIRKENBIHL – THE DECODING METHOD

blog article

Jun 24, 2019

Forget about cramming vocabulary: the best way to learn a language is by using decoding exercises. Translate a German sentence word-by-word into your native language – thus you will learn the word’s meaning as well as the language’s grammar. Decoding means to “decipher”...

Read More

Current Cybersecurity Market Strong: What’s Driving It? CURRENT CYBERSECURITY MARKET STRONG: WHAT’S DRIVING IT?

blog article

Jun 24, 2019

Cybersecurity is a big business and it’s going to get bigger. Individual users, small business owners, and IT professionals at international corporations know that threats occur every day. Staying ahead of those threats is the only way to protect proprietary data, network integrity, and networ...

Read More

An overview on insider threat awareness AN OVERVIEW ON INSIDER THREAT AWARENESS

blog article

Jun 24, 2019

Organizations usually focus on cyber threats which are external in origin. These include anti-malware, external firewalls, DDoS attack mitigation, external data loss prevention, and the list goes on. That's great, external cyber attacks are very common so it's vital to protect your networks ...

Read More

9 OF THE BIGGEST BOTNET ATTACKS OF THE 21ST CENTURY 9 OF THE BIGGEST BOTNET ATTACKS OF THE 21ST CENTURY

blog article

Jun 24, 2019

Botnets are responsible for hacking, spamming, and malware—here are the most significant botnet attacks with the worst consequences. Individual systems, commonly known as zombies, combined with the criminal’s system (from where all other systems are controlled) are known as a master of t...

Read More

Calculating your cybersecurity net worth doesn CALCULATING YOUR CYBERSECURITY NET WORTH DOESN'T HAVE TO BE COMPLEX

blog article

Jun 24, 2019

Every public and private company maintains a set of financial documents to keep track of their assets and liabilities in order to determine their net worth. These reports include financial and non-financial assets as well as all accumulated liabilities in order to determine if the company is profita...

Read More

NEXT-GENERATION ENTERPRISE CYBERSECURITY SOLUTIONS NEXT-GENERATION ENTERPRISE CYBERSECURITY SOLUTIONS

blog article

Jun 21, 2019

As technology becomes more deeply embedded into business and society in general, business owners and cybersecurity professionals are facing the task of our generation. That is, securing the global IT infrastructure from those cybercriminals who want to steal data, blackmail big corporations, and tak...

Read More

Businesses and Charities Experiencing More Cybersecurity Breaches BUSINESSES AND CHARITIES EXPERIENCING MORE CYBERSECURITY BREACHES

blog article

Jun 21, 2019

Thirty-two percent of businesses and 22 percent of charities are experiencing more cybersecurity attacks, the 2019 Cyber Security Breaches Survey says. The average annual cost for business that lost data or assets after breaches was more than $5,000 and more than $12,000 for charities.  Among t...

Read More

Cyber Security Findings for the Media Industry CYBER SECURITY FINDINGS FOR THE MEDIA INDUSTRY

blog article

Jun 21, 2019

Securing a company’s digital infrastructure has become a major concern to corporations worldwide. With leading security companies and other organizations alerting corporations and the public to recent widespread, state-sponsored domain name system (DNS) hijacking, more and more brands are star...

Read More

The Last 18 Months of Mobile: Blacklisted Apps Rise, Antivirus Apps Prove More Harm Than Good THE LAST 18 MONTHS OF MOBILE: BLACKLISTED APPS RISE, ANTIVIRUS APPS PROVE MORE HARM THAN GOOD

blog article

Jun 20, 2019

These days, mobile security is top of mind for consumers and businesses alike, and for good reason—the mobile channel is ubiquitous and provides threat actors a vast attack surface to target. At home, 82 percent of online users in the United States used a mobile device for online shopping, wit...

Read More

Medical debt collection agency files for bankruptcy protection after data breach MEDICAL DEBT COLLECTION AGENCY FILES FOR BANKRUPTCY PROTECTION AFTER DATA BREACH

blog article

Jun 20, 2019

A US medical bill and debt collection agency has filed for Chapter 11 bankruptcy protection after suffering a data breach that exposed the sensitive personal data of at least 20 million people. Compromised data included names, addresses, dates of birth and Social Security numbers – data that c...

Read More

Will you suffer a data breach if you implement ISO 27001? WILL YOU SUFFER A DATA BREACH IF YOU IMPLEMENT ISO 27001?

blog article

Jun 20, 2019

Someone recently asked us: “Will my organisation be breached if we implement ISO 27001?” At first we thought they meant ‘will implementing ISO 27001 make me susceptible to data breaches?’ to which the answer is obviously ‘no’. ISO 27001 is the international standa...

Read More

Operationalize the Power of HackerTarget’s Security Tools with IncMan SOAR OPERATIONALIZE THE POWER OF HACKERTARGET’S SECURITY TOOLS WITH INCMAN SOAR

blog article

Jun 20, 2019

To stay ahead of today’s sophisticated cyber attacks, organizations must develop a diverse defense strategy. From staffing their security teams with the most knowledgeable and well-rounded candidates to deploying the most recent toolsets and defense products, the need to bring depth to a secur...

Read More

Examining the SymCrypt DoS Vulnerability EXAMINING THE SYMCRYPT DOS VULNERABILITY

blog article

Jun 19, 2019

Early last week, Tavis Ormandy released a new DoS vulnerability affecting the SymCrypt library. While it provided some details, I decided to look at it a little further to understand where this vulnerability occurs. We start by describing the vulnerability, then verifying that the vulnerability exis...

Read More

URLZone top malware in Japan, while Emotet and LINE Phishing round out the landscape URLZONE TOP MALWARE IN JAPAN, WHILE EMOTET AND LINE PHISHING ROUND OUT THE LANDSCAPE

blog article

Jun 19, 2019

In many ways, the threat landscape in Japan resembles global trends, with the regionalization and widespread distribution of Emotet, and the steady increase in campaigns that utilize sophisticated social engineering techniques. However, while Emotet dominated malicious message volumes in many region...

Read More

Cybersecurity, Data Privacy Top Concerns for Enterprises CYBERSECURITY, DATA PRIVACY TOP CONCERNS FOR ENTERPRISES

blog article

Jun 19, 2019

Cybersecurity and data privacy captured the two top spots in respondents’ list of E&C concerns, according to the 2019 Definitive Corporate Compliance Benchmark Report. Data security and privacy breaches have become a daily worry for most organizations and research shows that most organizat...

Read More

Cyber Security Challenges in Healthcare IoT Devices CYBER SECURITY CHALLENGES IN HEALTHCARE IOT DEVICES

blog article

Jun 19, 2019

The recent Vectra 2019 Spotlight Report on Healthcare indicates that the proliferation of healthcare internet-of-things (IoT) devices, along with a lack of network segmentation, insufficient access controls and reliance on legacy systems, has created an increasing attack surface that can be exploite...

Read More

WHY ARE WE MAKING INFORMATION SECURITY SO HARD? WHY ARE WE MAKING INFORMATION SECURITY SO HARD?

blog article

Jun 18, 2019

I often hear from folks that in general, small and medium-sized businesses lack a strategy and proper controls, but the big guys have it covered. Well, it might surprise you to learn that 30% of large enterprises state they still lack an overall information security strategy and we’re talking ...

Read More

Fake Antivirus Software -The Most Persistent Threat On The Internet, How To Be Aware? FAKE ANTIVIRUS SOFTWARE -THE MOST PERSISTENT THREAT ON THE INTERNET, HOW TO BE AWARE?

blog article

Jun 17, 2019

Cyber criminals are continually searching for better approaches to manipulate users on the web. One of your most grounded lines of barrier against having your own information and your cash fall under the control of a cyber criminal is to stay mindful and watchful. It takes on the appearance of real ...

Read More

DDoS attack that knocked Telegram secure messaging service offline linked to Hong Kong protests DDOS ATTACK THAT KNOCKED TELEGRAM SECURE MESSAGING SERVICE OFFLINE LINKED TO HONG KONG PROTESTS

blog article

Jun 13, 2019

An attack which targeted users of the Telegram app on Wednesday might be linked to protests in Hong Kong that turned violent. That’s one of the theories in circulation, after a distributed denial-of-service (DDoS) attack disrupted legitimate access to the Telegram secure messaging app by swamp...

Read More

Entering the Third Decade of Cyber Threats: Toward Greater Clarity in Cyberspace ENTERING THE THIRD DECADE OF CYBER THREATS: TOWARD GREATER CLARITY IN CYBERSPACE

blog article

Jun 13, 2019

Over the course of just a few decades, the world has entered into a digital age in which powerful evolving cyber capabilities provide access to everyone connected online from any place on the planet. Those capabilities could be harnessed for the benefit of humanity; they might also be abused, leadin...

Read More

Vulnerable Software – The Gift that Keeps on Giving VULNERABLE SOFTWARE – THE GIFT THAT KEEPS ON GIVING

blog article

Jun 13, 2019

Concerning the latest data breaches on record, this past May was rather noteworthy. A host of organizations from around the world announced in fact, that they had experienced a data breach.  From online retailers, travel booking sites, and high-tech startups, to social sharing sites, healthcare...

Read More

9 Individuals Connected to a Hacking Group Charged With Online Identity Theft 9 INDIVIDUALS CONNECTED TO A HACKING GROUP CHARGED WITH ONLINE IDENTITY THEFT

blog article

Jun 12, 2019

Nine Individuals Connected to a Hacking Group Charged With Online Identity Theft and Other Related Charges Six individuals connected to a hacking group known to its members as “The Community” were charged in a fifteen count indictment unsealed today with conspiracy to commit wire fraud, ...

Read More

The state of cyber security in 2019: A half-year retrospective THE STATE OF CYBER SECURITY IN 2019: A HALF-YEAR RETROSPECTIVE

blog article

Jun 12, 2019

For most of North America, approaching the middle of the year means going on summer vacation, preparing for the Atlantic hurricane season and enjoying warmer weather. For many information security specialists, the half-year mark involves looking at how cyber threats have unfolded since January and d...

Read More

MegaCortex continues trend of targeted ransomware attacks MEGACORTEX CONTINUES TREND OF TARGETED RANSOMWARE ATTACKS

blog article

Jun 12, 2019

MegaCortex is a relatively new ransomware family that continues the 2019 trend of threat actors developing ransomware specifically for targeted attacks on enterprises. While GandCrab apparently shut its doors, several other bespoke, artisanal ransomware families have taken its place, including Robin...

Read More

Ransomware attack paralyses Lake City email, landlines and credit card services RANSOMWARE ATTACK PARALYSES LAKE CITY EMAIL, LANDLINES AND CREDIT CARD SERVICES

blog article

Jun 12, 2019

Lake City  has warned citizens that administrative systems, including email and credit card systems, are down following a ransomware attack on the Florida municipality. The attack, called “Triple Threat” in a press release issued by the city, reportedly combined three attack vectors...

Read More

Cybersecurity pros think the enemy is winning CYBERSECURITY PROS THINK THE ENEMY IS WINNING

blog article

Jun 11, 2019

There is a saying in security that the bad guys are always one step ahead of defense. Two new sets of research reveal that the constant cat-and-a-mouse game is wearing on security professionals, and many feel they are losing in the war against cybercriminals. The first figures are from the Informati...

Read More

Government No Longer Has to Choose Between Cybersecurity and Productivity GOVERNMENT NO LONGER HAS TO CHOOSE BETWEEN CYBERSECURITY AND PRODUCTIVITY

blog article

Jun 11, 2019

It’s one of the oldest and trickiest balancing acts that government CIOs face: how to ensure the highest levels of cybersecurity without sacrificing end- user productivity. For years, organizations have struggled to weigh the benefits of adding security controls to combat cyber attacks versus ...

Read More

The Importance of a Cybersecurity Strategy for the Business THE IMPORTANCE OF A CYBERSECURITY STRATEGY FOR THE BUSINESS

blog article

Jun 11, 2019

Research conducted by AV-Test, an independent IT security institute, has revealed that nearly 350,000 new malware programs are created daily. It is unfortunate that some companies still consider malware to be a minor threat, not realizing that something as trivial as a malware-infected email may be ...

Read More

Think you’re not susceptible to phishing? Think again THINK YOU’RE NOT SUSCEPTIBLE TO PHISHING? THINK AGAIN

blog article

Jun 11, 2019

A version of this blog was originally published on 8 January 2018. On average, one in ten emails is a phishing scam. With all that experience, you’d think we’d be pretty good at spotting malicious messages by now. According to a PhishMe survey, many of us think that’s the case. Ver...

Read More

Good enough security isn GOOD ENOUGH SECURITY ISN'T GOOD ENOUGH

blog article

Jun 10, 2019

Just checking the cybersecurity box with a few well know measures is not enough with today’s extremely sophisticated cybercriminals and even Ransomware as a Service offerings. It is the equivalent of an ostrich putting its head in the sand or an opossum playing dead to ignore an impending thre...

Read More

Vulnerability scanning – in house or third party? VULNERABILITY SCANNING – IN HOUSE OR THIRD PARTY?

blog article

Jun 10, 2019

You can’t fix the flaws you don’t know about – and the clearer your sense of your organization’s overall security posture, the better equipped you are to improve it. Vulnerability assessments are a core requirement for IT security, and conducting them on a regular basis can h...

Read More

How spammers use Google services HOW SPAMMERS USE GOOGLE SERVICES

blog article

Jun 10, 2019

As you know, Google is not just a search tool, but multiple services used by billions of people every day: Gmail, Calendar, Google Drive, Google Photos, Google Translate, the list goes on. And they are all integrated with each other. Calendar is linked to Gmail, Gmail to Google Drive, Google Drive t...

Read More

Binding Link Between Cyber Warfare and IT Security BINDING LINK BETWEEN CYBER WARFARE AND IT SECURITY

blog article

Jun 09, 2019

Strong territorial defense alone is not enough to combat today’s risks, as the Internet created another space for people to operate and to move beyond the physical world. Individuals, private companies and the public sector need to maintain a defensive posture when it comes to watching over th...

Read More

Cybersecurity for End-users: Awareness is a Means, Not a Goal CYBERSECURITY FOR END-USERS: AWARENESS IS A MEANS, NOT A GOAL

blog article

Jun 09, 2019

Due to the many cyber attacks that have taken place in recent years, organisations and (local) governments are increasingly putting cybersecurity on the agenda as a problem that needs to be tackled. Historically viewed as ‘merely an IT problem’ that can be solved through better programmi...

Read More

Some Cisco Devices May Be Vulnerable To Hacker Attacks SOME CISCO DEVICES MAY BE VULNERABLE TO HACKER ATTACKS

blog article

Jun 07, 2019

Intel has been in the news several times over the last 18 months due to serious security flaws that have been found in their chipsets, beginning with the dreaded Spectre and Meltdown flaws.  Now with MDS attacks, they're not the only ones. Recently, researchers have discovered serious flaws...

Read More

Information Security Learn Path at Enterprise World INFORMATION SECURITY LEARN PATH AT ENTERPRISE WORLD

blog article

Jun 06, 2019

Security has become job #1 for every organization and that’s especially true when it comes to Enterprise Information Management (EIM). The Information Security Learn Path at OpenText™ Enterprise World 2019 in Toronto provides practical tools and best practices for using OpenText products...

Read More

6 Bookmark Worthy Cyber Security Blogs You Should Follow Right Away 6 BOOKMARK WORTHY CYBER SECURITY BLOGS YOU SHOULD FOLLOW RIGHT AWAY

blog article

Jun 06, 2019

Online security and data privacy are two of the hottest topics in the industry at present. And if you are someone who is working in the domain of cyber security or planning to pursue a career in cybersecurity, it is imperative to stay updated with the ongoing trends in the domain. While many people ...

Read More

Why your employees are a cybersecurity threat WHY YOUR EMPLOYEES ARE A CYBERSECURITY THREAT

blog article

Jun 06, 2019

In mid-April, Bodybuilding.com announced that its company network had been breached by hackers. This would only be a blip in the endless stream of data breach headlines – security firm Positive Technologies reports that cyberattacks affected billions of people in 2018 – except that it wa...

Read More

5 ways to detect a phishing email – with examples 5 WAYS TO DETECT A PHISHING EMAIL – WITH EXAMPLES

blog article

Jun 06, 2019

Phishing is one of the most longstanding and dangerous methods of cyber crime. It uses deceptive messages to trick victims into clicking bogus links, downloading malicious attachments or sending sensitive information. Despite what people think they know about phishing, they consistently fall victim....

Read More

A10 Networks adds zero-day automated protection (ZAP) to DDoS Defence A10 NETWORKS ADDS ZERO-DAY AUTOMATED PROTECTION (ZAP) TO DDOS DEFENCE

blog article

Jun 05, 2019

A10 Networks has announced Zero-day Automated Protection (ZAP) capabilities to its Thunder Threat Protection System (TPS) family of Distributed Denial of Service (DDoS) defence solutions. The ZAP capabilities automatically recognise the characteristics of DDoS attacks and apply mitigation filters wi...

Read More

Privileged Access Management Issues? Enter Tripwire Password Manager PRIVILEGED ACCESS MANAGEMENT ISSUES? ENTER TRIPWIRE PASSWORD MANAGER

blog article

Jun 04, 2019

So, you have 2000 network devices in your environment and everyone is telling you that you have to rotate all 2000 device passwords every 30, 60 or 90 days (at a minimum) — who has time for that?! How are you going to manage this? The task seems monumental and time-consuming!  If nothing ...

Read More

Cybersecurity Attacks 101: Phishing, Cryptojacking and Ransomware CYBERSECURITY ATTACKS 101: PHISHING, CRYPTOJACKING AND RANSOMWARE

blog article

Jun 04, 2019

Malware is getting smarter. Cybercriminals now use artificial intelligence and machine learning tools to get better at tricking users into running malicious code and giving away sensitive data. Three client-side attacks have been among the most popular over the past two years and will remain threats...

Read More

ANOTHER MAC BUG LETS HACKERS INVISIBLY CLICK SECURITY PROMPTS ANOTHER MAC BUG LETS HACKERS INVISIBLY CLICK SECURITY PROMPTS

blog article

Jun 03, 2019

TWO HOURS INTO his keynote at Apple’s Worldwide Developer's Conference last June, senior vice president Craig Federighi revealed a new privacy feature in MacOS Mojave that forces applications to ask the user if they want to "allow" or "deny" any request to access sensit...

Read More

Ransomware: To Blame or Not to Blame in Baltimore Cyberattack? RANSOMWARE: TO BLAME OR NOT TO BLAME IN BALTIMORE CYBERATTACK?

blog article

Jun 02, 2019

As the city of Baltimore continues to recover from the devastating ransomware attack that struck on May 7, 2019, the total incident costs are estimated to be at least $18.2 million, according to the Baltimore Sun. City leaders have not given a timetable for how long the total recovery effort will ta...

Read More

Next Generation Cyber Threats: Images NEXT GENERATION CYBER THREATS: IMAGES

blog article

May 31, 2019

Cybersecurity is probably the most rapidly changing area of IT, and cyber-criminals are becoming increasingly more sophisticated in their bid to breach an organization's security and steal their crown jewels - their information. Traditional Data Loss Prevention (DLP) technology provides protecti...

Read More

Incident Of The Week: Checkers Restaurants Details Data Breach INCIDENT OF THE WEEK: CHECKERS RESTAURANTS DETAILS DATA BREACH

blog article

May 31, 2019

Checkers Drive-In Restaurants Inc. notified its customers that about 15% of its restaurants in 20 states may have had data exposures possibly starting back into 2015, and some lasting until about mid-April this year. The company operates and franchises nearly 900 restaurants. The data security issue...

Read More

5 Crucial Tips to Improve Your Employees Awareness of Cyber Threats 5 CRUCIAL TIPS TO IMPROVE YOUR EMPLOYEES AWARENESS OF CYBER THREATS

blog article

May 31, 2019

Cyber protection is an essential aspect of every company’s governance strategy. What’s more, it might even be the most crucial part of security in general. Cyber threats are a huge problem today, and they have been an increasing threat for quite some time. For example, spam is still ther...

Read More

12 Best Cybersecurity Practices in 2019 12 BEST CYBERSECURITY PRACTICES IN 2019

blog article

May 30, 2019

It’s no exaggeration: any company can fall victim to cyber crime. Reports of cyber attacks come from government organizations, educational and healthcare institutions, banks, law firms, nonprofits, and many other organizations. Hackers, insider threats, ransomware, and other dangers are out th...

Read More

5 FUNDAMENTAL CYBER SECURITY TIPS FOR YOUR BUSINESS 5 FUNDAMENTAL CYBER SECURITY TIPS FOR YOUR BUSINESS

blog article

May 30, 2019

From the benefits of multifactor authentication to data breach recovery and prevention tips, our business security blog has over 80 entries relating to data and cyber security. Below, we highlight five fundamental cyber security tips your business needs to follow based on popular topics on our blog....

Read More

The 8 Elements of an Information Security Policy THE 8 ELEMENTS OF AN INFORMATION SECURITY POLICY

blog article

May 30, 2019

Security threats are constantly evolving, and compliance requirements are becoming increasingly complex. Organizations large and small must create a comprehensive security program to cover both challenges. Without a security policy, it is impossible to coordinate and enforce a security program acros...

Read More

ITProPortal: CrowdStrike Discusses Life Beyond Malware ITPROPORTAL: CROWDSTRIKE DISCUSSES LIFE BEYOND MALWARE

blog article

May 28, 2019

The traditional cybersecurity model is an outdated one, focused on building up the perimeter defenses of an organization like some sort of medieval fortress, in an effort to mitigate the threat of incoming malware. However, it is an uncomfortable fact for many that the multi-million-dollar cybersecu...

Read More

Return to the City of Cron – Malware Infections on Joomla and WordPress RETURN TO THE CITY OF CRON – MALWARE INFECTIONS ON JOOMLA AND WORDPRESS

blog article

May 27, 2019

We recently had a client that had a persistent malware infection on their shared hosting environment that would re-infect the files quickly after we had cleaned them. The persistence was being created by a cron that was scheduled to download malware from a third party domain. Persistent Malware Infe...

Read More

Cyber Security Today: Beware of email lawsuit scam, an Android missed call con and how’s your country doing? CYBER SECURITY TODAY: BEWARE OF EMAIL LAWSUIT SCAM, AN ANDROID MISSED CALL CON AND HOW’S YOUR COUNTRY DOING?

blog article

May 27, 2019

Beware of email lawsuit scam, an Android missed call con and how’s your country doing? Welcome to Cyber Security Today. It’s Monday May 27th. I’m Howard Solomon, contributing reporter on cyber security for ITWorldCanda.com It’s Memorial Day in the U.S., hope you’re havi...

Read More

Why Cyber Security Is Important For Your Business? WHY CYBER SECURITY IS IMPORTANT FOR YOUR BUSINESS?

blog article

May 27, 2019

Huge companies have turned much of their attention toward cybersecurity nowadays. As a famous person once said “handling of company data should be your top priority”, we couldn’t agree more with it. Technology is amazing, and technology has made it much easier for us to live our li...

Read More

The IT Security Challenges All Small Businesses Face THE IT SECURITY CHALLENGES ALL SMALL BUSINESSES FACE

blog article

May 26, 2019

The world’s rapidly increasing cyber attacks do not know where to stay and are evolving their attack methods on a daily basis. Many companies regardless of size are good prey for attackers. The impact of cyber attacks continues to increase, regardless of the size of the company or organization...

Read More

How To Become An Ethical Hacker – Learn Hacking Step By Step HOW TO BECOME AN ETHICAL HACKER – LEARN HACKING STEP BY STEP

blog article

May 25, 2019

Ethical Hacking is the process of penetrating into the system to find out vulnerabilities, threats, etc. In general ethical hacking is mainly performed to improve the security of the network. Normally ethical hackers utilize the same methods by the malicious hackers but the ethical hackers do everyt...

Read More

Most security pros have considered quitting due to a lack of resources MOST SECURITY PROS HAVE CONSIDERED QUITTING DUE TO A LACK OF RESOURCES

blog article

May 24, 2019

Security professionals believe their jobs and the overall security of their organizations would benefit from an autonomous security solution that could automatically react to and prevent attacks. More technology is harming cybersecurity. The survey found that security professionals are not being hel...

Read More

Cybersecurity is a top-level management priority CYBERSECURITY IS A TOP-LEVEL MANAGEMENT PRIORITY

blog article

May 23, 2019

Despite all the warnings, cybercrime has long been seen as a pure IT issue rather than a business risk. It took the effects of the NotPetya attack in 2017 to change this view, as several large companies reported high losses. According to reports, the attack cost transport giants Maersk and FedEx, ad...

Read More

Why You Should Forget Everything You Know About Cyber Security? WHY YOU SHOULD FORGET EVERYTHING YOU KNOW ABOUT CYBER SECURITY?

blog article

May 23, 2019

In the 1990s, Olestra, a no-calorie artificial fat appeared in snack foods. It promised consumers the ability to eat delicious and fattening foods without gaining weight. Unfortunately, Olestra had a swift fall from grace when angry consumers, felled by crippling gastrointestinal pains, filed lawsui...

Read More

A Cybersecurity Guide for Digital Nomads A CYBERSECURITY GUIDE FOR DIGITAL NOMADS

blog article

May 21, 2019

Technology has unlocked a new type of worker, unlike any we have seen before—the digital nomad. Digital nomads are people who use technologies like WiFi, smart devices, and cloud-based applications to work from wherever they please. For some digital nomads, this means their favorite coffee sho...

Read More

Key Takeaways from Our Latest Global Threat Landscape Report KEY TAKEAWAYS FROM OUR LATEST GLOBAL THREAT LANDSCAPE REPORT

blog article

May 21, 2019

Looking back at the threat landscape of the first quarter of 2019 shows that cybercriminals are not just becoming increasingly sophisticated in terms of their attack methods and tools, they are also becoming very diverse. Attackers are increasingly using a broad range of attack strategies, from targ...

Read More

Don’t have your account hijacked. Secure your online accounts with more than a password, says Google DON’T HAVE YOUR ACCOUNT HIJACKED. SECURE YOUR ONLINE ACCOUNTS WITH MORE THAN A PASSWORD, SAYS GOOGLE

blog article

May 20, 2019

Research published at the end of last week argues that the typical user can significantly harden the security of their online accounts by linking a recovery phone number that can send an alert if there is suspicious activity on the account. The research, conducted by a team from Google alongside res...

Read More

CVE-2019-0708 – A Critical “Wormable” Remote Code Execution Vulnerability in Windows RDP CVE-2019-0708 – A CRITICAL “WORMABLE” REMOTE CODE EXECUTION VULNERABILITY IN WINDOWS RDP

blog article

May 17, 2019

This is an important security advisory related to a recently patched Critical remote code execution vulnerability in Microsoft Windows Remote Desktop Service (RDP). The vulnerability is identified as “CVE-2019-0708 – Remote Desktop Services Remote Code Execution Vulnerability”. Thi...

Read More

Flaws Found in Google’s Titan Security Key FLAWS FOUND IN GOOGLE’S TITAN SECURITY KEY

blog article

May 17, 2019

Google recalled their Titan hardware security keys this week after discovering serious vulnerabilities. The vulnerability existed due to a misconfiguration in the keys, which allowed attackers to hijack the security keys. The Titan security keys are physical devices which offer two-factor authentica...

Read More

BUYERS GUIDE TO PENETRATION TESTING SERVICES BUYERS GUIDE TO PENETRATION TESTING SERVICES

blog article

May 17, 2019

Unquestionably, the Internet is a wonderful thing - it has opened up business links across the globe and given consumers competitive choice. However, now that you can buy products or services from anyone, anywhere, how do you know what you’re buying - and from whom? This also applies to the fi...

Read More

What is VAPT and how does it support Cyber and Data Security? WHAT IS VAPT AND HOW DOES IT SUPPORT CYBER AND DATA SECURITY?

blog article

May 16, 2019

Cybersecurity is one of the most crucial concerns for every enterprise and technology administrators today. Hackers these days are aware of all the general vulnerabilities that businesses are subject to and are ready to compromise the security as per their convenience. It is very important to guard ...

Read More

SQL injection attack: Your website might be undergoing one right away SQL INJECTION ATTACK: YOUR WEBSITE MIGHT BE UNDERGOING ONE RIGHT AWAY

blog article

May 15, 2019

Injection, this word not only terrifies children but also, is a cause of immense worry for those who have suffered from ‘injection’ attacks. Last week, 90% of the deployed cyber-attacks were injection attacks. In an injection attack, attacker injects a malware or malicious code in a quer...

Read More

Cyber-Stronger Together: The Systemwide Security Awareness Group CYBER-STRONGER TOGETHER: THE SYSTEMWIDE SECURITY AWARENESS GROUP

blog article

May 15, 2019

One hundred fifty years ago, it was not uncommon for friends and neighbors to band together to help one another build a barn. It made for quick work, and just a bit of effort from everyone completed the construction infinitely faster than one family could do on its own. To some extent, this is the t...

Read More

IS DYNAMIC ANALYSIS ENOUGH TO STOP EVASIVE MALWARE ATTACKS? IS DYNAMIC ANALYSIS ENOUGH TO STOP EVASIVE MALWARE ATTACKS?

blog article

May 15, 2019

If you've been following industry news, you often hear about major malware infections and their impact, but rarely do you learn why these attacks were successful in the first place. While a portion of malware is stopped by anti-virus and next-gen solutions, cybercriminals are turning to the art ...

Read More

Confidence: the perception and reality of cybersecurity threats CONFIDENCE: THE PERCEPTION AND REALITY OF CYBERSECURITY THREATS

blog article

May 14, 2019

At RSA 2019, we conducted a survey that netted 733 respondents along with interviews between Javvad Malik, former security advocate at AT&T Cybersecurity, and security experts. The full results are in his comprehensive and informative research report. Following are a few highlights: Phishing is ...

Read More

How To Stop Webcam Hacking By Boosting Its Security? HOW TO STOP WEBCAM HACKING BY BOOSTING ITS SECURITY?

blog article

May 14, 2019

Not a multi-day passes by that we don’t hear any of the cyber security attacks – be it information leaks, phishing tricks, ransomware, or infections – however What About Somebody Remotely Monitoring To Your Webcam? It’s normal today for a home to be furnished with security ge...

Read More

Mobile threats are everywhere – here’s what you can do MOBILE THREATS ARE EVERYWHERE – HERE’S WHAT YOU CAN DO

blog article

May 14, 2019

Even if your company issues you a locked-down smartphone, embracing best security practices remains vital. Our smartphones. Where would we be without them? If you’re anything like me, making a phone call is the fifth or sixth reason to reach for your Android or iPhone. Whichever OS you favor, ...

Read More

FINANCIAL CYBER THREATS: 10 CASES OF INSIDER BANK ATTACKS FINANCIAL CYBER THREATS: 10 CASES OF INSIDER BANK ATTACKS

blog article

May 14, 2019

It is reported that at least 60% of cyber-attacks in financial institutions are attributed to privileged users, third-party partners, or malicious employees. This occasionally happens through employee negligence, or when an employee has malicious intentions, leading them to commit deliberate sabotag...

Read More

Data Security Regulations Overview by Industry: Finance DATA SECURITY REGULATIONS OVERVIEW BY INDUSTRY: FINANCE

blog article

May 14, 2019

It has now been one year since the EU’s General Data Protection Regulation (GDPR) entered our lives. And in the United States, the California Consumer Privacy Act (CCPA) will be one-year-old on June 28, 2019. Although these two regulations have made big headlines recently, our economic landsca...

Read More

Practical Ways to Reduce Ransomware Impact: Actions You Can Take Today PRACTICAL WAYS TO REDUCE RANSOMWARE IMPACT: ACTIONS YOU CAN TAKE TODAY

blog article

May 13, 2019

During the past year, Cisco Security Incident Response Services has provided emergency incident response services for many customers dealing with incidents that sometimes become a ransomware event. In many cases, we were engaged by the company at the first sign of trouble and were able to help conta...

Read More

SiteLock 2019 Website Security Report: Protecting Websites in the Age of Stealth Attacks SITELOCK 2019 WEBSITE SECURITY REPORT: PROTECTING WEBSITES IN THE AGE OF STEALTH ATTACKS

blog article

May 13, 2019

Among the cryptojacking-buzz, Facebook’s data breach saga, and nation-state attacks on companies like Nissan, you likely noticed a trend of high-profile cybercrime in 2018. However, after studying website attacks that plagued 2018, a new trend arises. Cybercriminals swept the web with secrecy,...

Read More

SECURING THE DEPARTMENT OF HOMELAND SECURITY WAY SECURING THE DEPARTMENT OF HOMELAND SECURITY WAY

blog article

May 13, 2019

Homeland security was not a thing much on the minds of anyone prior to Sept. 11, 2001. That changed with the successful terrorist attacks and shined a rather large spotlight on an ever-growing threat through cyber channels. In addition to creation of a new federal agency and cabinet position, this s...

Read More

Malware less Emails: Cyber attackers’ invisible cloak MALWARE LESS EMAILS: CYBER ATTACKERS’ INVISIBLE CLOAK

blog article

May 13, 2019

Cyber attackers have been known to move ahead with time. They observe the trends in the society, analyse the demographics and work on building up strategies that can help them achieve malicious intent. With the advancement in the strategies employed by the attackers, the cyber vigilantes are also be...

Read More

Best Antivirus For Android Smartphone- Do You Really Need One? BEST ANTIVIRUS FOR ANDROID SMARTPHONE- DO YOU REALLY NEED ONE?

blog article

May 10, 2019

Do I really need an antivirus on my Smartphone? This may have been an inquiry around many years before, times are changing and a significant number of processing assignments used to take place on a computer system, now they currently happen on a Smartphone or tablet. However with a fast increment in...

Read More

Sharepoint vulnerability exploited in the wild SHAREPOINT VULNERABILITY EXPLOITED IN THE WILD

blog article

May 10, 2019

AT&T Alien Labs has seen a number of reports of active exploitation of a vulnerability in Microsoft Sharepoint (CVE-2019-0604). One report by the Saudi Cyber Security Centre appears to be primarily targeted at organisations within the kingdom. An earlier report by the Canadian Cyber Security Cen...

Read More

BEWARE OF FAKE ANTIVIRUS SOFTWARE BEWARE OF FAKE ANTIVIRUS SOFTWARE

blog article

May 10, 2019

There is a vast amount of information passing from one device to another on a global scale and this has led to an increased risk of viruses, Trojans, malware, spyware, and other forms of cyber threats. Cybersecurity literacy and hygienic browsing habits are major defense against cyber threats. Many ...

Read More

Different types of cyber attacks DIFFERENT TYPES OF CYBER ATTACKS

blog article

May 09, 2019

A lot of organisations have experienced cyber attacks, but how are they actually hit? There are many types of cyber attack, and the one the criminal hacker chooses depends on what they are trying to do. Some want data, whereas others want a ransom to be paid. The most common types of cyber attack ar...

Read More

The art of pushing left in application security THE ART OF PUSHING LEFT IN APPLICATION SECURITY

blog article

May 08, 2019

Today, software is being developed at a breakneck speed. Agile development and the aggressive adoption of DevOps is leading to an abundance of functionality and feature sets, or pieces of code pushed out to consumers at a record pace.  These one-click opportunities may indeed get us what we wan...

Read More

Lax Telco Security Allows Mobile Phone Hijacking and Redirects LAX TELCO SECURITY ALLOWS MOBILE PHONE HIJACKING AND REDIRECTS

blog article

May 08, 2019

A Q&A with Kaspersky Lab researcher David Jacoby examines a gaping hole in the telco customer-service process that allows adversaries to commandeer phone calls. As anyone who has called into a bank or utility provider lately knows, security for customer service routines – the prescribed wa...

Read More

Best Antivirus Software List 2019 (New List) BEST ANTIVIRUS SOFTWARE LIST 2019 (NEW LIST)

blog article

May 08, 2019

Malware authors are so nefarious that they create deadly viruses to uncover your monetary data or prevent your PC from working by any means. What you require is the most ideal antivirus programming on your PC. Thanks to the lucky stars, as the giant leaders in the security industry do deliver their ...

Read More

7 Critical, and Often Overlooked, Ways to Improve Your Cybersecurity 7 CRITICAL, AND OFTEN OVERLOOKED, WAYS TO IMPROVE YOUR CYBERSECURITY

blog article

May 08, 2019

What you don’t know can, and will, hurt you. Cybersecurity is now at the forefront of business IT needs. If you ignore it, it won’t go away, and even worse, your customers will look elsewhere to get the services they need if you’re not providing them. It’s time to face the mu...

Read More

Customers Deserve Transparency to Manage Risk CUSTOMERS DESERVE TRANSPARENCY TO MANAGE RISK

blog article

May 08, 2019

Our commitment to customers is to be open and transparent, especially as it relates to issues that could negatively impact their business. At Cisco, our leadership made the decision over twenty years ago that we would clearly communicate with customers about technical or other issues that could pote...

Read More

THE LATEST BEST PRACTICE PASSWORD POLICY RECOMMENDATIONS THE LATEST BEST PRACTICE PASSWORD POLICY RECOMMENDATIONS

blog article

May 08, 2019

Passwords are supposed to keep us safe. In fact, they’re a high-security risk. You’d be forgiven for assuming that your junior staff would be the users with the least security awareness. But it’s simply not true. Stats show people who work at high levels use...

Read More

How Regular Cyber Security Assessments and Audits Help Your Organization HOW REGULAR CYBER SECURITY ASSESSMENTS AND AUDITS HELP YOUR ORGANIZATION

blog article

May 07, 2019

Understanding your weaknesses through regular cyber security audits and assessments is critical. Without them, it’s difficult to withstand cyber attacks and protect your organization. As the wise Japanese author Shusaku Endo noted, ““Every weakness contains within itself a strength...

Read More

Dear YouTubers, phishers are after your accounts DEAR YOUTUBERS, PHISHERS ARE AFTER YOUR ACCOUNTS

blog article

May 07, 2019

Do you have a channel on YouTube? How’s it doing — got more than a thousand subscribers yet? If so, you can expect a message something like this: “We’re evaluating your request for monetizing your YouTube channel.” The problem is, it might be fake. In the wake of recent...

Read More

Practicing cyber resiliency in the digital age PRACTICING CYBER RESILIENCY IN THE DIGITAL AGE

blog article

May 06, 2019

Retail’s digital transformation has ushered in a new era of data, which allows retailers to work smarter, innovate faster and serve customers better, but it has also introduced new risks. PwC U.S. Cybersecurity and Privacy Leader Sean Joyce says when it comes to cybersecurity, being resilient ...

Read More

How the Internet Got Hijacked – For a While HOW THE INTERNET GOT HIJACKED – FOR A WHILE

blog article

May 03, 2019

A measly Nigerian ISP has hijacked internet traffic meant for Google’s data centers. The incident, called a BGP hijack, occurred last November 12, between 13:12 and 14:35, Pacific Time, according to Google. The incident was first detected and reported by an online service that monitors the rou...

Read More

Tracking Your Adversary with a Threat Intelligence Platform TRACKING YOUR ADVERSARY WITH A THREAT INTELLIGENCE PLATFORM

blog article

May 02, 2019

Anomali’s slogan is “Tracking The Adversary,” or as I like to say it, “Tracking Your Adversary.” Many of my prospects and customers ask me, “How does your platform help me to track my adversaries?” My response is that it takes a lot more effort than what I t...

Read More

Integrating Cloud-Native Security Across Multi-Cloud Networks INTEGRATING CLOUD-NATIVE SECURITY ACROSS MULTI-CLOUD NETWORKS

blog article

May 01, 2019

In today’s rapidly evolving, digitally-driven economy, the window of opportunity that businesses have to capitalize on shifting markets and consumer demands is continually getting shorter. To keep up, application developers and IT teams need to also perpetually shorten the development lifecycl...

Read More

Dispelling Myths Around SGX Malware DISPELLING MYTHS AROUND SGX MALWARE

blog article

Apr 29, 2019

SGX-based malware may not be as troublesome as believed. We'll explain why that is and how Symantec is ready to deal with such malware if they were to appear. A group of security researchers from Graz University of Technology recently disclosed detailed methods of deploying attacks from inside I...

Read More

Why Marketing Departments Are Cyber Security Targets WHY MARKETING DEPARTMENTS ARE CYBER SECURITY TARGETS

blog article

Apr 29, 2019

Because of what they do, marketing departments are potential cybersecurity risks themselves, and digital bad actors are well aware of it. "Since marketers are more closely connected to networking on social media, they share a lot of close-to-home data," writes Sam Bocetta, a now-retired se...

Read More

Cybersecurity Assessments: How to Achieve Your Target Security Posture CYBERSECURITY ASSESSMENTS: HOW TO ACHIEVE YOUR TARGET SECURITY POSTURE

blog article

Apr 29, 2019

Every company’s journey to become more secure is unique. The factors that may impact your target security profile include operating risk, unique operating workflows, policies, procedures, risk tolerance, and more. Unfortunately, it is impossible to become 100-percent risk free. The goal should...

Read More

Mobile Security Tips for How to Keep Your Android Mobile Safe MOBILE SECURITY TIPS FOR HOW TO KEEP YOUR ANDROID MOBILE SAFE

blog article

Apr 27, 2019

Mobile security should be every Android user’s concern. This is not only just because your Android phone plays an important role in your daily life. But more importantly, guaranteeing rigid mobile security is imperative to secure all files and information that your Android phone stores. To lea...

Read More

THE BIGGEST THREAT TO YOUR ORGANIZATION’S DATA: AN INSIDER THE BIGGEST THREAT TO YOUR ORGANIZATION’S DATA: AN INSIDER

blog article

Apr 26, 2019

The largest cyberattacks that have managed to make the headlines, like Yahoo, Equifax, and Target, are data breaches on a large scale caused by hacktivists, state-sponsored hackers, and cyber criminals. These attacks dominate the news headlines featuring the company name and the attacker. They can b...

Read More

MOST COMMON CYBER ATTACKS OF 2019 Q1 MOST COMMON CYBER ATTACKS OF 2019 Q1

blog article

Apr 25, 2019

2018 has definitely witnessed a number of notable cyberattacks. To name a few, the time when the city systems of the City of Alaska locked down for over a week after a cyberattack, theft of credit card details of 400,000 customers of British Airways through their official mobile application, comprom...

Read More

Best Free Antivirus for Android App BEST FREE ANTIVIRUS FOR ANDROID APP

blog article

Apr 25, 2019

Antivirus for Android apps are widely available on the Google Play Store. These are Android applications that help users in keeping their phones secure. However, to guarantee excellent Android security, you must select an antivirus for Android app that can provide the optimum level of security that ...

Read More

How Android Virus Scan Protects your Devices? HOW ANDROID VIRUS SCAN PROTECTS YOUR DEVICES?

blog article

Apr 25, 2019

Running an Android virus scan is the process of searching your Android phone for any malware using a mobile antivirus app. Android security is a top concern. One way to guarantee top-notch protection is by conducting regular Android virus scans, and an effective way to attain this is by installing t...

Read More

The Future of Payments? Frictionless THE FUTURE OF PAYMENTS? FRICTIONLESS

blog article

Apr 25, 2019

The financial industry has been turned on its head over the past 10 years. The emergence of fintech players like Stripe, Square and PayPal have pushed banks to innovate in ways they haven’t since the ATM was implemented. With an estimated $500 billion retail market spend per year, what’s...

Read More

AT&T Cybersecurity develops new AlienApp for Box for highly secure content management in the cloud AT&T CYBERSECURITY DEVELOPS NEW ALIENAPP FOR BOX FOR HIGHLY SECURE CONTENT MANAGEMENT IN THE CLOUD

blog article

Apr 25, 2019

Today, I’m excited to share that we have released AlienApp for Box, a new security integration between AT&T Cybersecurity and Box, a leader in cloud content management. This new feature within USM Anywhere takes advantage of Box's granular logging capabilities and powerful APIs to add ...

Read More

The Cyber Security Pressure Cooker THE CYBER SECURITY PRESSURE COOKER

blog article

Apr 25, 2019

Too much complexity, too many distractions, too much noise – it’s all taking a steep, personal toll on the people working the front lines of cyber security Feeling stressed? Burnt out? Overwhelmed by the perfect storm of regulation, new threat vectors, well-funded adversaries, rapid tech...

Read More

Global Cybersecurity Outlook 2019 GLOBAL CYBERSECURITY OUTLOOK 2019

blog article

Apr 25, 2019

How did you start your day today? Was it turning off the alarm on your phone, then quickly scanning for any messages you received since last night? Did you check a weather app to see if you needed to take an umbrella? Did you use GPS to avoid traffic as you drove to work? If you’re like many p...

Read More

Beapy: Cryptojacking Worm Hits Enterprises in China BEAPY: CRYPTOJACKING WORM HITS ENTERPRISES IN CHINA

blog article

Apr 24, 2019

Cryptojacking campaign we have dubbed Beapy is exploiting the EternalBlue exploit and primarily impacting enterprises in China. Beapy is a cryptojacking campaign impacting enterprises that uses the EternalBlue exploit and stolen and hardcoded credentials to spread rapidly across networks. Beapy acti...

Read More

NovaLoader, yet another Brazilian banking malware family NOVALOADER, YET ANOTHER BRAZILIAN BANKING MALWARE FAMILY

blog article

Apr 24, 2019

As part of our daily threat tracking activity, ThreatLabZ researchers recently came across an interesting Brazilian banking malware campaign. The malware, NovaLoader, was written in Delphi and made extensive use of Visual Basic Script (VBS) scripting language. Although the final payload was not enti...

Read More

Making your MFA secure: tips from a security architect MAKING YOUR MFA SECURE: TIPS FROM A SECURITY ARCHITECT

blog article

Apr 24, 2019

Many security breaches take place when attackers gain access to Internet-facing applications by using compromised credentials. As an added layer of security against leaked credentials, organizations have been implementing multi-factor authentication (MFA) mechanisms to verify the identity of users c...

Read More

Think Cybersecurity Insurance Will Save You? Think Again THINK CYBERSECURITY INSURANCE WILL SAVE YOU? THINK AGAIN

blog article

Apr 24, 2019

By this point, we know that state-sponsored cyber-attacks are a thing. Time and again, we see headlines to this effect, whether it’s election hacking, IP theft, or mega-breaches. For your average consumer, it’s troubling. But for executives at organizations that are targeted, it’s ...

Read More

How Improving Your Cyber Security Posture Benefits Your Bottom Line HOW IMPROVING YOUR CYBER SECURITY POSTURE BENEFITS YOUR BOTTOM LINE

blog article

Apr 24, 2019

Your security posture and company’s profitability are more closely linked than you may realize. Admit it: Growing and protecting your company’s bottom line is a top priority. While many business professionals feign their organization’s mission or value statement as their ultimate d...

Read More

Essential Android Security Checklist in 2019 ESSENTIAL ANDROID SECURITY CHECKLIST IN 2019

blog article

Apr 24, 2019

Android security should be prioritized. As an Android user, guaranteeing the overall protection of your phone is a primary concern. Countless mobile threats can compromise not just the security of your android phone, but also the personal data stored in it. You must be knowledgeable enough on how to...

Read More

Hacker to Dump 1 Billion Records Online: How Can You Protect Yourself? HACKER TO DUMP 1 BILLION RECORDS ONLINE: HOW CAN YOU PROTECT YOURSELF?

blog article

Apr 24, 2019

A hacker, who goes by the name Gnosticplayers, has made it his goal to put up for sale the data of over 1 billion users.  According to a ZDNet article, he is getting close to that end goal, after releasing 65.5 million records last week, for a grand total of 932 million records since February. ...

Read More

SOCIAL MEDIA IS A CYBERSECURITY BACKDOOR TO YOUR ENTERPRISE SOCIAL MEDIA IS A CYBERSECURITY BACKDOOR TO YOUR ENTERPRISE

blog article

Apr 23, 2019

Facebook, Instagram, LinkedIn, Twitter, YouTube or the latest online game. Yes, these are the new temptations facing employees on a daily basis. It starts with just a peek; maybe a few minutes, and then before you know it, it’s 5:30 p.m. already. OK, so be honest. Just how much time do you spe...

Read More

Software as a Security nightmare: The risks of collaboration on the cloud SOFTWARE AS A SECURITY NIGHTMARE: THE RISKS OF COLLABORATION ON THE CLOUD

blog article

Apr 23, 2019

It’s no secret that collaboration is the bedrock of business. In fact, a Stanford University study demonstrated that merely priming employees to act in a collaborative fashion — without changing their environment or workflow — makes them more engaged, more persistent, more successf...

Read More

Application Delivery Use Cases for Cloud and On-Premise Applications APPLICATION DELIVERY USE CASES FOR CLOUD AND ON-PREMISE APPLICATIONS

blog article

Apr 23, 2019

Most of us use web applications in our daily lives, whether at work or for personal reasons. These applications include sites offering banking and financial services, payroll, utilities, online training, just to name a few. Users get frustrated, sometimes annoyed, if the applications – such as...

Read More

What is Anti-spyware? WHAT IS ANTI-SPYWARE?

blog article

Apr 22, 2019

As its name suggests, an anti-spyware program is a spyware protection software much like an antivirus program. It is designed to detect, prevent, and remove spyware and adware infections on computing devices. Antispyware program are also known as spyware remover, spyware cleaner, and spyware detecto...

Read More

Passwords, passwords everywhere PASSWORDS, PASSWORDS EVERYWHERE

blog article

Apr 21, 2019

Throughout our blogs and guidance, the NCSC have said how important it is to change your password policies (if necessary) to make it easier for users to choose 'good' ones. This includes using password blacklists (that is, making sure your users can't choose any passwords commonly found ...

Read More

Botnet Definition and How to Detect Them BOTNET DEFINITION AND HOW TO DETECT THEM

blog article

Apr 20, 2019

Botnet is a network of malicious computers infected with bot malware and remotely controlled by the cyber attackers. Botnets are used by hackers for different attack purposes such as to send spam/phishing emails, launch Distributed Denial of Service Attacks or in some scenarios, botnet authors rent ...

Read More

What is a Worm Virus? WHAT IS A WORM VIRUS?

blog article

Apr 18, 2019

A worm virus is a type of malware that clones itself throughout a network without any user interference. The modus operandi of Trojan horse is like virus in causing damage to the system. It exploits the vulnerability found in outdated security software to successfully steal confidential data, corrup...

Read More

New malware in old Excel skins NEW MALWARE IN OLD EXCEL SKINS

blog article

Apr 18, 2019

Why worry about making a new malware trick when you can tweak an old Excel spreadsheet to do the job for you? Hackers are now doing just that: They are using new techniques to leverage their attacks based on a feature over 25 years old called Excel 4.0 (XLM macros). Despite the age, this feature is ...

Read More

What are the 6 data protection principles of the GDPR? WHAT ARE THE 6 DATA PROTECTION PRINCIPLES OF THE GDPR?

blog article

Apr 18, 2019

The GDPR (General Data Protection Regulation) outlines six principles that organisations must follow when collecting, processing and storing individuals’ personal data. Data controllers are responsible for complying with those principles, and they must have documented proof of how the organisa...

Read More

Why your development team should care about software compliance WHY YOUR DEVELOPMENT TEAM SHOULD CARE ABOUT SOFTWARE COMPLIANCE

blog article

Apr 18, 2019

Software compliance isn’t just a concern of security, development, and legal executives. Your developers and development managers should care about it too. Here’s why. How do you evaluate the quality of an application? A simple quality checklist would include these software performance c...

Read More

Point of Sale Security Tips to Keep Your Data Safe POINT OF SALE SECURITY TIPS TO KEEP YOUR DATA SAFE

blog article

Apr 18, 2019

Data security is critical given the volume of PII and transaction data being collected and stored by businesses. Any security breach, no matter how big or small, can tarnish your reputation and turn away customers. It happens everywhere, such as the loyalty program information breach Panera endured ...

Read More

Managing Privacy Compliance in the Cloud MANAGING PRIVACY COMPLIANCE IN THE CLOUD

blog article

Apr 18, 2019

The number and complexity of regulations addressing data privacy continues to increase significantly. Companies offering cloud-based services must comply with these regulations or risk losing business due to customer trust issues and/or potential fines and other legal action. Compliance with regulat...

Read More

Siegeware and BAS attacks, an emerging threat SIEGEWARE AND BAS ATTACKS, AN EMERGING THREAT

blog article

Apr 17, 2019

As technological solutions to cybercrime become increasingly advanced, able to preempt attacks and weed out vulnerabilities before they’re widely known, attackers also  become more adept at cloaking their presence and concealing their intent. The targets of attacks also change with the ti...

Read More

The Synopsys Cybersecurity Research Center (CyRC): Advancing the state of software security THE SYNOPSYS CYBERSECURITY RESEARCH CENTER (CYRC): ADVANCING THE STATE OF SOFTWARE SECURITY

blog article

Apr 17, 2019

The Synopsys Software Integrity Group is pleased to announce the public launch of CyRC (Cybersecurity Research Center). Our mission is simple—to advance the state of software security through research, innovation, and evangelism. More specifically, we strive to provide resources and informatio...

Read More

10 steps to GDPR compliance: How prepared are you? 10 STEPS TO GDPR COMPLIANCE: HOW PREPARED ARE YOU?

blog article

Apr 16, 2019

It’s not too late to comply with the GDPR (General Data Protection Regulation). The Regulation might have come into effect last year, but it’s requirements need to be regularly reviewed. As such, it doesn’t matter what your compliance posture was six months or a year ago. All that ...

Read More

Cyber attack powerlessness in the energy industry? CYBER ATTACK POWERLESSNESS IN THE ENERGY INDUSTRY?

blog article

Apr 16, 2019

Imagine one of your employees clicked on an email link that let attackers into your network. Imagine that you couldn’t produce energy, have lost control of your systems, and were sitting at the mercy of a ransom-seeking hacker or foreign nation-state intent on exercising political leverage. Wh...

Read More

Here’s How You Can Better Mitigate a Cyberattack HERE’S HOW YOU CAN BETTER MITIGATE A CYBERATTACK

blog article

Apr 16, 2019

Where does the attack landscape lead us into 2020? No one knows for sure, but strong indicators help Radware build logic chains to better forecast where the state of network security is heading in the future.  Last year alone, the initial attributable cost of cyberattacks increased by 52% and 9...

Read More

5 reasons why you need a good antivirus 5 REASONS WHY YOU NEED A GOOD ANTIVIRUS

blog article

Apr 16, 2019

In 1971 there was no internet – heck, there were barely any home computers! Nonetheless that’s when the first viruses appeared. Compared to today they were pretty tame. One of the earliest viruses, “Creeper”, just displayed the message “I’M A CREEPER : CATCH ME IF...

Read More

Cyber-Physical Attacks are Finally for Real CYBER-PHYSICAL ATTACKS ARE FINALLY FOR REAL

blog article

Apr 15, 2019

A range of crucial sectors now face a growing risk of attacks that experts say have the potential to cause cyber-physical mayhem. Here’s a heart stopper: On March 21, the Department of Homeland Security and the FDA alerted cardiologists, hospitals, and patients that hundreds of thousands of im...

Read More

From .tk Redirects to PushKa Browser Notification Scam FROM .TK REDIRECTS TO PUSHKA BROWSER NOTIFICATION SCAM

blog article

Apr 15, 2019

In the past couple of years, we’ve been tracking a long-lasting campaign responsible for injecting malicious scripts into WordPress sites. This campaign leverages old vulnerabilities (patched a long time ago) found in a variety of outdated themes and plugins. However, it also adds new vulnerab...

Read More

Breaking Down 5 Different Types of Malware Every Small Business Should Know BREAKING DOWN 5 DIFFERENT TYPES OF MALWARE EVERY SMALL BUSINESS SHOULD KNOW

blog article

Apr 15, 2019

Modern malicious software — or malware for short — has reached unprecedented levels of sophistication, and as the attack landscape continues to evolve, new threats will undoubtedly emerge. Malware affecting websites poses a special danger to businesses. Even some of the world’s lar...

Read More

The Importance of Securing Sensitive Data in a 5G World THE IMPORTANCE OF SECURING SENSITIVE DATA IN A 5G WORLD

blog article

Apr 15, 2019

The pace of change within communications networks is happening at speeds not seen since the shift from circuit-switched networks to IP began a couple of decades ago. Today, we are in the midst of the next major transformation to hit communications networks: the evolution to a new, 5G- and IPv6-enabl...

Read More

What is a Whaling Attack? Identify & Prevent Whale Phishing WHAT IS A WHALING ATTACK? IDENTIFY & PREVENT WHALE PHISHING

blog article

Apr 15, 2019

Are your company executives vulnerable to an attack? A whaling attack is very similar to a phishing attack, just with bigger targets such as the c-suite. In this article, learn how to stay ahead of the threat and prevent a data breach. What is a Whaling Attack? A whaling attack is a spear phishing a...

Read More

MasterCard, Microsoft Team with Federal Agencies and Nonprofit to Launch Cyber Talent Initiative MASTERCARD, MICROSOFT TEAM WITH FEDERAL AGENCIES AND NONPROFIT TO LAUNCH CYBER TALENT INITIATIVE

blog article

Apr 13, 2019

Mastercard, in collaboration with Microsoft, Workday and the nonprofit, nonpartisan Partnership for Public Service, launched the Cybersecurity Talent Initiative – a public-private partnership to recruit the nation’s best minds to defend against global cyberattacks. The Cybersecurity Tale...

Read More

FTC Announces New Cybersecurity Requirements, Privacy Rule Update FTC ANNOUNCES NEW CYBERSECURITY REQUIREMENTS, PRIVACY RULE UPDATE

blog article

Apr 13, 2019

In March, the Federal Trade Commission announced proposed updates to two key privacy and security regulations, the Safeguards Rule and Privacy Rule. Both rules implement regulations under the federal Gramm Leach Bliley Act, and the FTC seeks comments for both. The FTC’s proposed update to the ...

Read More

Tips To Scan And Remove Those Nasty Viruses From Your Phone TIPS TO SCAN AND REMOVE THOSE NASTY VIRUSES FROM YOUR PHONE

blog article

Apr 12, 2019

Before we explore the possibility if mobile phones can get virus, let’s learn more about the viruses itself. We all are very well familiar with computer viruses. They are malicious programs that infect and corrupt the files present in the computer, disrupting its performance and wreaking havoc...

Read More

IoT, GDPR and More Cybersecurity Trends in 2019 IOT, GDPR AND MORE CYBERSECURITY TRENDS IN 2019

blog article

Apr 12, 2019

TÜV Rheinland released its Cybersecurity Trends 2019, a report that contains eight important developments in cybersecurity. TREND 1: Cybersecurity has become a topic for the management level Until recently, lack of cybersecurity was not seen as a business risk, but as an IT problem. Despite yea...

Read More

How to Prevent Mirai Botnet DDoS Attacks? HOW TO PREVENT MIRAI BOTNET DDOS ATTACKS?

blog article

Apr 12, 2019

Mirai is a self-propagating botnet virus that infects internet-connected devices by turning them into a network of remotely controlled bots or zombies. This network of bots, known as a botnet, is mostly used to launch DDoS attacks. The Mirai botnet code infects internet devices that are poorly prote...

Read More

More Than Half of Organizations with Cybersecurity Incident Response Plans Fail to Test Them MORE THAN HALF OF ORGANIZATIONS WITH CYBERSECURITY INCIDENT RESPONSE PLANS FAIL TO TEST THEM

blog article

Apr 11, 2019

A vast majority of organizations are still unprepared to properly respond to cybersecurity incidents, with 77 percent of survey respondents indicating they do not have a cybersecurity incident response plan applied consistently across the enterprise. The 2019 Cyber Resilient Organization study from ...

Read More

New Cybersecurity Office to Open in West Virginia NEW CYBERSECURITY OFFICE TO OPEN IN WEST VIRGINIA

blog article

Apr 11, 2019

Legislation signed by West Virginia Governor creates a new cybersecurity office within the Office of Technology to assess the vulnerabilities of state agencies and unify security policies. The new office has the authority to set standards for cybersecurity and is charged with managing the cybersecur...

Read More

The Ping is the Thing: Popular HTML5 Feature Used to Trick Chinese Mobile Users into Joining Latest DDoS Attack THE PING IS THE THING: POPULAR HTML5 FEATURE USED TO TRICK CHINESE MOBILE USERS INTO JOINING LATEST DDOS ATTACK

blog article

Apr 11, 2019

DDoS attacks have always been a major threat to network infrastructure and web applications. Attackers are always creating new ways to exploit legitimate services for malicious purposes, forcing us to constantly research DDoS attacks in our CDN to build advanced mitigations. We recently investigated...

Read More

Compliance & Data Security Solutions Software Info | Digital Defenses COMPLIANCE & DATA SECURITY SOLUTIONS SOFTWARE INFO | DIGITAL DEFENSES

blog article

Apr 11, 2019

In my years working with technology and security data in the information security industry, I’ve heard numerous people confuse the word “compliance” with “security”.  We’ve all heard the stories in the news about an organization or company that was supposedly...

Read More

How IT Governance can help with your cyber security concerns HOW IT GOVERNANCE CAN HELP WITH YOUR CYBER SECURITY CONCERNS

blog article

Apr 11, 2019

Cyber security is a complex topic, so we wouldn’t be surprised if you had questions about what your organisation should be doing. The threat of data breaches grows each year, organisations process more information than ever and the regulatory landscape is becoming a minefield to navigate. Fort...

Read More

Can You Crack the Hack? CAN YOU CRACK THE HACK?

blog article

Apr 11, 2019

Struggling? We understand, it’s tricky! Here are two more clues: Hackers will often route login requests through proxy servers to avoid blacklisting their IP addresses It is a subset of Brute Force attacks, but different from credential cracking And the Answer Is. Credential stuffing! If you d...

Read More

GarrantyDecrypt Ransomware poses as EnigmaSoft GARRANTYDECRYPT RANSOMWARE POSES AS ENIGMASOFT'S SPYHUNTER

blog article

Apr 11, 2019

G DATA analysts discovered a ransomware that poses as "Enigma SpyHunter5". SpyHunter is a "Malware Remediation Utility" by EnigmaSoft. The ransomware adopts the logo of SpyHunter as its icon, the file name is "SpyHunter5.exe" and it uses file properties that hint to Spy...

Read More

ISTR 2019: Cyber Skimming Payment Card Data Hits the Big Time ISTR 2019: CYBER SKIMMING PAYMENT CARD DATA HITS THE BIG TIME

blog article

Apr 11, 2019

Formjacking, while by design less attention grabbing than ransomware, is becoming a pervasive form of money-making attack. During the past few years, we’ve seen alarming instances of nation states using cyber intrusions to sow political discord, infect critical infrastructure, and steal milita...

Read More

Sometimes Threat Hunting Isn’t Enough SOMETIMES THREAT HUNTING ISN’T ENOUGH

blog article

Apr 10, 2019

Proactively searching for threats is critical, but organizations trying to stop advanced threats need to understand that threat hunting is only one piece of the protection profile. All too often the security industry gets caught up in marketing buzzwords, causing a lopsided focus on one part of a mu...

Read More

Why Any Business Should Be Concerned About The Dark Web WHY ANY BUSINESS SHOULD BE CONCERNED ABOUT THE DARK WEB

blog article

Apr 10, 2019

When we perform a search on the internet, most of us search the surface web.  This is where most of our web browsing and social media takes place.  The deep web – initially developed by the US military – is an unindexed section of the web, with much more information available; ...

Read More

Why Does Linux Need Data Loss Prevention? WHY DOES LINUX NEED DATA LOSS PREVENTION?

blog article

Apr 10, 2019

Linux has earned a reputation of being the most secure operating system, but despite this, it still has its own security flaws. Deploying a secure operating system is an important starting point for every business, but even the most secure networks can be invaded. Similarly to the myth of the invuln...

Read More

Anatomy of a Cloud-Native Data Breach ANATOMY OF A CLOUD-NATIVE DATA BREACH

blog article

Apr 10, 2019

Migrating computing resources to cloud environments opens up new attack surfaces previously unknown in the world of premise-based data centers. As a result, cloud-native data breaches frequently have different characteristics and follow a different progression than physical data breaches. Here is a ...

Read More

Seqrite MobiSMART for GDPR Compliance SEQRITE MOBISMART FOR GDPR COMPLIANCE

blog article

Apr 10, 2019

It has almost been a year now that the General Data Protection Regulation (GDPR) has come into effect. A landmark legislation in the history of data protection, GDPR has changed the way enterprises approach cybersecurity. With its many definitions and focus on data protection and security, enterpris...

Read More

How To Keep Better Tabs on Your Connected Apps HOW TO KEEP BETTER TABS ON YOUR CONNECTED APPS

blog article

Apr 10, 2019

Not that long ago, before data breaches dominated daily headlines, we felt secure with our social media apps. Conveniently, every website seemed to allow logging in with Facebook or Twitter instead of creating a whole new password, and families of apps quickly became their own industry. Third-party ...

Read More

Attacks on Closed WordPress Plugins ATTACKS ON CLOSED WORDPRESS PLUGINS

blog article

Apr 10, 2019

The WordPress plugin repository team may “close” plugins and restrict downloads when they become aware of a security issue that the developer cannot fix quickly. However, bad actors are actively monitoring the WordPress plugin repository, paying close attention to these closed plugins. T...

Read More

Cybersecurity Innovation and the Patent Landscape CYBERSECURITY INNOVATION AND THE PATENT LANDSCAPE

blog article

Apr 10, 2019

It can be expected that costs associated with cybercrime will rise in the near to medium term and have a material impact on the global economy – while putting individual citizens’ and corporations’ important data at risk by cyber criminals. The White House estimates that in 2016, m...

Read More

Two Out of Three Hotels Inadvertently Leak Guests TWO OUT OF THREE HOTELS INADVERTENTLY LEAK GUESTS' PRIVATE DATA

blog article

Apr 10, 2019

Two out of three hotel websites inadvertently leak guests' booking details and personal data to third-party sites, including advertisers and analytics companies, according to research by Symantec Corp. The study looked at more than 1,500 hotel websites in 54 countries that ranged from two-star t...

Read More

Three Reasons Cybercriminals Continue to Succeed in Breaching Some of the Biggest Brands THREE REASONS CYBERCRIMINALS CONTINUE TO SUCCEED IN BREACHING SOME OF THE BIGGEST BRANDS

blog article

Apr 10, 2019

In 2018, we witnessed some of the biggest data breaches ever – affecting businesses and consumers alike. From social media, hospitality, healthcare and even mail delivery, 2018 proved that there is no escaping cybersecurity flaws, regardless of the type of business or its popularity. For examp...

Read More

SMBS MIDMARKET CONTINUE TO BE MASSIVE CYBERTHREAT TARGETS SMBS MIDMARKET CONTINUE TO BE MASSIVE CYBERTHREAT TARGETS

blog article

Apr 09, 2019

If you’re making the case for cyber resilience at your small to medium-sized organization, there is a whole slew of new data out there to help make your argument. Our ongoing blog series Bridging the Cyber Divide is all about helping you—the IT/security professional at a small-to-medium ...

Read More

JCry – A Ransomware written in Golang JCRY – A RANSOMWARE WRITTEN IN GOLANG

blog article

Apr 09, 2019

For several months, QH Labs has been observing an upswing in ransomware activity. We found a new ransomware which is written in Go lang. Malware authors are finding it easy to write ransomware in Go lang rather than traditional programming languages. Infection of Jcry ransomware starts with a compro...

Read More

10 Tips To Protect Your Emails From Getting Hacked 10 TIPS TO PROTECT YOUR EMAILS FROM GETTING HACKED

blog article

Apr 09, 2019

What is the most common form of communication in an organisation? Yes, you are right, it is email. It has truly revolutionized the way we contact and keep in touch with the people, be it in the vicinity or abroad. Currently, there are over 2 billion active email users around the world because it&rsq...

Read More

The most common causes of data breaches and how you can spot them THE MOST COMMON CAUSES OF DATA BREACHES AND HOW YOU CAN SPOT THEM

blog article

Apr 09, 2019

The longer a breach goes undetected, the more embarrassing it is for the organisation in question. But what’s a good target for identifying an incident? According to Ponemon Institute’s 2018 Cost of a Data Breach Study, it’s 100 days. The average cost of an incident discovered with...

Read More

Out of the Shadows, Into the Network OUT OF THE SHADOWS, INTO THE NETWORK

blog article

Apr 09, 2019

Network security is a priority for every carrier worldwide. Investments in human resources and technology solutions to combat attacks are a significant part of carriers’ network operating budgets. The goal is to protect their networks by staying a few steps ahead of hackers. Currently, carrier...

Read More

DDoS Targeting WordPress Search DDOS TARGETING WORDPRESS SEARCH

blog article

Apr 08, 2019

Have you ever stopped to think about how many resources a search engine has or if your website could handle the same amount of search traffic that Google does? Search engines play an important role on the internet and with how websites perform. One may say that they are the actual doorway to the onl...

Read More

Four Tips to Help Tidy Up Your Tech FOUR TIPS TO HELP TIDY UP YOUR TECH

blog article

Apr 08, 2019

This spring, many of us will roll up our sleeves and get down to business decluttering our homes. Garage sales will be held, basement storage rooms will be re-organized, and donations will be made.  Shouldn’t the same thing happen in our digital lives? After all, the average American will...

Read More

87% of organisations have an insufficient cyber security budget 87% OF ORGANISATIONS HAVE AN INSUFFICIENT CYBER SECURITY BUDGET

blog article

Apr 08, 2019

Although organizations are devoting more resources to cyber security in order to tackle the growing threat of data breaches, 87% say they don’t have the budget to meet their needs, a new report has found. According to the EY Global Information Security Survey 2018–19, organizations are f...

Read More

Card-Scraping Malware Compromised AeroGrow Customer Payment Data CARD-SCRAPING MALWARE COMPROMISED AEROGROW CUSTOMER PAYMENT DATA

blog article

Apr 08, 2019

Ecommerce company AeroGrow International is the latest high-profile breach after its buy page was infected with credit card scraping malware for more than four months, AeroGrow announced in a letter to its customers and to the California Office of the Attorney General. The malicious code was probabl...

Read More

DEALING WITH CYBERSECURITY STRESS DEALING WITH CYBERSECURITY STRESS

blog article

Apr 08, 2019

You may be feeling stress at this very moment, but do you really understand what it is and where it comes from, especially as an IT Security professional? What is Stress Really? What do you consider stressful?  How do you spot stressful situations? According to WebMD, stress is: “the body...

Read More

Are You Using Safe Android Antivirus? ARE YOU USING SAFE ANDROID ANTIVIRUS?

blog article

Apr 08, 2019

Tread carefully when it comes to Android security products – and never take an app provider’s claims at face value. In light of recent research showing that the majority of antivirus apps are pretty much useless, these messages are more relevant than ever. Here’s why many antivirus...

Read More

Making Our Security Portfolio Simpler — and Better MAKING OUR SECURITY PORTFOLIO SIMPLER — AND BETTER

blog article

Apr 07, 2019

Since its inception in 2009, Incapsula has been a proud part of Imperva, the analyst-recognized cybersecurity leader. However, cybersecurity needs are evolving, and so are we. On April 7th, we will officially retire Incapsula.com. All of the great Incapsula web site content that wasn’t already...

Read More

IT leaders need to be wary of becoming addicted to gambling on cybersecurity IT LEADERS NEED TO BE WARY OF BECOMING ADDICTED TO GAMBLING ON CYBERSECURITY

blog article

Apr 05, 2019

Winning a bet is one of life’s little pleasures. People make bets all the time. Many people even like to place wagers on the outcome of those bets. The trouble is gambling can become an addiction. What many organizations don’t realize is just how often CISOs and CIOs are now routinely ga...

Read More

Security testers breach university cyber defences in two hours SECURITY TESTERS BREACH UNIVERSITY CYBER DEFENCES IN TWO HOURS

blog article

Apr 05, 2019

More than 50 universities in the UK have had their lack of cyber defences exposed, with security testers breaching their systems in under two hours. The tests were conducted by Jisc, the agency that provides Internet services to the UK’s universities and research centres. The organization&rsqu...

Read More

68% of Tested Antivirus Apps Put Android Users at Risk 68% OF TESTED ANTIVIRUS APPS PUT ANDROID USERS AT RISK

blog article

Apr 05, 2019

Any time a user downloads a vulnerable or malicious mobile app, they could put your organization’s data at risk. Ironically, some malicious apps masquerade as ways to improve security, which can ensnare your most well-intentioned users. Research by AV-Comparatives, and independent organization...

Read More

Mobile applications: How to reduce fraud and increase trust MOBILE APPLICATIONS: HOW TO REDUCE FRAUD AND INCREASE TRUST

blog article

Apr 05, 2019

Applications have won mobile, that’s no longer news. As most organizations leverage mobile apps to enhance their users’ online experience, the whole mobile ecosystem is evolving accordingly. Cybercriminals and greedy individuals see in applications a surface to make money out of. Governm...

Read More

BEWARE – New BEWARE – NEW 'CREATIVE' PHISHING ATTACK YOU REALLY SHOULD PAY ATTENTION TO

blog article

Apr 05, 2019

A cybersecurity researcher who last month warned of a creative phishing campaign has now shared details of a new but similar attack campaign that has specifically been designed to target mobile users. Just like the previous campaign, the new phishing attack is also based on the idea that a malicious...

Read More

Phishing Education, Training Can Reduce Healthcare Cyber Risk PHISHING EDUCATION, TRAINING CAN REDUCE HEALTHCARE CYBER RISK

blog article

Apr 04, 2019

The healthcare sector is uniquely vulnerable to phishing attacks, due to high employee turnover and influx of new employees who may lack previous cybersecurity training, according to a new report published in the Journal of the American Medical Association. William Gordon, MD of Harvard Medical Scho...

Read More

Unsecured databases found leaking half a billion resumes on the net UNSECURED DATABASES FOUND LEAKING HALF A BILLION RESUMES ON THE NET

blog article

Apr 04, 2019

Barely a day goes by anymore without another report of sensitive data being left accessible to anyone on Elasticsearch servers or MongoDB databases that have not been properly configured. Today is no different. As ZDNet reports, researchers have discovered several exposed servers that belong to Chin...

Read More

National Cybersecurity Strategies: Commitment to Development NATIONAL CYBERSECURITY STRATEGIES: COMMITMENT TO DEVELOPMENT

blog article

Apr 04, 2019

In February 2019, the Cyber Policy Institute (CPI) and APNIC agreed to work together on complementary activities, particularly in the field of cyber capacity building in the Asia Pacific region. To start a conversation with the APNIC community, we are sharing some of the conclusions about a recent a...

Read More

Paliz, the PowerShell downloader in a ZIP and beyond PALIZ, THE POWERSHELL DOWNLOADER IN A ZIP AND BEYOND

blog article

Apr 04, 2019

Threat actors regularly come up with new techniques for malware downloaders to hide and execute their code with the expectation that they can fool antivirus solutions for some time. Paliz is an archive that carries malicious code in an unusual location. ZIP Archive Contents. This malware arrives via...

Read More

Getting smarter: IoT devices get some security standards GETTING SMARTER: IOT DEVICES GET SOME SECURITY STANDARDS

blog article

Apr 04, 2019

It looks like consumer smart devices might be getting a baseline set of standards, thanks to some collaboration between a UK government agency, a European Standards Organization, an industry association – and probably help from barrels and barrels of coffee. About time too, as a newly revised ...

Read More

Spam-support site leaves 800 million email addresses – and more – out in the open SPAM-SUPPORT SITE LEAVES 800 MILLION EMAIL ADDRESSES – AND MORE – OUT IN THE OPEN

blog article

Apr 03, 2019

A huge treasure chest of email addresses and other personal data has been discovered sitting online, unprotected, and unencrypted by a security researcher. The good news is that the list has since been removed. The bad news is that the list also contained an array of other private information such a...

Read More

Are Connected Cows a Hacker’s Dream? ARE CONNECTED COWS A HACKER’S DREAM?

blog article

Apr 03, 2019

The implications are massive. As the Financial Times pointed out, “Creating a system where a cow’s birth, life, produce and death are not only controlled but entirely predictable could have a dramatic impact on the efficiency of the dairy industry.” From Dairy Farm to Data Center S...

Read More

Hijacked Email Reply Chains HIJACKED EMAIL REPLY CHAINS

blog article

Apr 03, 2019

Although phishing has been around in various forms since the 1980s, our research shows it continues to evolve—and remains a major threat. These days, phishing tactics have gotten so sophisticated, it can be difficult to spot a scam—particularly in the case of hijacked email reply chains....

Read More

Phishing Attacks – What is Phishing? PHISHING ATTACKS – WHAT IS PHISHING?

blog article

Apr 03, 2019

Although phishing attacks can occur against individuals, we will primarily focus on attacks against organizations in this post.  We will use the term organization to represent governments, educational and healthcare institutions, and commercial businesses, but we will draw distinctions in the &...

Read More

Metadata – key info about these digital fingerprints METADATA – KEY INFO ABOUT THESE DIGITAL FINGERPRINTS

blog article

Apr 03, 2019

The US intelligence services have long been monitoring citizens all over the world, saying that it’s for counter-terrorism reasons. Everyone is a suspect. And it’s not just intelligence agencies that are crazy about metadata and traffic analysis – many companies are too. But what e...

Read More

SANS Reviews the CB Predictive Security Cloud SANS REVIEWS THE CB PREDICTIVE SECURITY CLOUD

blog article

Apr 03, 2019

Understanding the Landscape. Day by day, it is becoming more challenging to keep endpoints secure. In the SANS “Endpoint Protection and Response” survey from 2018, 42% of respondents indicated at least one of their endpoints had been compromised, and another 20% didn’t know if any ...

Read More

Tax-themed Email Campaigns Target 2019 Filers TAX-THEMED EMAIL CAMPAIGNS TARGET 2019 FILERS

blog article

Apr 03, 2019

Every year, Proofpoint observes a seasonal uptick in tax-related malware and phishing campaigns leading up to annual tax filing deadlines. In 2017, these campaigns focused on phishing and increasingly sophisticated social engineering, as well as banking Trojans and ransomware. In 2018, we observed s...

Read More

How to Recover Your Gmail, Facebook or Yahoo Account [Updated 2019] HOW TO RECOVER YOUR GMAIL, FACEBOOK OR YAHOO ACCOUNT [UPDATED 2019]

blog article

Apr 03, 2019

So you just got hacked and lost access to your email or social media account. What now? First, let’s start with what you shouldn’t do: panic. You’re not the first person to go through this, and you will not be the last. Big companies know this and have come up with ways for you to ...

Read More

Toyota suffers second data breach in five weeks TOYOTA SUFFERS SECOND DATA BREACH IN FIVE WEEKS

blog article

Apr 03, 2019

Toyota has disclosed a data breach that may have affected up to 3.1 million customers. It’s the second time the car manufacturer has been breached in the last five weeks. In a statement released on 29 March 2019, the organisation confirmed that several of its Asian subsidiaries were targeted b...

Read More

Not just for Processing: How Kafka Streams as a Distributed Database Boosted our Reliability and Reduced Maintenance NOT JUST FOR PROCESSING: HOW KAFKA STREAMS AS A DISTRIBUTED DATABASE BOOSTED OUR RELIABILITY AND REDUCED MAINTENANCE

blog article

Apr 03, 2019

The Apache Kafka Streams library is used by enterprises around the world to perform distributed stream processing on top of Apache Kafka. One aspect of this framework that is less talked about is its ability to store local state, derived from stream processing. In this blog post we describe how we t...

Read More

How to manage web application security with Coverity HOW TO MANAGE WEB APPLICATION SECURITY WITH COVERITY

blog article

Apr 03, 2019

Organizations in many industries use web applications to collect and handle information such as credit card numbers, emails, and customer behavior data. They rely on these web apps to run their businesses and gain a competitive edge. Clearly, many organizations are enjoying the automation and wealth...

Read More

INSIDER THREAT PROTECTION: HOW ORGANIZATIONS ADDRESS THE INEVITABLE INSIDER THREAT PROTECTION: HOW ORGANIZATIONS ADDRESS THE INEVITABLE

blog article

Apr 03, 2019

At Mimecast we are blessed to have more than 33,000 customers for our email security, archiving, web security and security awareness training services. And staying connected and engaged with these customers is key to our mutual success. But how best to do this? TechValidate While there is no one way...

Read More

PHISHER PLEADS GUILTY IN SCAM TARGETING HIGH-PROFILE CELEBRITIES, ATHLETES PHISHER PLEADS GUILTY IN SCAM TARGETING HIGH-PROFILE CELEBRITIES, ATHLETES

blog article

Apr 02, 2019

A phishing scam perpetrated by a man stealing sensitive personal information from high-profile individuals should provide a warning sign to organizations of all sizes: this could happen to you without the right safeguards in place. According to a report in Dark Reading, a Dacula, Ga. resident named ...

Read More

Vulnerability Management Metrics: The Final Frontier VULNERABILITY MANAGEMENT METRICS: THE FINAL FRONTIER

blog article

Apr 02, 2019

Operational Vulnerability Reports. An alarming yet common trend among organizations is to run a report that contains all the vulnerabilities under a particular system-owner and send them a very large report. Some organizations have matured beyond this point to provide reports that include everything...

Read More

Coding bootcamps need to get real about secure coding practices CODING BOOTCAMPS NEED TO GET REAL ABOUT SECURE CODING PRACTICES

blog article

Apr 02, 2019

It’s no secret that the world of software development has been thrust into the spotlight recently. Tech startups are popping up in “innovation districts” in cities around the world. And single-product software giants are growing floor by floor in some of the nation’s most exp...

Read More

Emerson Hospital Reports Third-party Vendor Breach from May 2018 EMERSON HOSPITAL REPORTS THIRD-PARTY VENDOR BREACH FROM MAY 2018

blog article

Apr 02, 2019

Concord, Massachusetts-based Emerson Hospital is notifying 6,300 patients that their data was potentially breached nearly one year ago, due to insider wrongdoing at one of its vendors. According to a statement released on March 8, the data breach occurred during a weeklong period from May 9 to May 1...

Read More

Malware Campaigns Sharing Network Resources: r00ts.ninja MALWARE CAMPAIGNS SHARING NETWORK RESOURCES: R00TS.NINJA

blog article

Apr 02, 2019

We recently noticed an interesting example of network infrastructure resources being used over a period of time by more than one large scale malware campaign (e.g redirected traffic, cryptomining). This was discovered when reviewing sources of the various malicious domains used in a recent WordPress...

Read More

What is a Zero-Day Attack? WHAT IS A ZERO-DAY ATTACK?

blog article

Apr 02, 2019

Zero-day attacks are the latest, never-before-seen generation of attacks. They are not volumetric or detectable from a known application signature. Security systems and experts must react instantly to solve the new issues, that is, they have zero days to react. Advanced application-level attacks typ...

Read More

When security cameras become the risk WHEN SECURITY CAMERAS BECOME THE RISK

blog article

Apr 02, 2019

Countless IP security cameras are insecure – anyone can watch in. You don’t even need any knowledge about hacking to do so. So who’s to blame? Well, it’s the fault of both careless manufacturers and all-too trusting consumers. It gives you great peace of mind to know that aft...

Read More

Five Things To Do To Prevent Ransomware FIVE THINGS TO DO TO PREVENT RANSOMWARE

blog article

Apr 01, 2019

One of the biggest trends in cybersecurity in 2017 was in the increase and severity of ransomware. Indeed, 2017 is the year that ransomware made the Merriam Webster dictionary. The trend is expected to continue onto 2018. According to a report published by Cyberscoop, the average ransomware attack e...

Read More

C-LEVEL FRAUD AND SPEAR-PHISHING ACROSS INTERNATIONAL BOUNDARIES C-LEVEL FRAUD AND SPEAR-PHISHING ACROSS INTERNATIONAL BOUNDARIES

blog article

Apr 01, 2019

Cave drawing found in southern France showing early spear-fishing have been dated back 16,000 years, and whaling has been practiced as an organized industry as early as 875 AD. While spear-fishing started out as an effective way to provide sustenance for early man and whaling started out as a means ...

Read More

How to be Secure in the Challenging Business Landscape HOW TO BE SECURE IN THE CHALLENGING BUSINESS LANDSCAPE

blog article

Apr 01, 2019

Data security is far from a side issue, of interest only to big players. On the contrary, it applies in equal measure to start-ups, small- and medium-sized enterprises, and global consortia. Even though the scale of issues each of these need to grapple with is completely different, security should b...

Read More

The Value of Threat Intelligence Feeds for Web Apps THE VALUE OF THREAT INTELLIGENCE FEEDS FOR WEB APPS

blog article

Mar 31, 2019

Because the threat landscape is constantly evolving and more volatile than ever, businesses need a solution that can keep up with the known threats that target their web-facing applications and services. New cyberthreats are hitting the market at an alarming rate. Emerging botnets like DrainerBot an...

Read More

Ransomware Attacks Becoming More Widespread, Destructive, Expensive RANSOMWARE ATTACKS BECOMING MORE WIDESPREAD, DESTRUCTIVE, EXPENSIVE

blog article

Mar 31, 2019

More ransomware attacks made news headlines this month, with the most notable being the Oslo, Norway-based aluminum manufacturing Norsk Hydro being shut down by ransomware. The company manufactures aluminum products, manufacturing close to half a million tons each year, and is also a significant pro...

Read More

Do your employees care about cyber security? DO YOUR EMPLOYEES CARE ABOUT CYBER SECURITY?

blog article

Mar 29, 2019

A recent report has found that just 15% of IT decision makers in small organisations “completely agree” that their employees have a good understanding of cyber security, and 20% believe their employees don’t care about cyber security at all. What’s more worrying is that despi...

Read More

Here Are the Free Ransomware Decryption Tools You Need to Use HERE ARE THE FREE RANSOMWARE DECRYPTION TOOLS YOU NEED TO USE

blog article

Mar 29, 2019

If your computer gets infected with ransomware, follow the steps below to recover your data: Step 1: Do not pay the ransom because there is no guarantee that the ransomware creators will give you access to your data. Step 2: Find any available backups you have, and consider keeping your data backups...

Read More

Turning Data into Metrics: A Vulnerability Management Story TURNING DATA INTO METRICS: A VULNERABILITY MANAGEMENT STORY

blog article

Mar 29, 2019

Cybersecurity Metrics in Business Context. As such, we as security professionals need to ensure we are providing data to the business, so they understand what it is we do and how it is we go about protecting them. The question herein is: What metrics should we provide? As technical folks, it’s...

Read More

What are Man in the Middle Attacks & How to Prevent MITM Attack With Examples WHAT ARE MAN IN THE MIDDLE ATTACKS & HOW TO PREVENT MITM ATTACK WITH EXAMPLES

blog article

Mar 28, 2019

What is a Man in the Middle Attack? How Does it Work? A Man-in-the-Middle (MITM) attack happens when a hacker inserts themselves between a user and a website. This kind of attack comes in several forms. For example, a fake banking website may be used to capture financial login information. The fake ...

Read More

How to protect sensitive data by managing your risk HOW TO PROTECT SENSITIVE DATA BY MANAGING YOUR RISK

blog article

Mar 28, 2019

No organization wants its applications to contain vulnerabilities that enable the theft of its sensitive data. The potential for brand damage, legal liability, compliance sanctions, and loss of business could be crippling. But no organization can spend all its time and money making its applications ...

Read More

Mergers and Acquisitions: When Their Attack Surface Becomes Your Attack Surface MERGERS AND ACQUISITIONS: WHEN THEIR ATTACK SURFACE BECOMES YOUR ATTACK SURFACE

blog article

Mar 28, 2019

When it comes to cybersecurity, mergers and acquisitions (M&As) are like a marriage. When two companies walk down the aisle together, one’s cybersecurity problems become the other’s baggage—whether they disclose it or not. The first half of 2018 saw $2.5 trillion in mergers in ...

Read More

Why Virus Protection for Android is Needed Today? WHY VIRUS PROTECTION FOR ANDROID IS NEEDED TODAY?

blog article

Mar 28, 2019

How does malware infect Android smartphones? The location and behavior of the user are two main influential factors that provide opportunities for hackers to infect Android devices. Hackers disguise android malware as legitimate mobile applications on websites and app stores. Unknowingly, users down...

Read More

Cyber Security Edge Analytics CYBER SECURITY EDGE ANALYTICS

blog article

Mar 28, 2019

For most, “analytics” represents a broad term, and rightfully so. As the prevailing winds of digital transformation continue to push interconnection to the digital edge, a plethora of real-time analytics requirements (and capabilities) have irreversibly raised the ante for immediately av...

Read More

Data Protection Regulations in Latin America DATA PROTECTION REGULATIONS IN LATIN AMERICA

blog article

Mar 28, 2019

The EU’s General Data Protection Regulation (GDPR) has created a domino effect across the world as its biggest trade partners rushed to align their existing data protection legislations to its strict requirements or passed new laws based on its example, in hopes of ensuring business operations...

Read More

Elfin: Relentless Espionage Group Targets Multiple Organizations in Saudi Arabia and U.S. ELFIN: RELENTLESS ESPIONAGE GROUP TARGETS MULTIPLE ORGANIZATIONS IN SAUDI ARABIA AND U.S.

blog article

Mar 27, 2019

Although heavily focused on the Middle East, Elfin (aka APT33) has also targeted a range of organizations in the U.S. including a number of major corporations. The Elfin espionage group (aka APT33) has remained highly active over the past three years, attacking at least 50 organizations in Saudi Ara...

Read More

Location data leaks from family tracking app database LOCATION DATA LEAKS FROM FAMILY TRACKING APP DATABASE

blog article

Mar 27, 2019

An app called Family Locator, which allows family members to keep track of one another recently experienced an exposed database issue of the worst kind. Specifically: the MongoDB database was left exposed with no password, like so many other recent infosec tales of woe. The end result is the locatio...

Read More

How to Deliver on DevSecOps While Winning Support from the DevOps Team HOW TO DELIVER ON DEVSECOPS WHILE WINNING SUPPORT FROM THE DEVOPS TEAM

blog article

Mar 27, 2019

As an engineering leader for more than 20 years, I’ve experienced the journey from waterfall to agile to DevOps and now DevSecOps with my teams. While much has been written about the DevSecOps movement from the perspective of developer and security professionals, I aim to share insight from a ...

Read More

The cyber-physical convergence is accelerating—and so are the risks THE CYBER-PHYSICAL CONVERGENCE IS ACCELERATING—AND SO ARE THE RISKS

blog article

Mar 27, 2019

The fact that a cyber attack can have physical consequences is not exactly breaking news. The use of the computer worm Stuxnet to destroy nearly a thousand, or about a fifth, of the centrifuges in Iran’s Natanz nuclear enrichment facility is now a decade in the rearview. The warnings of a &ldq...

Read More

SUPPLY-CHAIN ATTACKS IN THE REAL WORLD: BRIDGING THE CYBER DIVIDE SUPPLY-CHAIN ATTACKS IN THE REAL WORLD: BRIDGING THE CYBER DIVIDE

blog article

Mar 27, 2019

Any business in the B2B space is part of a supply chain, whether you feed into larger businesses or those larger businesses feed into you. If you find yourself as a smaller business feeding into larger ones, you are more susceptible to attacks than some in your organization may think. In a previous ...

Read More

Data Breach Liabilities - PCI Penalties, GDPR and a Warranty DATA BREACH LIABILITIES - PCI PENALTIES, GDPR AND A WARRANTY

blog article

Mar 27, 2019

Data breaches seem to be a regular feature in the news nowadays, especially since GDPR regulation kicked in last year. This higher frequency of articles announcing newly-hacked-victim-organizations gives an idea of the growing scale of the security problem - a trend that we have been talking and war...

Read More

How to Avoid Being a Victim of Scam Phone Calls HOW TO AVOID BEING A VICTIM OF SCAM PHONE CALLS

blog article

Mar 27, 2019

Scam phone calls are anything but new. You may even think they’ve almost become extinct. Even if it’s great to watch them decrease year by year, we hate to admit they are still happening. One day you may get a call from a friendly and overly-polite support technician, who claims your com...

Read More

There’s No Day Off for Cybersecurity Professionals THERE’S NO DAY OFF FOR CYBERSECURITY PROFESSIONALS

blog article

Mar 27, 2019

The last 12 months saw large corporations, from hotels to internet giants, hit the headlines after suffering crippling data breaches—and it seems like this pattern is set to continue in the coming years. The sheer magnitude and frequency of these attacks is evidence that no matter the size or ...

Read More

Healthcare Phishing Statistics: 2019 HIMSS Survey Results HEALTHCARE PHISHING STATISTICS: 2019 HIMSS SURVEY RESULTS

blog article

Mar 27, 2019

In the healthcare industry, phishing is the initial point of compromise in most significant security incidents, according to a recent report from the Healthcare Information and Management Systems Society (HIMSS). And yet, 18% of healthcare organizations fail to conduct phishing tests, a finding HIMS...

Read More

ASUS pushes out urgent security update after attackers hacked its automatic Live Update tool ASUS PUSHES OUT URGENT SECURITY UPDATE AFTER ATTACKERS HACKED ITS AUTOMATIC LIVE UPDATE TOOL

blog article

Mar 27, 2019

Taiwan-based technology giant ASUS is advising concerned customers to run a newly-created diagnostic tool on their Windows computers after hackers pushed out malware to what some security researchers have estimated to be as many as one million PCs using ASUS’s own Live Update software tool. As...

Read More

DDoS Protection Requires Looking Both Ways DDOS PROTECTION REQUIRES LOOKING BOTH WAYS

blog article

Mar 26, 2019

Service availability is a key component of the user experience. Customers expect services to be constantly available and fast-responding, and any downtime can result in disappointed users, abandoned shopping carts, and lost customers. Consequently, DDoS attacks are increasing in complexity, size and...

Read More

Plugin vulnerabilities exploited in traffic monetization schemes PLUGIN VULNERABILITIES EXPLOITED IN TRAFFIC MONETIZATION SCHEMES

blog article

Mar 26, 2019

In their Website Hack Trend Report, web security company Sucuri noted that WordPress infections rose to 90 percent in 2018. One aspect of Content Management System (CMS) infections that is sometimes overlooked is that attackers not only go after the CMSes themselves—WordPress, Drupal, etc.&mda...

Read More

How to Choose a Website Security Provider HOW TO CHOOSE A WEBSITE SECURITY PROVIDER

blog article

Mar 25, 2019

As more people are creating websites and becoming aware of website security, companies are popping up everywhere to help with the problem. And just like website security plugins, not all website security services are created equal. Here at Sucuri, we believe that you should do your website security ...

Read More

Some aspects of info security haven SOME ASPECTS OF INFO SECURITY HAVEN'T CHANGED MUCH IN THEORY

blog article

Mar 25, 2019

You may be interested to know that most every modern cybersecurity technique used today is based on methodologies developed and used thousands of years ago. So, in the spirit of those who don’t know their past are doomed to repeat it, let’s look at how modern cybersecurity has evolved fr...

Read More

Facebook Password Breach: What You Need to Know FACEBOOK PASSWORD BREACH: WHAT YOU NEED TO KNOW

blog article

Mar 22, 2019

Yesterday Facebook disclosed during a routine security review they discovered “some” user passwords were being stored unencrypted, but the passwords were not visible to anyone outside of Facebook. Facebook’s definition of “some” doesn’t really illustrate the full ...

Read More

Researchers go hunting for Netflix’s Bandersnatch RESEARCHERS GO HUNTING FOR NETFLIX’S BANDERSNATCH

blog article

Mar 22, 2019

A new research paper from the Indian Institute of Technology Madras explains how popular Netflix interactive show Bandersnatch could fall victim to a side-channel attack. In 2016, Netflix began adding TLS (Transport Layer Security) to their video content to ensure strangers couldn’t eavesdrop ...

Read More

Don’t Let Cloud Threats Rain on Your Parade DON’T LET CLOUD THREATS RAIN ON YOUR PARADE

blog article

Mar 22, 2019

Our recent blog post detailing how cybercriminals compromise cloud accounts provides crucial insight into attacks on Microsoft Office 365 and Google G Suite specifically.  40% of all tenants have at least one compromised account in their environment as a result of these brute force and phishing...

Read More

Password Security : 3 Helpful Tips To Make Your Passwords As Secure As Possible PASSWORD SECURITY : 3 HELPFUL TIPS TO MAKE YOUR PASSWORDS AS SECURE AS POSSIBLE

blog article

Mar 22, 2019

Today, almost everyone is on the internet, yet many people still have not learned lessons about securing online passwords. Password security is a legitimate issue, and if you overlook it, it could put you at great risks. While advanced techniques such as fingerprints and facial recognition have beco...

Read More

Cyber Attacks on Financial Institutions are the Modern-Day Bank Robbery CYBER ATTACKS ON FINANCIAL INSTITUTIONS ARE THE MODERN-DAY BANK ROBBERY

blog article

Mar 22, 2019

The financial sector has long been a target of cyber thieves. But despite their robust security postures, they continue to be the focus of some of the most innovative attack campaigns. Cybercriminals are laser focused on crafting attacks that will yield the most amount of revenue for the least amoun...

Read More

North Carolina’s Orange County Hit by Third Ransomware Attack in Six Years NORTH CAROLINA’S ORANGE COUNTY HIT BY THIRD RANSOMWARE ATTACK IN SIX YEARS

blog article

Mar 22, 2019

Orange County in North Carolina suffered its third ransomware infection in six years, the local government announced on its website on Monday. The attack, probably stemming from a phishing email, a very common practice in such situations, crippled the county’s IT infrastructure and left a numb...

Read More

Millions of Facebook Passwords Kept in Plain Text for Employees to Access MILLIONS OF FACEBOOK PASSWORDS KEPT IN PLAIN TEXT FOR EMPLOYEES TO ACCESS

blog article

Mar 22, 2019

Perhaps we should all change our Facebook passwords to play it safe, following news that Facebook kept, from as early as 2012, “hundreds of millions” of user account passwords in plain text, making them available to some 20,000 employees, writes KrebsOnSecurity following a tip from a sou...

Read More

3059 android malware detected per day in 2018 – Are you still counting on free android antivirus for protection? 3059 ANDROID MALWARE DETECTED PER DAY IN 2018 – ARE YOU STILL COUNTING ON FREE ANDROID ANTIVIRUS FOR PROTECTION?

blog article

Mar 22, 2019

The incidents of cyber-attacks on smartphones, especially those working on the popular Android operating system, have been on a constant rise. However, a major reason people still continue to go in for android smartphones, is the fact that these are mostly cheap to buy. However, the year 2018 ended ...

Read More

Security Leadership Series: You Know Cybersecurity is More Than Compliance. But, Do They? SECURITY LEADERSHIP SERIES: YOU KNOW CYBERSECURITY IS MORE THAN COMPLIANCE. BUT, DO THEY?

blog article

Mar 21, 2019

How do you know if your cybersecurity program is truly working? That’s the million-dollar (or for most businesses, the tens-of-thousands of dollar) question. And, if you’re lucky enough to be able to dedicate resources to your organization’s cybersecurity program, this is an import...

Read More

THE HOTTEST CYBERSECURITY SKILLS OF 2019 THE HOTTEST CYBERSECURITY SKILLS OF 2019

blog article

Mar 21, 2019

Cybersecurity Ventures estimated 3.5 million unfilled cybersecurity jobs by 2021, and the United States is moving on pace to hit half-a-million or more unfilled cybersecurity positions by 2021. [1] We are just a couple of months into 2019, and looking at the above statistics, we can expect to have m...

Read More

WOW, Phishing Attacks Are Now More Common Than Malware WOW, PHISHING ATTACKS ARE NOW MORE COMMON THAN MALWARE

blog article

Mar 21, 2019

Microsoft’s security team is uniquely positioned to analyze trends in cyber security threats. Their frequent Security Intelligence Reports (SIR) are an excellent indicator of these trends. Redmond's numbers are based on their internal scan of O365 email addresses. Get the latest SIR here. ...

Read More

Are hackers gonna hack anymore? Not if we keep reusing passwords ARE HACKERS GONNA HACK ANYMORE? NOT IF WE KEEP REUSING PASSWORDS

blog article

Mar 21, 2019

Enterprises have a password problem, and it’s one that is making the work of hackers a lot easier. From credential stuffing to brute force and password spraying attacks, modern hackers don’t have to do much hacking in order to compromise internal corporate networks. Instead, they log in ...

Read More

Why you need to start thinking about supply chain cyber security WHY YOU NEED TO START THINKING ABOUT SUPPLY CHAIN CYBER SECURITY

blog article

Mar 21, 2019

A lot of businesses are already addressing the need to have an understanding of their own cyber security risks and looking at measures to ensure that their business is suitably protected.  The next step on the road to managing your cyber security is to think about your supply chain and whether ...

Read More

When Is a Data Breach a Data Breach? WHEN IS A DATA BREACH A DATA BREACH?

blog article

Mar 21, 2019

A data breach remains a common headline in the news cycle. A different company, website or social network reports a security issue almost daily. If it feels like using the internet has become a risky endeavor, the feeling is accurate. But what exactly classifies an event as a data breach? The world ...

Read More

Mobile security event collection for SIEM software MOBILE SECURITY EVENT COLLECTION FOR SIEM SOFTWARE

blog article

Mar 21, 2019

Maintaining a safe digital framework can be a tricky task for large organizations’ IT teams. To help them, some solutions such as security information and event management (SIEM) softwares are specifically designed to group and analyze large amounts of data and make them comprehensible at a hu...

Read More

Want to secure your apps? Build security in with the right toolchain WANT TO SECURE YOUR APPS? BUILD SECURITY IN WITH THE RIGHT TOOLCHAIN

blog article

Mar 21, 2019

Is it worth making more than a minimal effort to avoid data breaches? The answer ought to be obvious by now. As Tim Mackey, technical evangelist at Synopsys, noted at RSA Conference in San Francisco in early March, data breaches are “serious business.” The price that breached companies p...

Read More

Consumers May Lose Sleep Over These Two New Magecart Breaches CONSUMERS MAY LOSE SLEEP OVER THESE TWO NEW MAGECART BREACHES

blog article

Mar 20, 2019

We’ve seen Magecart conduct numerous high-profile digital credit card-skimming attacks against major international companies like British Airways, Ticketmaster, and Newegg. These Magecart groups have won unprecedented attention for themselves. Security professionals have Magecart firmly on the...

Read More

Is the Private or Public Cloud Right for Your Business? IS THE PRIVATE OR PUBLIC CLOUD RIGHT FOR YOUR BUSINESS?

blog article

Mar 20, 2019

It wasn’t a very long time ago when cloud computing was a niche field that only the most advanced organizations were dabbling with. Now the cloud is very much the mainstream, and it is rare to find a business that uses IT that doesn’t rely on it for a part of its infrastructure. But if y...

Read More

How to Become a Bug Bounty Hunter : Zerodium offers $500K for a Hyper-V Zero-Day HOW TO BECOME A BUG BOUNTY HUNTER : ZERODIUM OFFERS $500K FOR A HYPER-V ZERO-DAY

blog article

Mar 20, 2019

A zero-day vulnerability is the name given to a newly-identified software security flaw. If left unfixed, it offers hackers the opportunity to create a ​package designed to specifically target that bug in order to compromise user systems. This type of ​package is known as a zero-day exploit.

Read More

MOVING EMAIL TO THE CLOUD? CYBER RESILIENCE IS A MUST MOVING EMAIL TO THE CLOUD? CYBER RESILIENCE IS A MUST

blog article

Mar 20, 2019

Microsoft's announcement that it has launched its first cloud data centers in Africa—one in Cape Town, another in Johannesburg—is a cause for celebration among South Africa's business sector. As we hurtle into the Fourth Industrial Revolution, access to cloud infrastructure will ...

Read More

Building Holistic Security Into your DevOps and Throughout your Organization BUILDING HOLISTIC SECURITY INTO YOUR DEVOPS AND THROUGHOUT YOUR ORGANIZATION

blog article

Mar 20, 2019

The motivation to introduce DevOps in most organizations is to increase the speed by which feature enhancements and new developments are brought to users in a way that aligns with business goals. Speed, in and of itself, is not a bad motivation; especially when aligned with business goals that inclu...

Read More

How the GDPR Raises Public Awareness About Privacy HOW THE GDPR RAISES PUBLIC AWARENESS ABOUT PRIVACY

blog article

Mar 20, 2019

Data privacy rights have advanced since the European Union’s General Data Protection Regulation (GDPR) rules took effect nearly a year ago in May 2018. GDPR outlines privacy protection and control for EU citizens and requires companies to notify users about their data collection practices and ...

Read More

Cloud Database Security—What Is There to Know? CLOUD DATABASE SECURITY—WHAT IS THERE TO KNOW?

blog article

Mar 20, 2019

The recent Oracle and KPMG Cloud Threat Report 2019 uncovers some interesting facts about cloud database security: 73% of respondents feel the public cloud is more secure than what they can deliver in their own data center and are moving to the cloud. 71% of organizations indicated that a majority o...

Read More

FILELESS MALWARE: UNDERSTANDING THE INVISIBLE CYBERATTACK FILELESS MALWARE: UNDERSTANDING THE INVISIBLE CYBERATTACK

blog article

Mar 20, 2019

Fileless Malware: What It Stands For? Fileless malware, or non-malware, is a zero-footprint attack that does not depend on any malicious software to spread and infect the user’s machine. It, instead, finds existing vulnerabilities in the machine and takes advantage of it. Fileless malware illu...

Read More

The Intersections between Cybersecurity and Diversity THE INTERSECTIONS BETWEEN CYBERSECURITY AND DIVERSITY

blog article

Mar 20, 2019

Cybersecurity and diversity are high-value topics that are most often discussed in isolation. Both topics resonate with individuals and organizations alike. However, the intersections between cybersecurity and diversity are often overlooked. As nations and organizations seek to protect their critica...

Read More

Tips To Keep Your Small To Medium-Size Business (SMB’s) Data Safe & Secure TIPS TO KEEP YOUR SMALL TO MEDIUM-SIZE BUSINESS (SMB’S) DATA SAFE & SECURE

blog article

Mar 20, 2019

With all the data breaches and frauds taking place every day, it’s no secret that new business owners and marketers need to be more aware of the cyber threats that can drastically affect their business as well as personal data. Many business owners think that their data and assets are protecte...

Read More

How to Secure Your Online Brand HOW TO SECURE YOUR ONLINE BRAND

blog article

Mar 20, 2019

What is online brand security? As we outlined in our Practical Guide to Reducing Digital Risk, the integrity of brand and identity is essential in protecting a business. Adversaries are routinely impersonating businesses and critical online services to target customers and significant business trans...

Read More

HTTPS: Privacy vs. Security, and Where End Users and Security Culture Fit In HTTPS: PRIVACY VS. SECURITY, AND WHERE END USERS AND SECURITY CULTURE FIT IN

blog article

Mar 20, 2019

Since the dawn of IT, there’s been a very consistent theme among admins: end users are the weakest link in your network, organization, security strategy, fill-in-the-blank. We’ve all heard the stories, and even experienced them first-hand. An employee falls for a phishing scam and the wh...

Read More

BEC Goes Mobile as Cybercriminals Turn to SMS BEC GOES MOBILE AS CYBERCRIMINALS TURN TO SMS

blog article

Mar 19, 2019

Business email compromise (BEC) is a term that encompasses a variety of techniques and tactics that cybercriminals leverage to obtain money or data via identity deception. Despite the evolution and repurposing of this suite of associated tactics, one constant has remained throughout—the corres...

Read More

HOW TO KEEP SPIDER WEBS, BUGS OR INSECTS AWAY FROM SECURITY CAMERAS HOW TO KEEP SPIDER WEBS, BUGS OR INSECTS AWAY FROM SECURITY CAMERAS

blog article

Mar 19, 2019

If you have security cameras outside your home, you might be wondering why spiders love to spin cobwebs across camera lenses. The truth is, spiders don’t actually love your cameras—they love the bugs attracted to the infrared light emitting from your camera. This can be a real issue for ...

Read More

Google Play is flooded with hundreds of unsafe anti-virus products GOOGLE PLAY IS FLOODED WITH HUNDREDS OF UNSAFE ANTI-VIRUS PRODUCTS

blog article

Mar 19, 2019

A new study conducted by AV-Comparatives, a well-respected independent testing agency, has closely examined whether 250 security products for Android smartphones are capable of protecting users at all. The test evaluated whether Android anti-virus products available in the official Google Play store...

Read More

Cyber Security Incident Response and Reporting Process CYBER SECURITY INCIDENT RESPONSE AND REPORTING PROCESS

blog article

Mar 19, 2019

Ever since we launched our customizable cyber security incident response template, I’ve been amazed by its volume of downloads. I quickly realized that the increasing cyber threats from criminal hackers, malware and ransomware is starting to be taken seriously by organizations large and small,...

Read More

Office 365 Security Features Demystified OFFICE 365 SECURITY FEATURES DEMYSTIFIED

blog article

Mar 19, 2019

Microsoft has numerous Office 365 security features built in to help you monitor activity, protect data, identify threats, and manage identity, access, and privileges. But getting the most out of those tools can be difficult, particularly for mid-sized organizations. Integrating them with data from ...

Read More

Breaking Research: LockerGoga Ransomware Impacts Norsk Hydro BREAKING RESEARCH: LOCKERGOGA RANSOMWARE IMPACTS NORSK HYDRO

blog article

Mar 19, 2019

It has been reported today that Norsk Hydro either switched to manual mode or temporarily stopped aluminum production at several plants following a cyberattack. The Norwegian National Security Authority and local media in Norway describe the incident as a ransomware attack by a malware called Locker...

Read More

Like Football, Your Cybersecurity Defense Needs a Strong Offense LIKE FOOTBALL, YOUR CYBERSECURITY DEFENSE NEEDS A STRONG OFFENSE

blog article

Mar 18, 2019

History credits Revolutionary War hero George Washington with being among the first to vocalize this concept, later famously echoed by heavyweight boxing champ Jack Dempsey and football god Vince Lombardi. And it’s easy to see what they mean. The idea is that being proactive—going on the...

Read More

5 Best Enforced Encryption Features 5 BEST ENFORCED ENCRYPTION FEATURES

blog article

Mar 18, 2019

Faced with increasingly restrictive data protection regulations and the very real threat of cyberattacks, businesses big and small have recently made data security a top priority. But, as they invest in complex strategies to protect data within their company networks, they often overlook one of the ...

Read More

Chinese Hackers Targeting Universities in Attempting to Gain Military secrets CHINESE HACKERS TARGETING UNIVERSITIES IN ATTEMPTING TO GAIN MILITARY SECRETS

blog article

Mar 18, 2019

iDefense, a cybersecurity intelligence unit of Accenture Security, has recently reported that at least 27 different universities in the United States, Canada, and Southeast Asia have been targeted by the attackers including the University of Hawaii, Massachusetts Institute of Technology (MIT) and th...

Read More

Detecting Cyberattacks Through the Ever-evolving Cybersecurity Industry DETECTING CYBERATTACKS THROUGH THE EVER-EVOLVING CYBERSECURITY INDUSTRY

blog article

Mar 18, 2019

Cybersecurity has come a long way since its inception in the 1990s.1 In the beginning, hackers were generally considered a nuisance, and their hacks – which were pretty limited in terms of their scope – were designed more to cause trouble than harm. When the internet began to take centre...

Read More

Arbitrary Directory Deletion in WP-Fastest-Cache ARBITRARY DIRECTORY DELETION IN WP-FASTEST-CACHE

blog article

Mar 18, 2019

The WP-Fastest-Cache plugin authors released a new update, version 0.8.9.1, fixing a vulnerability (CVE-2019-6726) present during its install alongside the WP-PostRatings plugin. According to seclists.org: A successful attack allows an unauthenticated attacker to specify a path to a directory from w...

Read More

Uncommon Radixes Used in Malware Obfuscation UNCOMMON RADIXES USED IN MALWARE OBFUSCATION

blog article

Mar 15, 2019

Some JavaScript features allow for pretty interesting obfuscation techniques. For example, did you know that virtually any English word can be used as a valid number? I recently decoded a credit card stealing script injected at the bottom of a js/varien/js.js file: There were several layers of obfus...

Read More

SSL Based Cyber-attacks Increase by 400% Over the Last Year SSL BASED CYBER-ATTACKS INCREASE BY 400% OVER THE LAST YEAR

blog article

Mar 15, 2019

A new report found that last year there had been a 400% increase in SSL-based phishing threats, criminals are increasingly using encryption as part of their toolkit to evade detection and launch malware. When data is encrypted, it cannot be accessed and exploited by unauthorised users. If you are se...

Read More

New Customization Center Gives Organizations More Control of Training Content NEW CUSTOMIZATION CENTER GIVES ORGANIZATIONS MORE CONTROL OF TRAINING CONTENT

blog article

Mar 15, 2019

We are excited to announce the launch of a new feature that will enable our customers to deliver security awareness training that more effectively meets unique organizational goals. The self-service Customization Center in the Proofpoint Security Education Platform gives program administrators acces...

Read More

Post Coinhive, What’s Next for Cryptojacking? POST COINHIVE, WHAT’S NEXT FOR CRYPTOJACKING?

blog article

Mar 15, 2019

In late February, the notorious cryptojacking script engine called Coinhive abruptly announced the impending end to its service. The stated reason: it was no longer economically viable to run. Coinhive became infamous quickly following its debut as an innovative javascript-based cryptomining script ...

Read More

Endpoint Protector for Better Security at RSAC 2019 ENDPOINT PROTECTOR FOR BETTER SECURITY AT RSAC 2019

blog article

Mar 15, 2019

Organized for the 28th time in San Francisco, the RSA Conference 2019 tackled with the idea of “Better”. This year’s theme was about what defines better in the field of cybersecurity and what can organizations do to better their security outcomes. Is it about new tools for building...

Read More

Joomla! Releases 3.9.4 Addressing New Security Vulnerabilities JOOMLA! RELEASES 3.9.4 ADDRESSING NEW SECURITY VULNERABILITIES

blog article

Mar 15, 2019

The latest version of the Joomla! 3.x series was released on March 12, 2019. Version 3.9.4 addresses four security flaws and 28 bug fixes, which includes a high-priority access level vulnerability. Three of the four security flaws are cross-site scripting (XSS) vulnerabilities, which have been ident...

Read More

Emsisoft Mobile Security scores top marks in AV-Comparatives’ Android Test 2019 EMSISOFT MOBILE SECURITY SCORES TOP MARKS IN AV-COMPARATIVES’ ANDROID TEST 2019

blog article

Mar 14, 2019

Mobile antivirus apps have come under close scrutiny in recent years, thanks, in no small part, to bogus security apps like Virus Shield that don’t actually do anything. Dozens of other security apps have been identified as trojans or been found to provide ineffective protection. Of course, th...

Read More

Are you Protected against These Common Types of Cyber Attacks? ARE YOU PROTECTED AGAINST THESE COMMON TYPES OF CYBER ATTACKS?

blog article

Mar 14, 2019

The types of cyber-security attacks that businesses need to protect themselves from are continually growing and evolving. Keeping your company secure means having insight into the most common threats, and the categories of cyber attacks that might go unnoticed. From how to use the principle of least...

Read More

Security Pros and Perils of Serverless Architecture SECURITY PROS AND PERILS OF SERVERLESS ARCHITECTURE

blog article

Mar 14, 2019

Serverless architectures are revolutionizing the way organizations procure and use enterprise technology. This cloud computing model can drive cost-efficiencies, increase agility and enable organizations to focus on the essential aspects of software development. While serverless architecture offers ...

Read More

Emotet revisited: pervasive threat still a danger to businesses EMOTET REVISITED: PERVASIVE THREAT STILL A DANGER TO BUSINESSES

blog article

Mar 14, 2019

One of the most common and pervasive threats for businesses today is Emotet, a banking Trojan turned downloader that has been on our list of top 10 detections for many months in a row. Emotet, which Malwarebytes detects as Trojan.Emotet, has been leveled at consumers and organizations across the glo...

Read More

What is a Computer Virus and how do they work? WHAT IS A COMPUTER VIRUS AND HOW DO THEY WORK?

blog article

Mar 14, 2019

How does a Computer Virus Spread. A computer virus spreads through removable media, internet downloads, and e-mail attachments. In other words, a virus spreads while the user is viewing an infected advertisement, visiting an infected website, opening the attachment in the email, or clicking on an ex...

Read More

How the 5G Telco Market is Transforming with Lessons Learned from the Enterprise HOW THE 5G TELCO MARKET IS TRANSFORMING WITH LESSONS LEARNED FROM THE ENTERPRISE

blog article

Mar 14, 2019

Over the past six months, more people in the general populace have begun using the term 5G in their regular conversations. It was a big focus at the recently-concluded MWC Barcelona event in February. And high-profile publications like TIME and BusinessWeek are writing articles to explain 5G to the ...

Read More

Making it Rain - Cryptocurrency Mining Attacks in the Cloud MAKING IT RAIN - CRYPTOCURRENCY MINING ATTACKS IN THE CLOUD

blog article

Mar 14, 2019

Organizations of all sizes have made considerable shifts to using cloud-based infrastructure for their day-to-day business operations. However, cloud security hasn't always kept up with cloud adoption, and that leaves security gaps that hackers are more than happy to take advantage of. One of th...

Read More

WHY PROFESSIONALS PREFER CONTINUOUS CYBERSECURITY TRAINING WHY PROFESSIONALS PREFER CONTINUOUS CYBERSECURITY TRAINING

blog article

Mar 14, 2019

Continuous learning has many benefits and with the “ever-evolving” technology, learning is the only tool to keep yourself updated and ahead of the competition. In this article, let us see how powerful the approach of continuous training is, especially when it is applied to a cybersecurit...

Read More

How to Use Forensic Data to Improve Cybersecurity HOW TO USE FORENSIC DATA TO IMPROVE CYBERSECURITY

blog article

Mar 14, 2019

What’s the first thing you think of when you hear the word “forensics?” Odds are, if you’re like most Americans, the first thing you thought about was a crime & mystery show like NCIS, CSI, or Law & Order. However, forensics plays a role in cybersecurity, too. Many ne...

Read More