RESOURCES


home.aspx
   
SILENTDEFENSE™ AND THE FORESCOUT PLATFORM: CYBERSECURITY FOR CONVERGING IT/OT REQUIREMENTS SILENTDEFENSE™ AND THE FORESCOUT PLATFORM: CYBERSECURITY FOR CONVERGING IT/OT REQUIREMENTS

blog article

Nov 15, 2018

Today’s cyber threats are ever-changing and evolving. Over the last decade, we have seen malware begin to target non-enterprise devices and industrial control systems (ICS) at an alarming pace.  However, most critical infrastructure and ICS asset owners are ill-equipped for this changing ...

Read More

FireEye Endpoint Security Achieves Highest Testing Results Amongst NGAV Products FIREEYE ENDPOINT SECURITY ACHIEVES HIGHEST TESTING RESULTS AMONGST NGAV PRODUCTS

blog article

Nov 14, 2018

In the most recent AV-Comparatives Real-World Protection Test results, FireEye Endpoint Security achieved the highest detection rate among next-gen anti-virus vendors with zero false positives. FireEye was able to accomplish this result through a constant flow of innovations that originates with Fir...

Read More

What is Code Red Worm? WHAT IS CODE RED WORM?

blog article

Nov 14, 2018

Code red is a computer worm that was identified in July 2001, when computers running on Internet Information Services (IIS) web server of Microsoft were found compromised. The after effect of the attack caused a damage of billions of dollars in the summer of 2001. Marc Maiffret and Ryan Permeh emplo...

Read More

Thinking Global and Acting Local to Close the Skills Gap THINKING GLOBAL AND ACTING LOCAL TO CLOSE THE SKILLS GAP

blog article

Nov 14, 2018

Cybersecurity empowers organizations to enable trust, move faster, add value and grow. In order for cybersecurity to live up to that promise, it will require an increase in talent and new skills to take on the volume and sophistication of today’s threat landscape. According to industry analyst...

Read More

What is Polymorphic Virus and how do you deal with it? WHAT IS POLYMORPHIC VIRUS AND HOW DO YOU DEAL WITH IT?

blog article

Nov 13, 2018

Similar to the virus which affects the human body, a computer virus is a malicious program that affects the computer to choke or bring down the normal functioning. Usually, a computer virus self-replicates by copying itself to another program. Simply put, the computer virus spreads by itself into ot...

Read More

Six Design Considerations for Your Security Data Lake SIX DESIGN CONSIDERATIONS FOR YOUR SECURITY DATA LAKE

blog article

Nov 13, 2018

Large numbers of enterprises, such as retail conglomerates, consumer banks, airlines, and insurance companies are joining the rush to set up data lakes for handling petabytes of security data and logs. But many executives and architects assume that once they finish setting up log sources, applying p...

Read More

SAP Security Notes November ‘18: The Mobile Client Side Menace SAP SECURITY NOTES NOVEMBER ‘18: THE MOBILE CLIENT SIDE MENACE

blog article

Nov 13, 2018

Today SAP released 12 security notes for November’s SAP Security Patch Day as it is scheduled. This makes a total of 16 security notes after adding the four released since October’s patch day. Among these SAP security notes there are three that fix a number of vulnerabilities reported by...

Read More

Cybersecurity in the workplace CYBERSECURITY IN THE WORKPLACE

blog article

Nov 09, 2018

Cybercriminals, however, are more likely to view your employees as the path of least resistance into an organization. In North America, for example, two top causes of breaches are careless or uninformed employee actions and phishing or other social engineering. Cybercriminals know that, and they use...

Read More

What is the MyDoom Virus? WHAT IS THE MYDOOM VIRUS?

blog article

Nov 09, 2018

The MyDoom virus, also known as Novarg, is another worm capable of developing a backdoor in a victim computer’s operating system. The family of MyDoom e-mail worms continues to be an active threat because of unprotected personal computers and compromised computer systems even though the virus ...

Read More

How Can You Get More from Your AppSec Education Program? HOW CAN YOU GET MORE FROM YOUR APPSEC EDUCATION PROGRAM?

blog article

Nov 09, 2018

Forbes recently published an article titled “The Cybersecurity Talent Gap Is An Industry Crisis” – and without question, there’s a real lack of cybersecurity talent. Cybersecurity Ventures predicts about 3.5 million unfilled cybersecurity job openings by 2021! The need for cy...

Read More

7 Ways to Bridge the Cyber Security Skills Gap 7 WAYS TO BRIDGE THE CYBER SECURITY SKILLS GAP

blog article

Nov 09, 2018

Make security training compulsory and fun with a variety of on-demand media. To scale up cyber security, people who are not part of the security team also need to think and care about it.  This was a key takeaway for scalable cyber security from both the AppSec EU and Black Hat security confere...

Read More

5 Ways To Avoid a Phishing Attack 5 WAYS TO AVOID A PHISHING ATTACK

blog article

Nov 08, 2018

Before diving into the 5 ways to avoid a phishing attack, we want to make sure you understand what phishing means and the risk it presents. Phishing is simply a fraudulent method of obtaining sensitive data by disguising as a trustworthy entity in an email. These attacks usually consist of fake emai...

Read More

CYBERSECURITY AWARENESS: TAKE THE RIGHT APPROACH CYBERSECURITY AWARENESS: TAKE THE RIGHT APPROACH

blog article

Nov 07, 2018

There’s never been a more critical time for awareness training for cybersecurity. Attacks of all kinds are on the rise and the ubiquity of technology in the lives of end users can create opportunities for lapses in judgement, human error and avoidable mistakes. As an IT leader in your organiza...

Read More

What is Locky Ransomware? WHAT IS LOCKY RANSOMWARE?

blog article

Nov 05, 2018

Locky is one kind of latest ransomware. It was first released in 2016. The IT security geeks had discovered that the malware authors send ransomware infected emails demanding for payment through an invoice in the form of malicious Microsoft Word document that runs infectious macros. When the user op...

Read More

VISIBILITY AND ZERO TRUST: HOW TRUSTING NO ONE IS RESTORING FAITH IN CYBERSECURITY VISIBILITY AND ZERO TRUST: HOW TRUSTING NO ONE IS RESTORING FAITH IN CYBERSECURITY

blog article

Nov 05, 2018

For years, IT security architects trusted perimeter defenses to protect enterprise networks and data. The basic premise was simple: build a rock-solid perimeter to protect the trusted network. Once inside you have far-reaching access to a big flat network. In essence, it was like Jack Byrnes’ ...

Read More

Spoofing: RFID and SMS SPOOFING: RFID AND SMS

blog article

Nov 05, 2018

First, let's start with a definition - What is Spoofing? According to ForcePoint, "Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a com...

Read More

What is WannaCry Ransomware? WHAT IS WANNACRY RANSOMWARE?

blog article

Nov 03, 2018

The wannacry ransomware is composed of various components. Files with encryption keys. Application to encrypt data. Application to decrypt data. A copy of Tor Browser. Unlike other ransomware, wannacry has taken the internet world by storm as it created a very bad impact on almost all the business f...

Read More

What Is the Stuxnet Worm Computer Virus? WHAT IS THE STUXNET WORM COMPUTER VIRUS?

blog article

Nov 02, 2018

Stuxnet worm is a rootkit exploit. The Stuxnet worm is targeted at data acquisition (SCADA) systems and supervisory control. On the other side, it is vital to know that the SCADA systems are used for industrial control systems and this includes power, water, sewage plants etc. History of Stuxnet. In...

Read More

What is Zeus Malware? WHAT IS ZEUS MALWARE?

blog article

Nov 01, 2018

The Zeus malware, also known as the ZeuS or Zbot, is a Trojan Horse used to steal confidential information from the victims’ computers. The primary ways by which Zeus malware infects a computer are through phishing attacks and drive-by downloads. The Zeus Trojan was first detected when it stol...

Read More

5 Reasons Why U.S. Voting Systems Are Getting Harder to Hack 5 REASONS WHY U.S. VOTING SYSTEMS ARE GETTING HARDER TO HACK

blog article

Oct 31, 2018

Even as the Justice Department stays busy with those suspected of election meddling in the run-up to the midterms, there’s growing reason for optimism about the ability of the US electoral infrastructure to withstand attacks. While it’s still technically possible for a foreign state to a...

Read More

How to Protect Yourself From The Conficker Worm? HOW TO PROTECT YOURSELF FROM THE CONFICKER WORM?

blog article

Oct 30, 2018

A new worm called Conflicker is doing the rounds, attacking unnumbered Windows computers in the recent times. The spread of infection is going from bad to worse and is beyond control as per the reports from a security vendor. Detections of the Conflicker worm are by more than 225% since the end of 2...

Read More

SamSam: Targeted Ransomware Attacks Continue SAMSAM: TARGETED RANSOMWARE ATTACKS CONTINUE

blog article

Oct 30, 2018

Ransomware group remains highly active in 2018, focusing mainly on organizations in the U.S. The group behind the SamSam ransomware (Ransom.SamSam) has continued to mount attacks against entire organizations during 2018, with fresh attacks seen against 67 different targets, mostly located in the U.S...

Read More

Importance of SSL certificate for your company website IMPORTANCE OF SSL CERTIFICATE FOR YOUR COMPANY WEBSITE

blog article

Oct 29, 2018

Anyone who browses the Internet is probably aware of the term SSL. It’s often bandied around as a term which people vaguely understand to be something connected to keeping your browsing data safe. For a lot of people, SSL is denoted by two major recognizable features: 1) Website URLs starting ...

Read More

HELPING NCCOE EXPLORE NEW GLOBAL FRAMEWORKS FOR SECURING IOT DEVICES HELPING NCCOE EXPLORE NEW GLOBAL FRAMEWORKS FOR SECURING IOT DEVICES

blog article

Oct 29, 2018

By 2020 there will be 29 billion connected devices, according to ABI Research1, and a growing percentage will be Internet of Things (IoT) devices that are inherently more vulnerable to attacks than traditional computing equipment. The addition of billions of unsecure (and in many cases unsecurable) ...

Read More

What are boot sector viruses and how can I prevent them? WHAT ARE BOOT SECTOR VIRUSES AND HOW CAN I PREVENT THEM?

blog article

Oct 26, 2018

Computer Virus. Even before we try to understand what a boot sector virus is, let us understand what is a computer virus. In the online world, the term computer virus refers to a malicious program that auto-multiplies by copying itself to another program. Simply put, a computer virus spreads itself ...

Read More

How to Prevent Bots from Infecting Your System? HOW TO PREVENT BOTS FROM INFECTING YOUR SYSTEM?

blog article

Oct 25, 2018

What are Bots? Bots are Internet robots also known as crawlers, spiders, and web bots. They are automated programs developed for performing repetitive tasks. With the computing power available to programmers, bots have been developed to execute tasks at extremely high speeds, unbelievable for a real...

Read More

5 Common Visibility Gaps Your Enterprise Security Plan Can’t Afford 5 COMMON VISIBILITY GAPS YOUR ENTERPRISE SECURITY PLAN CAN’T AFFORD

blog article

Oct 25, 2018

Today’s cybersecurity challenges are unlike anything we’ve seen before. Your organization’s IT infrastructures now consist of the traditional network—employee laptops, desktops, various operating software, storage platforms and servers, cloud storage—plus an entirely ne...

Read More

Top 5 trends security teams should begin embracing to manage digital risk TOP 5 TRENDS SECURITY TEAMS SHOULD BEGIN EMBRACING TO MANAGE DIGITAL RISK

blog article

Oct 24, 2018

The digital world has opened up a plethora of opportunities for workplaces across the globe. Digital transformation means, among other things, seamless connectivity, the erasure of physical barriers and enterprises that can leverage the freedom of knowledge sharing without boundaries to enable great...

Read More

BehavioSec Fires Up Next-Gen Cybersecurity Solutions with Behavioral Biometrics BEHAVIOSEC FIRES UP NEXT-GEN CYBERSECURITY SOLUTIONS WITH BEHAVIORAL BIOMETRICS

blog article

Oct 24, 2018

There’s no silver bullet for online security, especially when it comes to user authentication. And enterprises aren’t alone in the struggle to keep up with the needs and demands of authentication. At the center of all of this lies user behavior and the challenge it presents to security. ...

Read More

Cybersecurity tips from the pros CYBERSECURITY TIPS FROM THE PROS

blog article

Oct 23, 2018

Managing customer identities goes well beyond providing great front-end registration, authentication and single sign-on experiences. Janrain clients also know that their customers’ identities are held securely - with Janrain’s Secure Edge restricting external bad actors and our internal ...

Read More

When Ransomware Stopped Working Harder and Started Working Smarter WHEN RANSOMWARE STOPPED WORKING HARDER AND STARTED WORKING SMARTER

blog article

Oct 23, 2018

Four years ago, we used to joke about the likelihood of Cryptolocker being delivered to every single email address on the internet. Back then, criminals would blast phishing emails to millions of email addresses, sending ransomware variants via infected links or Word Documents without any apparent r...

Read More

What is Pharming and How to Prevent These Attacks WHAT IS PHARMING AND HOW TO PREVENT THESE ATTACKS

blog article

Oct 18, 2018

The word Pharming is coined from the words “phishing” and “farming”. It refers to the cybercrime activities such as phishing, where a website’s traffic is hacked in order to steal the sensitive data. Basically, Pharming utilizes the sequence of letters that form an Inte...

Read More

So, You SO, YOU'VE EXPERIENCED A HIPAA BREACH—NOW WHAT?

blog article

Oct 17, 2018

It’s a day every CISO dreads. You think you’ve been doing everything right, but despite your best efforts, you’ve experienced a HIPAA breach, and now the OCR is coming in to perform an investigation. What should you do? First, take a deep breath. Relax. While what you do in the fol...

Read More

10 Tips to Take Control of Your Public Wi-Fi Security 10 TIPS TO TAKE CONTROL OF YOUR PUBLIC WI-FI SECURITY

blog article

Oct 17, 2018

The amazing ability to surf from anywhere sometimes distracts us from a very basic fact: the information may flow to us – but it can flow from us, in other, undesirable directions. So whether you are on your way to a vacation in a city that offers public Wi-Fi or you live in a city that is tou...

Read More

CIPHER Named to Top 100 MSSPs of 2018 list as the Top 15 Worldwide CIPHER NAMED TO TOP 100 MSSPS OF 2018 LIST AS THE TOP 15 WORLDWIDE

blog article

Oct 17, 2018

MSSP Alert, published by After Nines Inc, has named CIPHER Security to the Top 100 MSSPs list for 2018. The list and research identify and honor the top 100 managed security services providers (MSSPs) that specialize in comprehensive, outsourced cyber security services. The Top 100 MSSP rankings are...

Read More

The 5 most common reasons for implementing ISO 27001 THE 5 MOST COMMON REASONS FOR IMPLEMENTING ISO 27001

blog article

Oct 16, 2018

If you’re considering implementing ISO 27001, the international standard for information security, you’ve probably heard experts like us talk about the benefits. However, it’s always best to find out what organisations with first-hand experience think, which is why we created our I...

Read More

5 Cybersecurity Myths – and Facts 5 CYBERSECURITY MYTHS – AND FACTS

blog article

Oct 16, 2018

Let’s face it: Cybersecurity and identity theft aren’t things we like to think about. And according to recent research, many of us aren’t thinking about it at all. Many of us get an antivirus program, try to use strong passwords, and hope those efforts are enough. But are they? The...

Read More

Cloud Computing and the Shifting Role of Cyber Security CLOUD COMPUTING AND THE SHIFTING ROLE OF CYBER SECURITY

blog article

Oct 15, 2018

As cloud computing changes the government technology landscape, the conversations around security must change as well. It is safe to say that cloud computing and cyber security have been the dominant technology topics in the federal government for the past decade and continue to be today. Look no fu...

Read More

The Risks of Storing Your Passwords in Google Sheets THE RISKS OF STORING YOUR PASSWORDS IN GOOGLE SHEETS

blog article

Oct 12, 2018

Our team loves Google. We use it every day to search, email, store and share documents, and keep our lives (both work and personal) more organized. Honestly, how did we ever function without it? For someone who has no system in place to keep track of their passwords then Google Sheets is a great pla...

Read More

Cybersecurity Education Series: What Is Email Fraud? CYBERSECURITY EDUCATION SERIES: WHAT IS EMAIL FRAUD?

blog article

Oct 12, 2018

Since its inception, email has been a favorite target for cyber criminals hoping to steal sensitive data, user credentials, and company funds. In response, organizations have deployed a wide range of email security tools. But despite increased investment in defense, email fraud is still on the rise....

Read More

What is Crimeware? How to Protect Yourself from Crimeware? WHAT IS CRIMEWARE? HOW TO PROTECT YOURSELF FROM CRIMEWARE?

blog article

Oct 12, 2018

Crimeware is a set of programs or any computer program that has been designed to facilitate illegal activity online. Many spyware programs, keyloggers, and browser hijackers can be considered crimeware, although only those used illicitly. The phishing kit is one common type of crimeware that is a co...

Read More

A Career in Cybersecurity Has Many Positives, But It’s Not Without Challenges A CAREER IN CYBERSECURITY HAS MANY POSITIVES, BUT IT’S NOT WITHOUT CHALLENGES

blog article

Oct 12, 2018

There aren’t many fields where the majority say they’re happy with their profession. A satisfying career path—one where we feel successful—can be a long journey that most of us aren’t taught in school. In fact, 70 percent of workers say they don’t feel satisfied w...

Read More

What is website security? WHAT IS WEBSITE SECURITY?

blog article

Oct 11, 2018

You’ve launched your website and done all you can to ensure its success, but you may have overlooked a critical component: website security. Cyberattacks cause costly clean-up, damage your reputation, and discourage visitors from coming back. Fortunately, you can prevent it all with effective ...

Read More

A new era for customer data – could security be ‘the new green’ for businesses? A NEW ERA FOR CUSTOMER DATA – COULD SECURITY BE ‘THE NEW GREEN’ FOR BUSINESSES?

blog article

Oct 10, 2018

There was a tipping point not so long ago in the realm of environmental responsibility for businesses. For some time, curbing emissions and waste was simply something the corporate world did if it had to, in order to comply with governmental regulations and avoid a hefty fine. Now, driven by a few &...

Read More

Gallmaker: New Attack Group Eschews Malware to Live off the Land GALLMAKER: NEW ATTACK GROUP ESCHEWS MALWARE TO LIVE OFF THE LAND

blog article

Oct 10, 2018

This blog has been updated with a revised list of IoCs. An earlier list of IOCs attached to this blog was generated through an automated system and, due to the dual-use nature of the tools used by the group, erroneously included some low fidelity IoCs. Symantec researchers have uncovered a previousl...

Read More

Messaging, Malware, and Mobile Anti-Abuse Working Group (M3AAWG) Awards the Business Email Compromise List with the 2018 JD Falk Award MESSAGING, MALWARE, AND MOBILE ANTI-ABUSE WORKING GROUP (M3AAWG) AWARDS THE BUSINESS EMAIL COMPROMISE LIST WITH THE 2018 JD FALK AWARD

blog article

Oct 09, 2018

Business email compromise (BEC) /email fraud continues to be a serious pain point for organizations worldwide—and according to the FBI, it has resulted in $12.5B in losses. To help combat the issue, a private group of more than 530 organizations/individuals called the Business Email Compromise...

Read More

HHS Urges FDA to Do More on Medical Device Security HHS URGES FDA TO DO MORE ON MEDICAL DEVICE SECURITY

blog article

Oct 08, 2018

We’ve been writing for a few years now about the dangers of connected medical devices and how the U.S. F.D.A. has sought to increase the security of these devices. Previously, in St. Jude Takes Steps to Secure Vulnerable Medical Implants we covered the security surrounding St. Jude medical dev...

Read More

4 Cybersecurity Factors Every Board Member Must Consider for 2019 Planning 4 CYBERSECURITY FACTORS EVERY BOARD MEMBER MUST CONSIDER FOR 2019 PLANNING

blog article

Oct 05, 2018

Cybersecurity is a growing topic of discussion in Board meetings everywhere — given this fact, Board members need to be prepared to speak knowledgeably about their organization’s cybersecurity posture and programs. As businesses near the last quarter of the year and begin their planning ...

Read More

NIST Seeks Public Comment on Managing Internet of Things Cybersecurity and Privacy Risks NIST SEEKS PUBLIC COMMENT ON MANAGING INTERNET OF THINGS CYBERSECURITY AND PRIVACY RISKS

blog article

Oct 04, 2018

The U.S. Department of Commerce’s National Institute of Standards and Technology recently announced that it is seeking public comment on Draft NISTIR 8228, Considerations for Managing Internet of Things (“IoT”) Cybersecurity and Privacy Risks (the “Draft Report”). The d...

Read More

Cybersecurity Starts with Your Employees CYBERSECURITY STARTS WITH YOUR EMPLOYEES

blog article

Oct 04, 2018

We’re all familiar with Smokey the Bear and the “Only You Can Prevent Wildfires” slogan. In 2015, Smokey got an update and the new “Receive a Bear Hug” ads ran nationwide. In the ad, Smokey runs out of the woods and gives a big bearhug to a camper for properly checking ...

Read More

The Massive Data Breach Reducing Dwell Time and the Resulting Damage THE MASSIVE DATA BREACH REDUCING DWELL TIME AND THE RESULTING DAMAGE

blog article

Oct 04, 2018

This week we’ve seen what can happen when a major company like Facebook—or any organization for that matter—is faced with a massive data breach. They face possible loss of intellectual property and brand damage if they expose the privacy of their customers, partners, and workforce....

Read More

Emerging trend of spreading malware through IQY files EMERGING TREND OF SPREADING MALWARE THROUGH IQY FILES

blog article

Oct 03, 2018

Nowadays attackers are searching for new techniques to spread malware, recently we came across a new emerging way to deliver malware through IQY file. Till now we had seen spread of malware through various file types and chains such as Word document, Script, JAVA files. IQY file is an Excel Web Quer...

Read More

Facebook data breach: what you need to know FACEBOOK DATA BREACH: WHAT YOU NEED TO KNOW

blog article

Oct 03, 2018

On the afternoon of Friday, 28 September, Facebook announced that 50 million Facebook accounts had been breached. What happened? Facebook’s Vice President of Product Management, Guy Rosen, announced that the security breach affected 50 million users. It is believed the attackers exploited a vu...

Read More

4 Emerging Retail Cybersecurity Threats (and How to Stop Them) 4 EMERGING RETAIL CYBERSECURITY THREATS (AND HOW TO STOP THEM)

blog article

Oct 02, 2018

The retail industry has always been a favorite target of cyber criminals. We all remember major data breaches like those that affected Target, TJX, and Home Depot — but the truth is that cybersecurity threats have been a daily concern of retailers for a long time. Point of Sale (POS) system ha...

Read More

What is Browser Hijacking? How to Get Rid of This Virus? WHAT IS BROWSER HIJACKING? HOW TO GET RID OF THIS VIRUS?

blog article

Oct 01, 2018

In computing, a browser hijacking refers to the malicious intrusions made by a hijacker for personal gains. In order to accomplish this, the hijacker uses a malicious software which is placed on the internet browser that alters the activity of the browser. In all the cases, the user is typically una...

Read More

Incident Response Plan: 6 Essential Steps for Responding to a Security Incident INCIDENT RESPONSE PLAN: 6 ESSENTIAL STEPS FOR RESPONDING TO A SECURITY INCIDENT

blog article

Sep 29, 2018

During a cybersecurity incident, security teams will face many unknowns and a frenzy of activity. In such a hectic environment, they may fail to follow proper incident response procedures to effectively limit the damage. This is important because a security incident can be a high-pressure situation,...

Read More

Excerpts from: Using the ATT&CK™ Framework to Mature Your Threat Hunting Program EXCERPTS FROM: USING THE ATT&CK™ FRAMEWORK TO MATURE YOUR THREAT HUNTING PROGRAM

blog article

Sep 28, 2018

Every threat hunt starts with intelligence. As one of the industry’s most comprehensive knowledge bases for adversary behavior, ATT&CK provides a structure for hunters to build their hypotheses and search for threats.  Recently Carbon Black, Red Canary and MITRE teamed up for the webi...

Read More

Apache Struts, RCEs, and the Equifax Breach Anniversary APACHE STRUTS, RCES, AND THE EQUIFAX BREACH ANNIVERSARY

blog article

Sep 27, 2018

We just passed the one-year anniversary of Equifax’s announcement of their massive data breach due to an exploit of an Apache Struts vulnerability (CVE-2017-5638) – and incidentally, at nearly the same time that Apache announced another critical Apache Struts security flaw (). The latest...

Read More

What is Macro Virus and How to Prevent Them WHAT IS MACRO VIRUS AND HOW TO PREVENT THEM

blog article

Sep 27, 2018

What is Macro Virus. A virus that adds its code to the macros associated with spreadsheets, documents, and other data files in a system is called as a macro virus. Any computer infected by macro virus needs an antivirus program to remove it from all its hiding places. A macro virus is designed to ca...

Read More

Quantifying Cybersecurity Risk: A Beginners Guide QUANTIFYING CYBERSECURITY RISK: A BEGINNERS GUIDE

blog article

Sep 27, 2018

For those who have been paying attention, this dramatic upward trend is hardly surprising. Data breaches are getting bigger, more damaging, and more expensive. It’s challenging to read the news without seeing a story about one massive cyber attack or another. In many industries, the fear of cy...

Read More

5 Key Cybersecurity Trends – What I Learned at Exabeam Spotlight 2018 5 KEY CYBERSECURITY TRENDS – WHAT I LEARNED AT EXABEAM SPOTLIGHT 2018

blog article

Sep 26, 2018

Many attendees were quick to say that their organization’s data is increasingly in the cloud. While most talked about their hybrid data center strategy, the emphasis was on moving more IT resources to infrastructure-as-a-service (IaaS) providers like AWS and Azure, as well as deploying softwar...

Read More

Adwind Trojan: How to Stay Safe from Malware ADWIND TROJAN: HOW TO STAY SAFE FROM MALWARE

blog article

Sep 26, 2018

The Adwind Trojan virus, a Remote Access Trojan (RAT), has been noticed to use antivirus software and spreadsheets programs like Excel in order to infect your computer. The virus is back with new tricks trying to bypass your antivirus software in order to infect your computer with dangerous malware....

Read More

The World’s Most Popular Coding Language Happens to be Most Hackers’ Weapon of Choice THE WORLD’S MOST POPULAR CODING LANGUAGE HAPPENS TO BE MOST HACKERS’ WEAPON OF CHOICE

blog article

Sep 26, 2018

Python will soon be the world’s most prevalent coding language. That’s quite a statement, but if you look at its simplicity, flexibility and the relative ease with which folks pick it up, it’s not hard to see why The Economist recently touted it as the soon-to-be most used language...

Read More

Excerpts From “Why Companies Are Replacing AV with Advanced Endpoint Security” EXCERPTS FROM “WHY COMPANIES ARE REPLACING AV WITH ADVANCED ENDPOINT SECURITY”

blog article

Sep 26, 2018

Is legacy antivirus failing to keep your endpoints secure? In Carbon Black’s recent webinar, Fulcanelli Chavez, Sr. Security Operations Analyst at D.A. Davidson, shared how switching from McAfee to Cb Defense has improved protection and simplified operations for his team. Below are excerpts fr...

Read More

What is Trojan Virus? How they work and methods to be protected? WHAT IS TROJAN VIRUS? HOW THEY WORK AND METHODS TO BE PROTECTED?

blog article

Sep 25, 2018

Trojans or Trojan Horses is often mimicked as genuine software by malware authors to gain access to the target victim’s system. Most often the users are tricked by means of social engineering that loads and executes the trojans in the background without the users ‘knowledge. Then the ins...

Read More

The Need of Linux Antivirus THE NEED OF LINUX ANTIVIRUS

blog article

Sep 24, 2018

In the IT world, it is generally assumed that Linux is more secure compared to other operating systems. In the recent times, it is noticed that the targeted attacks on Linux based machines are on the rise. No wonder, the Linux platform is now widely used on internal file servers and web servers. Bes...

Read More

How to Protect Your Paycheck: FBI Issues Credential Phishing Alert as Attackers Target Direct Deposits HOW TO PROTECT YOUR PAYCHECK: FBI ISSUES CREDENTIAL PHISHING ALERT AS ATTACKERS TARGET DIRECT DEPOSITS

blog article

Sep 24, 2018

Last week the FBI issued an alert warning organization that cybercriminals are actively using phishing emails to steal consumer log-in credentials for their online payroll accounts. At Proofpoint, we’ve seen this type of attack for a few years now, and unfortunately, all it takes is one creden...

Read More

Know How To Prevent Identity Theft KNOW HOW TO PREVENT IDENTITY THEFT

blog article

Sep 21, 2018

Today the increasing number of cyber attacks are targeted on individuals and small size businesses. The attacks are aimed at robbing an individual’s identity which is referred to as the identity theft. Thus, a stolen information, such as driving license detail or social security number or othe...

Read More

How to Stop Cyberattacks on Your IoT Infrastructure HOW TO STOP CYBERATTACKS ON YOUR IOT INFRASTRUCTURE

blog article

Sep 21, 2018

In part one of our internet of things (IoT) blog series, we provided background on the tremendous growth of IoT and their innovative use cases—from alarm systems, to power grid monitoring, to devices that are combating honeybee colony collapse disorder. We also looked at the 600% increase in I...

Read More

How Do I Know If My Android Phone/Device Has Virus? HOW DO I KNOW IF MY ANDROID PHONE/DEVICE HAS VIRUS?

blog article

Sep 20, 2018

Cybercrime is at an all-time high. Criminals are not only targeting home users; they are also preying on businesses jeopardizing their websites and acquiring sensitive clientele information. How to know if your Android phone/device has a virus? Are you a potential victim of an online scam? How to pr...

Read More

Security Leadership Series: An Important Principle for Every Cybersecurity Leader to Remember SECURITY LEADERSHIP SERIES: AN IMPORTANT PRINCIPLE FOR EVERY CYBERSECURITY LEADER TO REMEMBER

blog article

Sep 20, 2018

Here’s a principle every cybersecurity leader needs to acknowledge: Cybersecurity is not the single most important element of your company’s business. In reality, most businesses exist to make money or return some form of value to their stakeholders (unless you’re a nonprofit, in w...

Read More

Microsoft Windows Server 2016 Security MICROSOFT WINDOWS SERVER 2016 SECURITY

blog article

Sep 20, 2018

You may have been following our series of blog posts on Microsoft Windows Server security features and capabilities for reducing risk in your IT infrastructure. Today, we’ve compiled a list of all these blog posts. You can use them in two ways as you work to secure your Windows Server operatin...

Read More

Increased Use of a Delphi Packer to Evade Malware Classification INCREASED USE OF A DELPHI PACKER TO EVADE MALWARE CLASSIFICATION

blog article

Sep 20, 2018

The concept of "packing" or "crypting" a malicious program is widely popular among threat actors looking to bypass or defeat analysis by static and dynamic analysis tools. Evasion of classification and detection is an arms race in which new techniques are traded and used in the w...

Read More

Does Windows 10 Need Antivirus? DOES WINDOWS 10 NEED ANTIVIRUS?

blog article

Sep 19, 2018

In today’s digital world, malware and cyber attacks have become ubiquitous. Gone are the days when there was only a handful of malicious programs such as viruses. Nowadays, new and powerful malware variants such as the ransomware, spyware, keyloggers, and various new forms of malware have beco...

Read More

New Zero-Day Vulnerability Attack in Windows NEW ZERO-DAY VULNERABILITY ATTACK IN WINDOWS

blog article

Sep 18, 2018

A zero-day also known as Day Zero or 0-day refers to the computing vulnerability which is often sought by the hackers to exploit for selfish and illegal reasons. Zero Day Vulnerability Attacks are becoming more and more common these days. Recently, another one was discovered in Windows and it was im...

Read More

Data Security: When did you last check your printers? DATA SECURITY: WHEN DID YOU LAST CHECK YOUR PRINTERS?

blog article

Sep 14, 2018

Most enterprises have suffered at least one data breach through their printers. Meanwhile, researchers have recently highlighted the fact that many 3D printers are routinely being exposed online without any adequate access controls. Here’s the problem: too many of us overlook printers as dumb ...

Read More

Guide To Survival The Data Breach GUIDE TO SURVIVAL THE DATA BREACH

blog article

Sep 13, 2018

Many of us might have fallen a prey to cyber criminals at least once in the last few years and suffered a bit due to data breach issues. In all cases, a cybercriminal uses malware to infiltrate the systems to cull out the required data, but if an antivirus software is installed then it can prevent s...

Read More

Battling Cyber Threats Using Next-Gen SIEM and Threat Intelligence BATTLING CYBER THREATS USING NEXT-GEN SIEM AND THREAT INTELLIGENCE

blog article

Sep 12, 2018

While SIEMs are central for SOC cybersecurity—collecting logs and data from multiple network sources for evaluation, analysis, and correlation of network events for threat detection—SIEMs are often not enough. With the growing sophistication of organized, modern cyber attackers and their...

Read More

How The ATT&CK™ Framework Can Mature Your Threat Hunting Program HOW THE ATT&CK™ FRAMEWORK CAN MATURE YOUR THREAT HUNTING PROGRAM

blog article

Sep 11, 2018

The truth about threat hunting is that it’s a process that matures with your security team.  The more you learn more about the threat landscape, the more you can operationalize that knowledge.  Because of this, it is important to work within a framework that can help you track the gr...

Read More

Getting Better Together in Cybersecurity GETTING BETTER TOGETHER IN CYBERSECURITY

blog article

Sep 06, 2018

“Determining Evil from Benign in the Normally Abnormal World of InfoSec” We cannot control our adversary. Although we can choose to control them once in our environment. We have little to no control over when the “big attack” happens. For too long I think we have focused so h...

Read More

Cybersecurity, Information Security, Network Security, Information Assurance: What’s the Difference? CYBERSECURITY, INFORMATION SECURITY, NETWORK SECURITY, INFORMATION ASSURANCE: WHAT’S THE DIFFERENCE?

blog article

Sep 06, 2018

As hackers, security breaches and malware attacks continue to dominate headlines, cyber crime has emerged as a global “pandemic” that last year cost people and organizations an estimated $600 billion, according to CNBC. So it’s not surprising that combating such activities has beco...

Read More

Fallout Exploit Kit Used in Malvertising Campaign to Deliver GandCrab Ransomware FALLOUT EXPLOIT KIT USED IN MALVERTISING CAMPAIGN TO DELIVER GANDCRAB RANSOMWARE

blog article

Sep 06, 2018

Towards the end of August 2018, FireEye identified a new exploit kit (EK) that was being served up as part of a malvertising campaign affecting users in Japan, Korea, the Middle East, Southern Europe, and other countries in the Asia Pacific region. The first instance of the campaign was observed on ...

Read More

US users worry about identity theft, data leaks but still click on malicious links, use weak passwords, Bitdefender finds US USERS WORRY ABOUT IDENTITY THEFT, DATA LEAKS BUT STILL CLICK ON MALICIOUS LINKS, USE WEAK PASSWORDS, BITDEFENDER FINDS

blog article

Sep 05, 2018

By now, we have all acknowledged the benefits the Internet of Things has to offer not only to the daily lives of consumers, but also to city infrastructures, governments and enterprises. But how security-aware are consumers? According to a Bitdefender survey, the average US home has about 11 smart d...

Read More

New CLEAR Solution: Automation from Email Reporting through Remediation NEW CLEAR SOLUTION: AUTOMATION FROM EMAIL REPORTING THROUGH REMEDIATION

blog article

Sep 04, 2018

We’re excited to announce, thanks to Proofpoint’s recent acquisition of Wombat, the availability of the Closed-Loop Email Analysis and Response (CLEAR) solution, our industry’s first complete closed-loop approach to instant end-user email reporting, analysis, and remediation. This ...

Read More

37% of IT Managers See Failure to Install Updates as the Biggest Security Threat of 2018 37% OF IT MANAGERS SEE FAILURE TO INSTALL UPDATES AS THE BIGGEST SECURITY THREAT OF 2018

blog article

Aug 31, 2018

Outdated software is now a bigger threat than weak passwords, bring-your-own-device (BYOD) and unsecured USB sticks, according to a new study. 27% of enterprises spend, on average, at least a month before installing vital security patches, data shows. Among businesses with over 100,000 computer term...

Read More

Do You Know How Computer Virus Spreads? DO YOU KNOW HOW COMPUTER VIRUS SPREADS?

blog article

Aug 31, 2018

More and more people are falling a prey to the cyber attacks and losing the valuable data to an unrecognizable online fraudster is becoming one of the biggest nightmares. Say for example, the important analysis report that you prepared the previous night for your company’s new project is all g...

Read More

Cyber Espionage and the US Elections: What are Russian Hackers Possibly Doing and How Can They be Stopped? CYBER ESPIONAGE AND THE US ELECTIONS: WHAT ARE RUSSIAN HACKERS POSSIBLY DOING AND HOW CAN THEY BE STOPPED?

blog article

Aug 31, 2018

Russian meddling in the 2016 US elections and the Hillary Clinton campaign email breach came as a surprise to many (with investigations underway as to who knew what and who was involved). While the New York Times reported the Obama White House had warned the Russians about “malicious cyber act...

Read More

AI and Cybersecurity: combining data with human expertise AI AND CYBERSECURITY: COMBINING DATA WITH HUMAN EXPERTISE

blog article

Aug 30, 2018

Artificial intelligence continues to proliferate and influence our lives. Speech recognition and image recognition rely on AI. The financial sector is moving to AI-based insurance risk analysis, credit scores and loan eligibility. We’re also seeing the emergence of AI-based robot lawyers and A...

Read More

4 Reasons Why All Businesses Need a Password Manager 4 REASONS WHY ALL BUSINESSES NEED A PASSWORD MANAGER

blog article

Aug 30, 2018

Today, doing business means having dozens of online accounts and dozens (or even hundreds) of passwords. Technology helps us run our businesses more effectively, but it can also make us more vulnerable to data breaches and cyber attacks. Jungle Disk’s suite of cybersecurity products and servic...

Read More

Is Your Small Business at Risk of a Cyber Attack? IS YOUR SMALL BUSINESS AT RISK OF A CYBER ATTACK?

blog article

Aug 29, 2018

After reading an article in Dark Reading, I was shocked to find out that over fifty percent of small to medium sized businesses (SMB) do not think they are at risk of cyber attacks. On top of that, I found it interesting that seventy-six percent of SMBs were not using multi-factor authentication eit...

Read More

An Introduction to AWS Cloud Security AN INTRODUCTION TO AWS CLOUD SECURITY

blog article

Aug 28, 2018

AWS is an indispensable part of business strategy for companies worldwide that make use of its infrastructure, platform, and software services. For example, giant pharmaceuticals slice into the time it takes to complete clinical trials on billion-dollar drugs by spinning up instance after instance o...

Read More

Be aware Hiddad Malware present on Google Play Store BE AWARE HIDDAD MALWARE PRESENT ON GOOGLE PLAY STORE

blog article

Aug 27, 2018

Quick Heal Security Lab has spotted a couple of applications on play store which hide themselves after installation and display full screen ads after specific time interval. This trend is used by most of the developers these days to earn profit by displaying ads. Even if users want to uninstall thes...

Read More

Four Fundamentals in Building a Security Stack FOUR FUNDAMENTALS IN BUILDING A SECURITY STACK

blog article

Aug 27, 2018

Cybersecurity is an enormous investment with even more enormous consequences for mistakes. To build an optimal security stack you need to balance residual risks with total cost of ownership of the cyber security stack and with minimal disruption to operations. Unfortunately , we have reached an impa...

Read More

Foreshadow Attacks on Intel Chips is Causing Serious Vulnerabilities FORESHADOW ATTACKS ON INTEL CHIPS IS CAUSING SERIOUS VULNERABILITIES

blog article

Aug 25, 2018

Intel’s Software Guard Extensions (SGX) feature allows programs to establish secure enclaves on Intel processors. The secure enclave develops a safe haven for sensitive information, even if malware or another malady compromises the main computer. A global research group comprising of researche...

Read More

New Wi-Fi attack can crack your passwords NEW WI-FI ATTACK CAN CRACK YOUR PASSWORDS

blog article

Aug 24, 2018

Did you know that there exists a simple way to crack passwords from routers with WPA2 security? Fortunately, this hidden truth was uncovered by the white hat hackers recently! Everybody is using Wi-Fi network these days, and the usual protocols to count on are WPA or WPA2. In simple words, the Wi-Fi...

Read More

10 Best Practices for Creating an Effective Computer Security Incident Response Team (CSIRT) 10 BEST PRACTICES FOR CREATING AN EFFECTIVE COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT)

blog article

Aug 24, 2018

In many organizations, a computer security incident response team (CSIRT) has become essential to deal with the growing number and increasing sophistication of cyber threats. Unlike a security operations center (SOC) —a dedicated group with the tools to defend networks, servers, and other IT i...

Read More

Guide to Securing Your Mobile App against Cyber Attacks GUIDE TO SECURING YOUR MOBILE APP AGAINST CYBER ATTACKS

blog article

Aug 23, 2018

Thanks to the advent of technology, the number of mobile phone users are increasing day by day. You’ll be shocked to hear that by 2019, this number will cross the 5 billion mark! While mobile phones may have made our life easier, they have also opened up domains for many cybercriminals who are...

Read More

Unencrypted laptop exposes personal details of 37,000 Eir customers, faulty security update blamed UNENCRYPTED LAPTOP EXPOSES PERSONAL DETAILS OF 37,000 EIR CUSTOMERS, FAULTY SECURITY UPDATE BLAMED

blog article

Aug 23, 2018

It’s not great when any organisation loses a laptop, but if the contents of the computer’s hard drive have been fully encrypted and a strong password has been used it’s hardly the end of the world. After all, the chances of a criminal being able to access any sensitive information ...

Read More

What is Ransomware? WHAT IS RANSOMWARE?

blog article

Aug 22, 2018

Ransomware is a malicious software which is also known as ransom-malware that threatens to delete or deny access to data, once it takes control over a computing device. The cybercriminal who initiated the attack commands ransom to be paid through cryptocurrency or credit card in order to recover the...

Read More

Three of the Latest Email Security Threats Facing Your Organization THREE OF THE LATEST EMAIL SECURITY THREATS FACING YOUR ORGANIZATION

blog article

Aug 22, 2018

Email is a top vector for cybercriminals to breach your organization. In fact, email-borne attacks are responsible for more than 93% of breaches, according to Verizon's Data Breach Investigation Report. Before you can properly defend against such threats you need to understand their nature. Here...

Read More

Email Fraud Continues to Rise as the Number of Attacks Grew 36% in Q2 EMAIL FRAUD CONTINUES TO RISE AS THE NUMBER OF ATTACKS GREW 36% IN Q2

blog article

Aug 21, 2018

Email fraud continues to make headlines within the cybersecurity space and continuously reaches unprecedented levels of impact on organizations of all sizes and in all locations. In fact, the FBI recently released a new report indicating that business email compromise (BEC) and email account comprom...

Read More

What You Need to Know About Ransomware WHAT YOU NEED TO KNOW ABOUT RANSOMWARE

blog article

Aug 21, 2018

2017 was dominated by major ransomware attacks, a relatively new cyber threat which holds data captive until a ransom is paid. Last year’s WannaCry attack famously impacted more than 200,000 computers across the globe, with victims spanning across various industries. Just this past week, the c...

Read More

What is Adware and How to Get Rid of it WHAT IS ADWARE AND HOW TO GET RID OF IT

blog article

Aug 20, 2018

Adware is any software application that shows unwanted ads while a program is running. Most adware arrives embedded inside a free software supported by advertisements that show up in pop-up windows or on a toolbar on a computer or browser. Some of them are safe yet annoying. The dark ones focus on s...

Read More

What is Melissa Virus? How to Stay Protected from them WHAT IS MELISSA VIRUS? HOW TO STAY PROTECTED FROM THEM

blog article

Aug 19, 2018

Melissa is a macro virus that was wide-spread through a suspicious e-mail attachment in 1999. It was initially sent as a Microsoft Word file, which when clicked to open, emailed the malicious content to another 50 contacts of the victim’s address book. It does not infect any of the files or an...

Read More

Tips to Avoid Phishing Attacks TIPS TO AVOID PHISHING ATTACKS

blog article

Aug 17, 2018

In an organization, Employees play a vital role in information security. Thus it is critical for organizations to educate employees about safe computing habits in addition to having the right security tools (such as antivirus software or virus protection software) in place. Employees hold the necess...

Read More

Android malware that combines a Banking Trojan, Keylogger, and Ransomware in one package ANDROID MALWARE THAT COMBINES A BANKING TROJAN, KEYLOGGER, AND RANSOMWARE IN ONE PACKAGE

blog article

Aug 17, 2018

This malware has all basic functionalities of the Android banker along with additional features like call forwarding, sound recording, keylogging and ransomware activities. It has the ability to launch user’s browser with URL received from the C&C server. It repeatedly opens the accessibil...

Read More

Password Security : The Good, the Bad, and the “Never Should Have Happened” PASSWORD SECURITY : THE GOOD, THE BAD, AND THE “NEVER SHOULD HAVE HAPPENED”

blog article

Aug 16, 2018

While most organizations have a password policy that sounds technically secure, hardly any have a policy that benefits the organization, encourages strong passwords, and improves overall security. It’s time to stop requiring capital letters, numbers, special characters, and frequent password u...

Read More

Computer Hacking – What are they and how to stay protected? COMPUTER HACKING – WHAT ARE THEY AND HOW TO STAY PROTECTED?

blog article

Aug 16, 2018

Individuals using a computer connected to the Internet are susceptible to the threats that online predators and computer hackers pose. These computer hacking experts generally use phishing scams, instant messages or spam email and bogus websites in order to deliver dangerous malware to your computer...

Read More

Q1 2018 DDOS TRENDS REPORT: 58 PERCENT OF ATTACKS EMPLOYED MULTIPLE ATTACK TYPES Q1 2018 DDOS TRENDS REPORT: 58 PERCENT OF ATTACKS EMPLOYED MULTIPLE ATTACK TYPES

blog article

Aug 16, 2018

Verisign just released its Q1 2018 DDoS Trends Report, which represents a unique view into the attack trends unfolding online, through observations and insights derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of Verisign DDoS Protection Services, and security r...

Read More

Using Modern Threat Hunting for a More Effective Investigation of Cyber Threats USING MODERN THREAT HUNTING FOR A MORE EFFECTIVE INVESTIGATION OF CYBER THREATS

blog article

Aug 16, 2018

Until recently, most security operations centers (SOC) were dependent on their analysts’ skill level and relied on manual steps to detect the cyber threats to their organization. This typically required examining known indicators of compromise (IOC)—one painful threat at a time. When a s...

Read More

Global Cyber Security spending to top $114bn in 2018, says Gartner GLOBAL CYBER SECURITY SPENDING TO TOP $114BN IN 2018, SAYS GARTNER

blog article

Aug 16, 2018

The need for improved detection, response and privacy is driving the demand for security products and services in response to security risks, business needs and industry changes, Gartner reveals. Gartner forecasts that worldwide spending on information security products and services will exceed $114...

Read More

The Key to EDR You Didn’t Know You Were Missing THE KEY TO EDR YOU DIDN’T KNOW YOU WERE MISSING

blog article

Aug 15, 2018

It’s no longer enough for companies to simply “keep up” in the world of cybersecurity. To prevent attackers from infiltrating your systems, you need to be one step ahead at all times. It’s no wonder, then, that the majority of companies are spending more on cybersecurity than...

Read More

Best Security Solution for Small Business BEST SECURITY SOLUTION FOR SMALL BUSINESS

blog article

Aug 14, 2018

Gain deeper insights into world-class network security for small enterprises/businesses like yours, the information technology protection for small businesses has become more complex with loads of online threats appearing daily! Similar to the giants in the space, the small ones too suffer from grav...

Read More

What does cyber insurance cover and is it worth the investment? WHAT DOES CYBER INSURANCE COVER AND IS IT WORTH THE INVESTMENT?

blog article

Aug 14, 2018

Sales of cyber insurance policies are increasing and have been steadily doing so over the past few years. There are now numerous specialist cyber insurance policies designed to cover the various aspects of a cyber-attack or incident, but are they worth it? This blog will explore the pros and cons of...

Read More

What is the ILOVEYOU Virus? How it Infects and Methods to Remove them WHAT IS THE ILOVEYOU VIRUS? HOW IT INFECTS AND METHODS TO REMOVE THEM

blog article

Aug 13, 2018

In the third month of the year 1999, the Melissa virus was circulated in the online space as an e-mail attachment. This fast-spreading macro virus when opened disabled a number of security features in Word 97 or Word 2000. In the case of users who had the MS Outlook e-mail program, aided the virus t...

Read More

SharpShooter Pen Testing Framework Used by Attackers SHARPSHOOTER PEN TESTING FRAMEWORK USED BY ATTACKERS

blog article

Aug 12, 2018

Fileless malware is a type of a malicious code execution technique that operates completely within process memory; no files are dropped onto the disk. Without any artifacts on the hard drive to detect, these attacks easily evade most security solutions. In this post, we take a look at SharpShooter, ...

Read More

What Now? How to Execute the Cybersecurity Plan You Have in Place WHAT NOW? HOW TO EXECUTE THE CYBERSECURITY PLAN YOU HAVE IN PLACE

blog article

Aug 09, 2018

CISOs and other security leaders are tasked with protecting their organizations from cyber attacks. That means developing and implementing the policies, controls, and procedures that reduce risk and ensure the safety of sensitive data. It also means keeping the cybersecurity program alive and well-f...

Read More

How to Check if an Android App is Safe to Install HOW TO CHECK IF AN ANDROID APP IS SAFE TO INSTALL

blog article

Aug 09, 2018

If you are an Android user, you might have come across or heard of Android malware. Nowadays, the media is also full of reports about Android malware infecting unwary Android users. Does this mean you should install an antivirus on your smartphone? Which is the best antivirus or malware removal tool...

Read More

At $17 million, Atlanta network recovery six times more expensive than estimated AT $17 MILLION, ATLANTA NETWORK RECOVERY SIX TIMES MORE EXPENSIVE THAN ESTIMATED

blog article

Aug 08, 2018

The SamSam ransomware attack on the city of Atlanta in March is probably one of the most expensive security incidents, with the recovery cost adding up to some $17 million of taxpayers’ money, according to a seven-page “confidential and privileged” report accessed by The Atlanta Co...

Read More

Why Personal Webmail and Browsing Is a Big Risk for Your Corporate Network WHY PERSONAL WEBMAIL AND BROWSING IS A BIG RISK FOR YOUR CORPORATE NETWORK

blog article

Aug 08, 2018

For many organizations, corporate email is their number one threat vector, as they continue to deal with a seemingly never-ending stream of targeted malicious attachments and URLs. Email is so well suited to attacks that personal webmail, and personal browsing more generally, is now joining corporat...

Read More

Know about the top 10 Android Hacking apps KNOW ABOUT THE TOP 10 ANDROID HACKING APPS

blog article

Aug 06, 2018

Android smartphones are now the most sought-after mobile phones due to its versatility, affordability, and user-friendliness. With the rise in the number of users hackers find them a rich source of a target and install Android hacking apps on both non-rooted and rooted devices as well. In this artic...

Read More

Tanium Versus Tachyon: The Big Beasts of the Endpoint Detection and Remediation Jungle go Head-To-Head TANIUM VERSUS TACHYON: THE BIG BEASTS OF THE ENDPOINT DETECTION AND REMEDIATION JUNGLE GO HEAD-TO-HEAD

blog article

Aug 06, 2018

Prevention trumping cure is a such a well-polished truism it can be slightly jarring to learn that the emphasis has lately been undergoing a reversal in the realm of cybersecurity – with “cure” (or, “remediation”) taking growing precedence. Whereas previously organizati...

Read More

Emotet banking malware attacks government and public sectors EMOTET BANKING MALWARE ATTACKS GOVERNMENT AND PUBLIC SECTORS

blog article

Aug 05, 2018

Emotet is a new banking trojan. It is a downloader that functions to download other trojans into the system or a network. It is the most expensive and destructive malware affecting state, tribal, local, and territorial governments, and even creating impact against the public and private sectors. The...

Read More

11 Best Internet Safety Tips for Everyday Online Users 11 BEST INTERNET SAFETY TIPS FOR EVERYDAY ONLINE USERS

blog article

Aug 04, 2018

The online transactions have seen a surge in the recent years. More and more businesses have tried to get benefited by going online to sell their products and services. But this has also opened the door to online fraudsters who regularly look for unprotected websites to make their intrusion attempts...

Read More

BGP/DNS Hijacks Target Payment Systems BGP/DNS HIJACKS TARGET PAYMENT SYSTEMS

blog article

Aug 03, 2018

In April 2018, we detailed a brazen BGP hijack of Amazon’s authoritative DNS service in order to redirect users of a crypto currency wallet service to a fraudulent website ready to steal their money. In the past month, we have observed additional BGP hijacks of authoritative DNS servers with a...

Read More

A Look at Scan4You and the Counter Antivirus Service Landscape A LOOK AT SCAN4YOU AND THE COUNTER ANTIVIRUS SERVICE LANDSCAPE

blog article

Aug 02, 2018

The concept of antivirus (AV) scanning within IT security is simple and effective. These programs, which have become part and parcel of typical infrastructure and data protection strategies, scan enterprise networks for known malware signatures and other processes associated with suspicious hacker a...

Read More

Using Deep Learning to Reduce the Security Risks of Unmanaged Devices USING DEEP LEARNING TO REDUCE THE SECURITY RISKS OF UNMANAGED DEVICES

blog article

Aug 02, 2018

Whether it’s an employee’s cell phone, a contractor’s iPad, or a virtual machine (VM) created by a compromised account for malicious purposes, any unmanaged device on your network should be considered a security risk. Whether legitimate, or unauthorized, or rogue, such unmanaged de...

Read More

5 Tips for Ultimate Online Security and Privacy 5 TIPS FOR ULTIMATE ONLINE SECURITY AND PRIVACY

blog article

Aug 01, 2018

Unless you are living under a rock, you would have undoubtedly heard a lot about malware and cyber-attacks that plague the internet users across the globe. Here are some of the best practices to prevent malware/cyber-attacks and secure your online privacy. Also, we will discuss the importance of ant...

Read More

Spam Remains the Criminals SPAM REMAINS THE CRIMINALS' FAVORITE ONLINE TOOL

blog article

Aug 01, 2018

Spam is forty years old, and it's still the enduring favorite of cyber criminals. What's reckoned to have been the first spam was distributed in 1978 over ARPANET. ARPANET would evolve into what we now recognize as the Internet. That email was a relatively benign marketing message, but spam ...

Read More

To Reward, or Not to Reward TO REWARD, OR NOT TO REWARD

blog article

Aug 01, 2018

In late 2014, in the aftermath of the Sony Pictures Entertainment breach, I had advocated the development of a cyber breach reporting portal where individuals could report suspected cyber incidents. Such a system, I argued, would work as an early warning system so IT could be made aware of an attack...

Read More

Trojan Virus- Their Types and Methods to Remove Them TROJAN VIRUS- THEIR TYPES AND METHODS TO REMOVE THEM

blog article

Jul 31, 2018

A Trojan horse is a particular type of malware that is mostly disguised as authorized software. Trojans can be used by hackers and cyber-thieves trying to gain access to a user’s system. This takes place by tricking users with some form of social engineering into loading and then executing Tro...

Read More

Which Cybersecurity Tasks Should I Prioritize First? Tips from the Experts WHICH CYBERSECURITY TASKS SHOULD I PRIORITIZE FIRST? TIPS FROM THE EXPERTS

blog article

Jul 30, 2018

Cybersecurity is a multifaceted topic with many constantly evolving variables. For CISOs and other security leaders, just knowing where to begin can be a challenge. Let’s say you’ve just taken over an organization’s cybersecurity program, or have been tasked with building one from ...

Read More

Types of Computer Virus and How to Remove Them? TYPES OF COMPUTER VIRUS AND HOW TO REMOVE THEM?

blog article

Jul 28, 2018

Computer viruses come in many forms, it is important to know what you are dealing with. However, even before we get started with knowing the types of viruses, it is ideal to comprehend the computer virus definition. Types of Computer Virus. Boot Sector Virus. Web Scripting Virus. Browser Hijacker. R...

Read More

Malware vs Viruses: What’s the Difference? MALWARE VS VIRUSES: WHAT’S THE DIFFERENCE?

blog article

Jul 27, 2018

Understanding the difference between malware and viruses is very important. A virus is just one type of malware, but the term is more widely used by the public. The term malware refers to any malicious software, including a computer virus. For example, between 2000 and 2005, spyware and adware emerg...

Read More

Which specific malware trends should American businesses be prepared for? WHICH SPECIFIC MALWARE TRENDS SHOULD AMERICAN BUSINESSES BE PREPARED FOR?

blog article

Jul 27, 2018

In 2017, more than 700 million malware specimens were discovered. In this type of environment, it can be a considerable challenge for enterprises to keep up with the ever-changing threat landscape and ensure their internal protections are sufficient for safeguarding their most critical IT assets and...

Read More

Our Extensive Survey on IoT Cybersecurity Has Remarkable Top Consequence OUR EXTENSIVE SURVEY ON IOT CYBERSECURITY HAS REMARKABLE TOP CONSEQUENCE

blog article

Jul 26, 2018

Trend Micro recently conducted a global survey of IT and security decision makers. When asked about the top consequence to IoT security, many would have expected it to be data loss. However, the top consequence named with 52% of respondents was “Loss of Customer Trust.” IoT has a physica...

Read More

How to Get Rid of Malware? HOW TO GET RID OF MALWARE?

blog article

Jul 26, 2018

Malware: Meaning. Malware refers to a program or code designed to execute something harmful to your computer or your private information. When compared to the old viruses that would just shut your system down, malware tries its very best to go unnoticed as long as possible by smartly hiding througho...

Read More

Partner Perspectives: The Target Strikes Back – Predicting the Persistent Attacker PARTNER PERSPECTIVES: THE TARGET STRIKES BACK – PREDICTING THE PERSISTENT ATTACKER

blog article

Jul 26, 2018

Predicting cyber-attacks has long been an elusive goal in the cyber-security industry. Methods such as Lockheed Martin’s Cyber Kill Chain evangelized the idea that staying one step ahead of your adversary is the way to defeat advanced, persistent threats. Key components to staying one step ahe...

Read More

How Panaseer is Leading the Way in Cyber Hygiene for Enterprise Security HOW PANASEER IS LEADING THE WAY IN CYBER HYGIENE FOR ENTERPRISE SECURITY

blog article

Jul 25, 2018

The recent data breaches at Equifax, Uber, Deloitte and Yahoo, are an indication of the ever-growing sophistication of hackers and cyberattacks. If this trend continues, breaches could be bigger, hackers smarter, and security teams more vulnerable. Prevention is better than cure. Defining and implem...

Read More

Ransomware. What are they and how to prevent them? RANSOMWARE. WHAT ARE THEY AND HOW TO PREVENT THEM?

blog article

Jul 25, 2018

What is Ransomware? Ransomware may also be known as ransom-malware is a malicious software which threatens to delete or deny access to data, once it takes over the computer. The cybercriminal demands ransom usually through cryptocurrency or credit card in order to restore the access to the files. Th...

Read More

10 Endpoint Security Problems Solved by the Cloud – Identifying Problems 10 ENDPOINT SECURITY PROBLEMS SOLVED BY THE CLOUD – IDENTIFYING PROBLEMS

blog article

Jul 25, 2018

Can’t Fix What You Can’t See. A single endpoint in a system can generate anywhere from 10,000 to 40,000 individual events in a single day — events that, if you could see them, would give readily help you identify malicious activity that could lead to a harmful attack.  Unfortu...

Read More

TWO MAJOR REASONS WE’RE FAILING AT CYBERSECURITY TWO MAJOR REASONS WE’RE FAILING AT CYBERSECURITY

blog article

Jul 25, 2018

You use email constantly. It’s the lifeblood of communication, commerce and exchange of ideas across your organization. Imagine trying to do your job in 2018 without it. It’s impossible, isn’t it? It’s just supposed to work, and when it doesn’t, everything you do comes ...

Read More

Introducing Radar: Faster Recovery from Ransomware INTRODUCING RADAR: FASTER RECOVERY FROM RANSOMWARE

blog article

Jul 25, 2018

Ransomware is on the rise, and it’s only getting smarter. Recent research shows ransomware attacks grew more than 350% annually. * To defend against attacks, many companies typically focus on building a perimeter to prevent malware from ever entering their data center. However, as malware beco...

Read More

The Latest in Security Style Guide Happenings THE LATEST IN SECURITY STYLE GUIDE HAPPENINGS

blog article

Jul 25, 2018

The Bishop Fox Cybersecurity Style Guide has been constantly evolving since its initial rollout in February 2018. It’s undergone one other iteration (v1.1, which you can find here) – until now, that is. For our audience’s convenience, we decided to create a digital version of the s...

Read More

Ransomware: Are you ready? RANSOMWARE: ARE YOU READY?

blog article

Jul 23, 2018

Ransomware is a lot more than the buzzword du jour. Attacks like WannaCry and Nyetya affected thousands of organizations around the world and cost billions of dollars in damages. While data theft and other types of attacks are very destructive, ransomware takes things to the next level by literally ...

Read More

What is a keylogger? How to Remove Them WHAT IS A KEYLOGGER? HOW TO REMOVE THEM

blog article

Jul 21, 2018

The online world is filled with several types of malware and keyloggers are one of the dangerous malicious codes out there. It records all your keystrokes and sends it to the creator, the information transferred can include login credentials, banking details, internet searches, and private messages....

Read More

Malware Definition and Their Removal Methods MALWARE DEFINITION AND THEIR REMOVAL METHODS

blog article

Jul 20, 2018

There are different types of malware containing unique characteristics and traits. Common malware types include virus, worm, Trojan horse, spyware, browser hijacker, rootkit, and malvertising. Virus: This is a malicious program that spreads by infecting other files or programs. Worm: This malware ca...

Read More

Demystifying: Next-Generation Endpoint Security DEMYSTIFYING: NEXT-GENERATION ENDPOINT SECURITY

blog article

Jul 20, 2018

The term “next-generation” is used quite frequently across the tech industry – it’s not limited to security. Since we see the term so often, it’s easy to gloss over without giving it much thought. Next-generation pretty obviously implies that the product you’re pu...

Read More

How to Speed Up Boot Time on Your PC or Laptop HOW TO SPEED UP BOOT TIME ON YOUR PC OR LAPTOP

blog article

Jul 19, 2018

Any Windows user would testify that their system boot-up is seemingly quick invariable of the versions that they use on such as Windows 7, 8, or 10. However, it is your actions that slow down your PC and let’s take a quick look at the major reasons behind the long boot times: #Numerous Softwar...

Read More

GandCrab Ransomware Version 4.0/4.1 GANDCRAB RANSOMWARE VERSION 4.0/4.1

blog article

Jul 18, 2018

July has been a busy month for the distributors of GandCrab ransomware. After about two months with no major update, the cybercrime gang behind GandCrab released version 4, and a few days later, version 4.1. The primary delivery method is via compromised WordPress websites, which have been hijacked ...

Read More

What is Malware and How Can We Prevent It? WHAT IS MALWARE AND HOW CAN WE PREVENT IT?

blog article

Jul 18, 2018

What is Malware? Malware, an abbreviated form of malicious software, is a type of software that has been particularly designed to gain access to or damage a computer, mostly without the knowledge of the owner. There are various types of malware, including computer worm, computer viruses, Trojan hors...

Read More

Google Next 2018: Cloud and Mobile Security Showcase GOOGLE NEXT 2018: CLOUD AND MOBILE SECURITY SHOWCASE

blog article

Jul 18, 2018

Google Next 2018 (#GoogleNext18) is almost upon us and we’re delighted to return as a Velocity Partner for this year’s conference. Check Point has a great show planned, so if you plan to be at the Moscone Center in San Francisco July 24 – 26, we invite you to come spend some time w...

Read More

Evaluating the Role of CASBs to Enhance Cloud Security EVALUATING THE ROLE OF CASBS TO ENHANCE CLOUD SECURITY

blog article

Jul 18, 2018

Public cloud computing has taken over the world, it seems. As companies throw more applications and data into computing infrastructure and applications for hire, security and visibility become more of a concern. Cloud access security brokers (CASBs) could be a promising answer to companies strugglin...

Read More

What is a Computer Virus? WHAT IS A COMPUTER VIRUS?

blog article

Jul 17, 2018

A computer virus is a self-replicating program that sometimes spreads by itself into other executable code or documents. Most viruses or worms are malicious programs designed to infect and gain control over vulnerable systems. Viruses spread via email can knock out systems burdened by the enormous a...

Read More

5 Ways To Secure Your Server 5 WAYS TO SECURE YOUR SERVER

blog article

Jul 17, 2018

Servers are very critical. Because they are responsible for running businesses. Which means the moment they crash; your business goes down. Loss of productivity, loss of customers and who knows – if the server is down for a long time – it may even mean the end of your business. Therefore...

Read More

Malware Examples and how to remove them MALWARE EXAMPLES AND HOW TO REMOVE THEM

blog article

Jul 17, 2018

Malware is a broader term for several types of malicious codes created by cybercriminals for preying on online users. Malware is the singly coined word for the words, “Malicious Software”. Today, the cyber attacks have become more common and frequent, targeting small to big organizations...

Read More

Why Malware as a Business is on the Rise WHY MALWARE AS A BUSINESS IS ON THE RISE

blog article

Jul 16, 2018

The alarming growth of malware attacks in the last years should concern each of us, but what is more important, should make us AWARE of the risks and consequences. Taking action and preventing these malicious activities operated by cybercriminals has to be a top priority IF we want to stay safe onli...

Read More

How ‘Small’ Security Errors Lead to a Security Breach HOW ‘SMALL’ SECURITY ERRORS LEAD TO A SECURITY BREACH

blog article

Jul 16, 2018

Fresh off the July 4th holiday, news broke that popular social media aggregator Timehop had been breached. Potentially devastating news? Certainly, a breach ranks among every organization’s worst nightmares. Timehop veered off the typical course and decided to be transparent with the breach &n...

Read More

Building a DevSecOps Culture BUILDING A DEVSECOPS CULTURE

blog article

Jul 16, 2018

Talk to any enterprise that has embraced DevOps and are trying to ensure security is adequately integrated into the organization and they'll likely say the challenge is twofold: tools and culture. Moreover, the most difficult of those two is culture. Integrating security culture into DevOps, or ...

Read More

The Internet of Things era: 6 ways to stay safe THE INTERNET OF THINGS ERA: 6 WAYS TO STAY SAFE

blog article

Jul 14, 2018

In the recent times, we get to hear stories of online criminals spying on people through baby monitors, failing of smart locks after a software update, personal information theft through webcams and stalkers effortlessly preying on their victims with the help of spyware. In simple, security breaches...

Read More

6 Mistakes to Avoid When Choosing Antivirus Software 6 MISTAKES TO AVOID WHEN CHOOSING ANTIVIRUS SOFTWARE

blog article

Jul 13, 2018

In today’s connected world, computers are connected to multiple networks and external devices. This opens the door for hackers to steal valuable data stored on the computers or even control the devices remotely. Online fraudsters make use of viruses, worms and other types of malicious codes to...

Read More

8 Reasons Mobile Apps Access Location + Security Policies to Consider 8 REASONS MOBILE APPS ACCESS LOCATION + SECURITY POLICIES TO CONSIDER

blog article

Jul 12, 2018

A fitness app, called Polar Flow, was recently found to be exposing the name, profile picture and whereabouts of high-ranking military personnel by oversharing user location data. Unfortunately, this is not the only security incident leaking user location. Back in February, Appthority noted how stud...

Read More

Cryptolocker- What Are They And How To Remove Them CRYPTOLOCKER- WHAT ARE THEY AND HOW TO REMOVE THEM

blog article

Jul 12, 2018

In today’s connected world, malware attacks are on the rise. The recent WannaCry ransomware attack which crippled thousands of business across the globe is a good example of the level and sophistication of such attacks. This highlights not only the need for better virus removal or malware remo...

Read More

How to protect Android Devices from Malware Attacks HOW TO PROTECT ANDROID DEVICES FROM MALWARE ATTACKS

blog article

Jul 11, 2018

Google is constantly enhancing features to render Playstore protection from these ever-evolving threats, however, there is no end to users, downloading an infected app. If your Android device is completely slow, or if it consumes too much data then you must be sure that you have downloaded a malicio...

Read More

Need help implementing ISO 27001? NEED HELP IMPLEMENTING ISO 27001?

blog article

Jul 11, 2018

ISO 27001 is the international standard that describes best practice for an ISMS (information security management system). Successful ISO 27001 implementation relies on commitment and support from top management, so we’ve put together a bundle to help you get that support. Why achieve ISO 2700...

Read More

What is a computer worm virus? How they infect and methods to remove them WHAT IS A COMPUTER WORM VIRUS? HOW THEY INFECT AND METHODS TO REMOVE THEM

blog article

Jul 10, 2018

What is a Computer Worm Virus. The term worm in computing refers to a malicious software whose main role is to infect computers, remain active on the infected system and self-replicate. A computer worm is programmed to duplicate rapidly and spread to uninfected computers. A user realizes the existen...

Read More

Employee Security Awareness Training – Management Side EMPLOYEE SECURITY AWARENESS TRAINING – MANAGEMENT SIDE

blog article

Jul 09, 2018

As many organizations have learned to their regret, a policy for cybersecurity – however comprehensive, proactive, and technologically sound it may be – is doomed to failure if its terms aren’t adhered to by stakeholders of the enterprise, across the board. This emphasizes the need...

Read More

June’s Most Wanted Malware: Banking Trojans Up 50% Among Threat Actors JUNE’S MOST WANTED MALWARE: BANKING TROJANS UP 50% AMONG THREAT ACTORS

blog article

Jul 05, 2018

Check Point’s latest Global Threat Index reveals that Trojan malware families enter Top 10 Most Wanted Ranking; Cryptomining Remains Tops on List. Over the past four months, banking Trojans have increased their global impact by 50 percent, as two Trojan malware families enter the latest Global...

Read More

What is Spyware and How To Protect Your PC WHAT IS SPYWARE AND HOW TO PROTECT YOUR PC

blog article

Jul 04, 2018

Spyware is a malicious software which is implanted by a hacker on victim’s computing device with the intention of stealing confidential information without the end user’s intent. The confidential information might include gathering PINs and credit card numbers, passwords, monitoring pass...

Read More

How to Stop Paying Ransomware HOW TO STOP PAYING RANSOMWARE

blog article

Jul 04, 2018

Ransomware is a relatively new form of malware that poses significant threats to computer networks, even those with effective security systems. It masquerades as legitimate software and uses encryption protocols, like those designed to protect personal information, to lock down files and hold data f...

Read More

Breaches of Wellington’s utility department affects residents BREACHES OF WELLINGTON’S UTILITY DEPARTMENT AFFECTS RESIDENTS

blog article

Jul 03, 2018

Investigation of the breach. Residents were informed that utility bills paid by credit card between July 2017 and February 2018 could be at risk, with customer names, credit card numbers, and expiration dates potentially exposed. The breach forced Wellington to shut down its payment portal and launc...

Read More

Cybersecurity concerns ground drones in the military CYBERSECURITY CONCERNS GROUND DRONES IN THE MILITARY

blog article

Jul 02, 2018

The Department of Defense (DoD) has temporarily banned the purchase and use of commercial off-the-shelf drones because of cybersecurity risks. The Pentagon needs to plan to patch the cybersecurity vulnerabilities in unmanned aerial systems (UAS) and mitigate security risks before the ban is lifted. ...

Read More

Assessing Microsoft 365 security solutions using the NIST Cybersecurity Framework ASSESSING MICROSOFT 365 SECURITY SOLUTIONS USING THE NIST CYBERSECURITY FRAMEWORK

blog article

Jul 02, 2018

Microsoft 365 security solutions align to many cybersecurity protection standards. One widely-adopted standard is the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF). Developed for the US government, NIST CSF is now also used by governments and enterprises worldwide...

Read More

6 Reasons Why Your PC Running Slow 6 REASONS WHY YOUR PC RUNNING SLOW

blog article

Jul 02, 2018

Is your computer running slow? Are you forced to quit half-way while trying to multi-task as the speed isn’t supportive enough? A few notable signs show that your computer is under a virus attack. So, install a robust anti-virus software and run a scan. If the anti-virus scan comes back clean ...

Read More

WPA3 Is a Major Missed Opportunity: Here’s Why WPA3 IS A MAJOR MISSED OPPORTUNITY: HERE’S WHY

blog article

Jun 30, 2018

Recently, the Wi-Fi Alliance officially announced details for the WPA3 security standard, which includes a brand-new protocol: the “Enhanced Open” network. While this new technology will represent an improvement to how open networks are done today, I believe that it’s a missed oppo...

Read More

Complete Guide To Android App Permissions & How To Use Them Smartly COMPLETE GUIDE TO ANDROID APP PERMISSIONS & HOW TO USE THEM SMARTLY

blog article

Jun 29, 2018

While installing any app from Google Play, users come across the app permission request. For instance, the message prompted on the mobile screen reads, “Allow Messenger to send and view SMS messages? ” you may choose to deny or allow it, the choice is yours. But, it is essential to know ...

Read More

Employee negligence named as biggest cybersecurity risk to US businesses EMPLOYEE NEGLIGENCE NAMED AS BIGGEST CYBERSECURITY RISK TO US BUSINESSES

blog article

Jun 29, 2018

New research from Shred-it’s 2018 State of the Industry Report has revealed that 84% of C-suites and 51% of small business owners have named employee negligence as one of the biggest information security risks to US businesses. Employee negligence was named as a top data breach concern. Key fi...

Read More

Reintroducing the Cybersecurity Style Guide: V1.1 REINTRODUCING THE CYBERSECURITY STYLE GUIDE: V1.1

blog article

Jun 27, 2018

It’s been four months since we released Version 1 of the Style Guide to the public, and the response has been incredible. From the moment we published V1, we’ve continued to improve the guide internally. Through daily editorial work and engaging with users like you, we’ve expunged ...

Read More

Capture Security Center: Knowledge, Visibility & Control of Your Cyber Security Ecosystem CAPTURE SECURITY CENTER: KNOWLEDGE, VISIBILITY & CONTROL OF YOUR CYBER SECURITY ECOSYSTEM

blog article

Jun 27, 2018

For many organizations, the fear of being targeted by cybercriminals runs deep, especially as news of the latest high-profile cyberattacks dominate the headlines. Managing security and responding to cyber risks and events are major issues organizations face on a daily basis. In May 2018 alone, the a...

Read More

Best Free Spyware and Malware Removal Software BEST FREE SPYWARE AND MALWARE REMOVAL SOFTWARE

blog article

Jun 27, 2018

Nowadays spyware and malware come in different forms, and it is extremely difficult for an average user to distinguish legitimate software and malware or spyware. The spyware is the malicious software or program that transmits your personal information to a hacker without your knowledge. The spyware...

Read More

Chicago Public Schools data breach exposes thousands of students’ private information CHICAGO PUBLIC SCHOOLS DATA BREACH EXPOSES THOUSANDS OF STUDENTS’ PRIVATE INFORMATION

blog article

Jun 26, 2018

On June 15, 2018, an employee of Chicago Public Schools negligently emailed private student information to more than 3,700 families. The data of thousands of students were breached, including: Names. Email addresses. Phone numbers. Student IDs. A link to a spreadsheet containing the data was acciden...

Read More

The Connection Between Insider Threats and Data Loss Prevention THE CONNECTION BETWEEN INSIDER THREATS AND DATA LOSS PREVENTION

blog article

Jun 26, 2018

Historically, when a cybersecurity team looks to decrease the risk of data loss at their organization, they look towards Data Loss Prevention (DLP) technology. These tools are often hyped for their ability to tag, categorize, and control data movement, but in many cases where an organization has a D...

Read More

Multiple data breaches at Dignity Health affect 60K+ MULTIPLE DATA BREACHES AT DIGNITY HEALTH AFFECT 60K+

blog article

Jun 25, 2018

On May 31, 2018, San Francisco-based Dignity Health reported a data breach affecting almost 56,000 patients to the Department of Health and Human Services (HHS). This was the third-largest data breach reported in May. Cause of breach. Due to an email sorting error by Dignity’s scheduling vendo...

Read More

5 Examples of Data & Information Misuse 5 EXAMPLES OF DATA & INFORMATION MISUSE

blog article

Jun 25, 2018

What is Data Misuse? Data misuse is the inappropriate use of data as defined when the data was initially collected. Misuse of information typically can be governed by laws and corporate cybersecurity policy. However, even with laws and policies in place, the potential for data misuse is growing. The...

Read More

How to Confront an Insider Threat HOW TO CONFRONT AN INSIDER THREAT

blog article

Jun 22, 2018

So, you’ve successfully detected, and then investigated a potential insider threat. You’ve learned a great deal about that user (be it an employee or a third-party contractor), including who they are, what happened, when, where, and also why, thanks to the visibility given to you by your...

Read More

What is Adware? Definition and Methods to Remove Them WHAT IS ADWARE? DEFINITION AND METHODS TO REMOVE THEM

blog article

Jun 22, 2018

An Adware is a software that displays unauthorized advertising download and displays pop-ups or banners on the program’s user-interface when the user is connected to the internet. This type of software, helps the developer generate revenue and recover the costs of the programming development b...

Read More

Handling cyber threats in 7 simple steps HANDLING CYBER THREATS IN 7 SIMPLE STEPS

blog article

Jun 22, 2018

Organisations need to be prepared to respond to a wide variety of cyber security incidents. Your biggest concern might be the threat of criminal hackers breaking into your systems, but you also need to know what to do if, say, an employee inadvertently or maliciously leaks data or your organisation ...

Read More

How To Get Rid of a Computer Virus? HOW TO GET RID OF A COMPUTER VIRUS?

blog article

Jun 21, 2018

Computer viruses are those malicious programs that once they infect your machine will start causing immense havoc on your computer. You will have to watch out and alert yourself when your computer suddenly becomes slow taking extra time to boot, and also be alert when an unwanted pop-up appears whil...

Read More

What’s causing the cyber-security skills gap? WHAT’S CAUSING THE CYBER-SECURITY SKILLS GAP?

blog article

Jun 21, 2018

The proliferation of next-gen technology into mainstream society has been a boon for consumers, entrepreneurs, and business owners alike. Between the rise of mobile computing, the Internet of Things (IoT), and modern social media, our society is more connected than ever before. But all of this techn...

Read More

Implement ISO 27001 on your current Windows system IMPLEMENT ISO 27001 ON YOUR CURRENT WINDOWS SYSTEM

blog article

Jun 21, 2018

ISO 27001 certification is considered among the top-ranking levels of accreditation for information security globally. It outlines best practice for an information security management system (ISMS), meaning that it has to be aligned with the organization’s business objectives and processes, as...

Read More

Can You Hear The Digging? The Dangers of Mobile Mining CAN YOU HEAR THE DIGGING? THE DANGERS OF MOBILE MINING

blog article

Jun 20, 2018

Mobile malware focused cyber-criminals are fast adapters and tend to follow rising trends in order to reach a wider audience. Today’s current trend is cryptocurrencies. There are several ways in which cyber criminals are taking advantage of the current frenzy surrounding cryptocurrencies. Some...

Read More

4 Ways How To Prevent Android Virus On Your SmartPhone 4 WAYS HOW TO PREVENT ANDROID VIRUS ON YOUR SMARTPHONE

blog article

Jun 20, 2018

In recent times, Android viruses are on the rise globally. Hackers are spreading new variants of Android viruses to infect smartphones. Not only have we seen an increase in Android virus infections, but the level of sophistication of those viruses has also increased, as well. If you are searching fo...

Read More

Why is the Lucrative Cybersecurity Field still Struggling to Hook Prospective Practitioners? WHY IS THE LUCRATIVE CYBERSECURITY FIELD STILL STRUGGLING TO HOOK PROSPECTIVE PRACTITIONERS?

blog article

Jun 20, 2018

The belief that the field of cybersecurity offers individuals job security and above average pay has become generally accepted in today’s interconnected world. These beliefs are bolstered by hard facts, such as those presented in ISACA’s annual State of Cybersecurity research, which reve...

Read More

3 Reasons to Supplement a DLP with Insider Threat Management 3 REASONS TO SUPPLEMENT A DLP WITH INSIDER THREAT MANAGEMENT

blog article

Jun 19, 2018

Many organizations spend years investing significant resources into data loss prevention (DLP) tools designed to identify, classify, and monitor data, in an effort to prevent data exfiltration. Unfortunately, DLP tools alone aren’t stemming the consistent rise of insider threat-related inciden...

Read More

How are contractors being evaluated on their DFARS cybersecurity measures? HOW ARE CONTRACTORS BEING EVALUATED ON THEIR DFARS CYBERSECURITY MEASURES?

blog article

Jun 19, 2018

The deadline for complying with the Defense Federal Acquisition Regulation Supplement (DFARS) was December 31, 2017. However, contractors struggled to understand what the information security requirements actually meant.  In response, the Department of Defense (DoD) provided guidance for &ldquo...

Read More

SamSam ransomware: controlled distribution for an elusive malware SAMSAM RANSOMWARE: CONTROLLED DISTRIBUTION FOR AN ELUSIVE MALWARE

blog article

Jun 19, 2018

SamSam ransomware has been involved in some high-profile attacks recently and remains a somewhat elusive malware. In its time being active, SamSam has gone through a slight evolution, adding more features and alterations into the mix. These changes do not necessarily make the ransomware more dangero...

Read More

Security for Intent-Based Networking SECURITY FOR INTENT-BASED NETWORKING

blog article

Jun 19, 2018

Networks have become more massive and complex than ever before. This year at Cisco Live US, people were talking about managing and defending networks at scale. Chuck Robbins, CEO of Cisco, said that 2.1 billion machine-to-machine connections have been added to the internet in the past year, and 27 b...

Read More

How To Protect Your Android Smartphone from Ransomware HOW TO PROTECT YOUR ANDROID SMARTPHONE FROM RANSOMWARE

blog article

Jun 18, 2018

In recent times, ransomware attacks are on the rise globally. Hackers are spreading new variants of ransomware to infect smartphones. Not only have we seen an increase in ransomware attacks, but the level of sophistication in those attacks have also increased, as well. In this article, let’s d...

Read More

The Benefits of Real-Time Cyber Threat Intelligence THE BENEFITS OF REAL-TIME CYBER THREAT INTELLIGENCE

blog article

Jun 18, 2018

To protect their personnel, assets, and sensitive information from being compromised, hijacked, or stolen by malicious actors, organizations are often advised to adopt security best practices, and to deploy the latest in secure technologies. But these things can’t be pulled out of thin air or ...

Read More

5 Tips To Protect Business From Ransomware 5 TIPS TO PROTECT BUSINESS FROM RANSOMWARE

blog article

Jun 15, 2018

Ransomware usually catches people off-guard. Most people do not worry about ransomware or any malware, but then they hit with malware. That is when they realize that backups are non-existence or way too out-of-date to use. At that point, depending on the situation their only option is to either wipe...

Read More

DoD predicts cost of fixing cyber vulnerabilities will surpass $250 million DOD PREDICTS COST OF FIXING CYBER VULNERABILITIES WILL SURPASS $250 MILLION

blog article

Jun 15, 2018

The rise of the Internet of Things (IoT) has increased the need for the Department of Defense (DoD) to strengthen its cybersecurity defenses – something already long overdue. The DoD estimates that it may have to spend more than $250 million over the next four years to mitigate existing vulner...

Read More

ISACA: Smart cities need to be made more secure ISACA: SMART CITIES NEED TO BE MADE MORE SECURE

blog article

Jun 15, 2018

Urban life is increasingly dictated by technology, but organizations aren’t doing enough to mitigate the risks that come with that, according to an ISACA® report. The survey of 2,000 cybersecurity professionals from across the globe focused on the challenges and opportunities of smart citi...

Read More

When Ransomware Goes Mobile WHEN RANSOMWARE GOES MOBILE

blog article

Jun 15, 2018

In the past two years, the most significant trend in the malware world was the rise of ransomware. Recently, mobile malware followed the footsteps of PC malware, like it has done many times before, as several security vendors detected a sharp rise in the spread of mobile ransomware. According to ESE...

Read More

Account Takeovers and Cloud Security, Part 3: The Anti-Phishing Solution ACCOUNT TAKEOVERS AND CLOUD SECURITY, PART 3: THE ANTI-PHISHING SOLUTION

blog article

Jun 14, 2018

Having already looked at the challenges of moving to the cloud, and how attackers gain control of a victim’s account, in this third and final post in our cloud security series, we will be looking at how an in depth approach to defense is required to prevent account takeovers. As discussed, the...

Read More

What Is An Antivirus Software How It Works And Detects? WHAT IS AN ANTIVIRUS SOFTWARE HOW IT WORKS AND DETECTS?

blog article

Jun 14, 2018

The malicious software arrives in different ways, often disguised in the form of software codes, scripts, active content, and other software that seems legitimate. The malware comes in two main forms, and they are the viruses and worms. Viruses. Nearly all viruses are assigned to an apparently harml...

Read More

Firewall Management Maturity Stage 3: Advanced Firewall Management FIREWALL MANAGEMENT MATURITY STAGE 3: ADVANCED FIREWALL MANAGEMENT

blog article

Jun 13, 2018

The firewall technology evolution continues. Today finds us at a place where firewalls provide vast capabilities, in particular when it comes to gaining more visibility into the global threat landscape. One of the biggest challenges any organization faces is seeing threats outside of their environme...

Read More

VPNFilter malware still making waves VPNFILTER MALWARE STILL MAKING WAVES

blog article

Jun 13, 2018

Last month, a piece of malware called VPNFilter caused chaos for owners of MikroTik, Lynksys, TP-Link, and Netgear equipment. Roughly 500,000 devices worldwide fell victim, with the unwanted parasite able to listen to traffic, steal credentials, damage devices, and more. Until patches started to rol...

Read More

Coachable Moments: Insider Threats, Cloud Storage, & Working Remotely COACHABLE MOMENTS: INSIDER THREATS, CLOUD STORAGE, & WORKING REMOTELY

blog article

Jun 13, 2018

Insider threat management is about much more than ensuring you have the right technologies in place. It’s about the right mix of People, Processes, and Technology. Since people are at the center of all insider threats, having a strategy for ongoing cybersecurity awareness coaching and training...

Read More

Proposed SHIELD Act gains organizations’ support PROPOSED SHIELD ACT GAINS ORGANIZATIONS’ SUPPORT

blog article

Jun 13, 2018

The Stop Hacks and Improve Electronic Data Security (SHIELD) Act was introduced in November 2017 in response to the increasing number of data breaches and addresses major gaps in New York’s cybersecurity regulations. The SHIELD Act will impose fines of up to $5,000 per violation or $20 per ins...

Read More

The Atlanta Ransomware Attack Wasn’t as Bad as We Thought – It’s Worse THE ATLANTA RANSOMWARE ATTACK WASN’T AS BAD AS WE THOUGHT – IT’S WORSE

blog article

Jun 12, 2018

When the news broke about the massive ransomware attack on the city of Atlanta, the details seemed dire yet murky – we knew about court dates getting rescheduled, city job applications getting frozen, and computer systems going down for nearly a week. As the rubble began to clear, we’re ...

Read More

Data Backup and Encryption for Municipal Governments DATA BACKUP AND ENCRYPTION FOR MUNICIPAL GOVERNMENTS

blog article

Jun 12, 2018

For the last 20 months or so, we’ve worked with nearly 200 government municipalities on cyber loss control projects, now largely completed. Data security is a major concern for many municipal governments, so in this post—the third in our Cyber Security Foundation for Municipal Government...

Read More

Cybersecurity drills begin in NY CYBERSECURITY DRILLS BEGIN IN NY

blog article

Jun 12, 2018

Just months after the Facebook and Cambridge Analytica incident, in which users’ personal data was used to help Donald Trump’s election campaign, New York officials are conducting cybersecurity drills to test the state’s election system for vulnerabilities. About the cybersecurity ...

Read More

Simple Tips To Prevent Ransomware Attack On Android Devices SIMPLE TIPS TO PREVENT RANSOMWARE ATTACK ON ANDROID DEVICES

blog article

Jun 12, 2018

Antivirus software has evolved over the years and so the malware attacks. In order to protect your computer from sophisticated cyber-attacks, you need best antivirus software. In recent times, ransomware attacks are on the rise globally. Hackers are spreading new variants of ransomware to infect sma...

Read More

DevOpsifying Network Security DEVOPSIFYING NETWORK SECURITY

blog article

Jun 12, 2018

DevOps is everywhere. Seems like it’s all people talk about. The best thing since sliced bread. So why is this concept/practice/philosophy/religion/cult becoming so popular in so many companies, big and small (even yours)? Truth is, in today’s fast-paced world, it actually makes a lot of...

Read More

What is Domain Fronting? WHAT IS DOMAIN FRONTING?

blog article

Jun 11, 2018

A little-known software feature called domain fronting has become the central issue in a worldwide dilemma now facing internet users wishing to gain access to websites and online resources that their governments have deemed off-limits. Censorship of internet access and content has been very much in ...

Read More

6 Ways to Speed Up Security Investigations 6 WAYS TO SPEED UP SECURITY INVESTIGATIONS

blog article

Jun 08, 2018

You log into your workstation to start your day, when you discover the bad news. Your organization is the latest to be hit by an insider threat caused data leak. Vital information is now streaming out to whomever wants it, and you have no idea what happened. What was leaked? When did it go out? Who ...

Read More

The Insider Threat Level: GDPR Total Recall, The CIA Hoarder, and At-Risk Agencies THE INSIDER THREAT LEVEL: GDPR TOTAL RECALL, THE CIA HOARDER, AND AT-RISK AGENCIES

blog article

Jun 08, 2018

The Insider Threat Level series is here to keep you up-to-speed on the numerous examples of insider threat incidents, trends, and best practices caught in the news, so you can be more prepared for anything coming your way. This week, we’re taking a look at: an EU data leak that brings up fond ...

Read More

Tips for safe summer travels: your cybersecurity checklist TIPS FOR SAFE SUMMER TRAVELS: YOUR CYBERSECURITY CHECKLIST

blog article

Jun 08, 2018

Summer is just around the corner in the Northern Hemisphere, and with it comes vacation plans for many. Those looking to take some time away from work and home are likely making plans to secure their home, have their pets taken care of, and tie up loose ends at work. But how about securing your devi...

Read More

RiskIQ’s Q1 2018 Phishing Roundup and 2017 Recap: Phishing Declines, but Targets Increase RISKIQ’S Q1 2018 PHISHING ROUNDUP AND 2017 RECAP: PHISHING DECLINES, BUT TARGETS INCREASE

blog article

Jun 07, 2018

Phishing actors are always innovating and creating new methods to lure victims into gaining access to their financial information, PII, and user accounts. Understanding the latest phishing techniques and threat actor tendencies helps us position our customers to stay one step ahead of phishing threa...

Read More

Concerns arise as South Carolina Passes the Insurance Industry’s first Cybersecurity Law CONCERNS ARISE AS SOUTH CAROLINA PASSES THE INSURANCE INDUSTRY’S FIRST CYBERSECURITY LAW

blog article

Jun 06, 2018

In May 2018, South Carolina became the first state to pass a cybersecurity insurance bill requiring insurers to establish and implement a cybersecurity program protecting companies and consumers from a data breach. The law created rules for South Carolina insurers, agents, and other licensed entitie...

Read More

Finding that one in a million: Addressing security alert overload by applying business context FINDING THAT ONE IN A MILLION: ADDRESSING SECURITY ALERT OVERLOAD BY APPLYING BUSINESS CONTEXT

blog article

Jun 06, 2018

How many security alerts does a security operation center (SOC) have to deal with during an average day?  New research from Imperva claims that 27% of IT professionals reported receiving more than 1 million alerts a day, and 55% received more than 10,000 a day – or nearly 7 per minute! To...

Read More

Achieve ISO 27001 compliance with our DIY packages ACHIEVE ISO 27001 COMPLIANCE WITH OUR DIY PACKAGES

blog article

Jun 05, 2018

With the General Data Protection Regulation (GDPR) taking effect, it’s important to ensure that you’re taking the necessary steps towards GDPR compliance. ISO 27001 is the international standard that describes best practice for an information security management system (ISMS). Achieving ...

Read More

Form Follows Function: Why it is Important to Find Balance in Cybersecurity FORM FOLLOWS FUNCTION: WHY IT IS IMPORTANT TO FIND BALANCE IN CYBERSECURITY

blog article

Jun 05, 2018

What is balance? I often hear people talking about finding it, as though it were some object sitting on a shelf in a store. “There isn’t enough time in the day to do what I need to do,” or “I’ll get more sleep once I’m less busy” are common things that peopl...

Read More

Linking Infrastructure from Phishing Data Exfiltrations LINKING INFRASTRUCTURE FROM PHISHING DATA EXFILTRATIONS

blog article

Jun 05, 2018

Phishing is still one of the most relentless and quickly evolving threats facing today’s businesses. At RiskIQ, we process tons of web-related threat data, including phishing incidents. From various sources, we receive URLs which may be indicative of phishing, examine the pages with our web-cr...

Read More

Cyber insurance is booming, but it won’t protect you from GDPR fines CYBER INSURANCE IS BOOMING, BUT IT WON’T PROTECT YOU FROM GDPR FINES

blog article

Jun 04, 2018

The US is one of the biggest markets for cyber insurance, but you won’t be able to take out a policy protecting you from fines for breaches of the EU General Data Protection Regulation (GDPR). The law, which strengthens EU residents’ rights relating to their personal data, applies to all...

Read More

The Truth is Out There, but the Threat Is Already Inside THE TRUTH IS OUT THERE, BUT THE THREAT IS ALREADY INSIDE

blog article

Jun 01, 2018

Despite what you may have heard, not all cybersecurity threats come from outside the firewall or beyond your building’s walls. Though we may “want to believe,” there are numerous opportunities for your employees or contractors to cause damage from within. These insider threats can ...

Read More

Tim Hortons Malware Attack & Aftermath…Thoughts On National Doughnut Day! TIM HORTONS MALWARE ATTACK & AFTERMATH…THOUGHTS ON NATIONAL DOUGHNUT DAY!

blog article

May 31, 2018

Three months ago, Tim Hortons coffee and doughnut fast food restaurants reportedly suffered from a severe malware attack. The malware first struck the Tim Hortons point-of-sale (POS) terminals and brought-down cash registers at hundreds of franchises. In recent times, the number of targeted malware ...

Read More

What is Firewall and Types of Firewall WHAT IS FIREWALL AND TYPES OF FIREWALL

blog article

May 31, 2018

The Internet is a dangerous place filled with all kinds of security threats. Therefore, the moment your network – be it small or large – connects to the internet, it gets exposed to all kinds of security issues, unless it is protected by what is known as a firewall, which is responsible ...

Read More

Staff awareness of phishing STAFF AWARENESS OF PHISHING

blog article

May 31, 2018

What can you do to protect your organization from phishing? Anti-malware installed on your computers will stop some phishing attacks, but not all. It takes just one person to bring the whole business to a halt by falling for the bait. Phishing emails do have tell-tale signs, such as not-quite-correc...

Read More

RiskIQ’s Q1 Mobile Threat Landscape Report: Malicious Apps in Global App Stores Decline, but New Threats Lurk RISKIQ’S Q1 MOBILE THREAT LANDSCAPE REPORT: MALICIOUS APPS IN GLOBAL APP STORES DECLINE, BUT NEW THREATS LURK

blog article

May 30, 2018

In our Q1 2018 Mobile Threat Landscape Report, which analyzed 120 mobile app stores and more than two billion daily scanned resources, RiskIQ researchers found that malicious mobile apps continued to decline, despite the total number of apps we observed once again increasing. In fact, apps newly obs...

Read More

90% of employees risk data breaches when using removable devices 90% OF EMPLOYEES RISK DATA BREACHES WHEN USING REMOVABLE DEVICES

blog article

May 29, 2018

A new study has found that 90% of employees regularly transferred company data onto unencrypted and unauthorized USB devices, putting that information at risk of data breaches.  Dtex Systems’ report analyzed anonymous records of organizations across North and South America, Europe, and th...

Read More

Cities Must Do More to Modernize Technologic Infrastructure CITIES MUST DO MORE TO MODERNIZE TECHNOLOGIC INFRASTRUCTURE

blog article

May 28, 2018

Cities need to bolster their protection of critical infrastructure, which makes for attractive targets to increasingly sophisticated cybercriminals looking to inflict serious damage in large population centers. The volume of data created by cities and their device-loving inhabitants is exploding, ra...

Read More

Google will soon provide cybersecurity tools for upcoming election events GOOGLE WILL SOON PROVIDE CYBERSECURITY TOOLS FOR UPCOMING ELECTION EVENTS

blog article

May 25, 2018

After the 2016 presidential election was targeted by (purportedly Russian) criminal hackers, state and election officials are wary of further cyberattacks on this year’s midterm elections. On May 1, an election results website went down during midterm primaries in Knox County, Tennessee follow...

Read More

New VPNFilter malware targets at least 500K networking devices worldwide NEW VPNFILTER MALWARE TARGETS AT LEAST 500K NETWORKING DEVICES WORLDWIDE

blog article

May 23, 2018

For several months, Talos has been working with public- and private-sector threat intelligence partners and law enforcement in researching an advanced, likely state-sponsored or state-affiliated actor's widespread use of a sophisticated modular malware system we call "VPNFilter." We ha...

Read More

How To Get Rid Of Malware on Mac HOW TO GET RID OF MALWARE ON MAC

blog article

May 23, 2018

The modern-day malware is not easy to handle. Because there’s so many of them – adware, spyware, ransomware and more. And they just don’t affect Windows and Linux alone. Mac OS too are vulnerable. So if your using Mac and are of the thought that it won’t get affected, then yo...

Read More

Don’t fall into these hidden GDPR pitfalls DON’T FALL INTO THESE HIDDEN GDPR PITFALLS

blog article

May 22, 2018

With just weeks ahead of us, US companies are still unprepared for the EU’s General Data Protection Regulation (GDPR), according to Melissa – a global contact data quality and identity verification solutions provider. A survey conducted by NAPCO Research and Melissa requested feedback fr...

Read More

10 Tips to Reduce Common Vulnerabilities Exploited by Cybercriminals 10 TIPS TO REDUCE COMMON VULNERABILITIES EXPLOITED BY CYBERCRIMINALS

blog article

May 21, 2018

While it seems that today’s cybercriminals have a myriad of tricks and techniques at the ready to gain access to your network, the reality is that they are typically taking advantage of common vulnerabilities – such as unpatched software or default passwords – time and time again. ...

Read More

The Primary Factors Motivating Insider Threats THE PRIMARY FACTORS MOTIVATING INSIDER THREATS

blog article

May 21, 2018

There was once a time when the risk of an “insider threat” incident was relatively unknown, or simply not considered likely, within an organization. That time has quickly come and gone. With the rise in publicly-disclosed systems breaches and data leaks, along with the steady stream of s...

Read More

How to write a GDPR privacy notice HOW TO WRITE A GDPR PRIVACY NOTICE

blog article

May 21, 2018

If you’re just beginning your EU General Data Protection Regulation (GDPR)compliance journey, it’s unlikely you will be fully compliant by the time the Regulation is enforced on May 25, 2018. An integral part of your GDPR compliance project should be producing appropriate documentation, ...

Read More

What is a Virus Scanner? How do they work and protect your devices WHAT IS A VIRUS SCANNER? HOW DO THEY WORK AND PROTECT YOUR DEVICES

blog article

May 19, 2018

An anti-virus scanner is part and parcel of a free antivirus software, it scans a hard drive to detect malicious software in a computing device. Simply put, the goal-directed nature of a virus scanner software is to review and identify threats from viruses and programs. Anti virus scanner works in a...

Read More

Rootkit: What is Rootkit & it’s types? How to Detect it ROOTKIT: WHAT IS ROOTKIT & IT’S TYPES? HOW TO DETECT IT

blog article

May 18, 2018

In simple language, ‘rootkit’ is basically a software kit used to get to the root of the computer. In other words, a software kit used to gain admin access to the computer and thereby control it. Developed as a legitimate software to provide a ‘backdoor’ to software developer...

Read More

GDPR phishing scams target Apple and Airbnb customers GDPR PHISHING SCAMS TARGET APPLE AND AIRBNB CUSTOMERS

blog article

May 18, 2018

With just days until the EU General Data Protection Regulation (GDPR) is enforced, many organizations are updating their privacy policies and emailing customers to ensure they are aware of the changes. Cyber criminals are taking advantage of this through GDPR-related phishing scams. Apple and Airbnb...

Read More

5 Top-Rated Antivirus Apps For Android 5 TOP-RATED ANTIVIRUS APPS FOR ANDROID

blog article

May 17, 2018

Despite Google’s immense efforts in securing Android; the widely-used operating system remains vulnerable to numerous online threats. The best way to steer clear of the threats is to install the best antivirus app for Android devices. Some of us may feel that there is no need to install a free...

Read More

Security Partnerships are Key to Increased Cybersecurity Maturity SECURITY PARTNERSHIPS ARE KEY TO INCREASED CYBERSECURITY MATURITY

blog article

May 17, 2018

Strong security partnerships will be key to a safer region as cybercriminals increasingly seek to compromise the growing digital infrastructure in META. The META region continues to be right at the forefront when it comes to developing and implementing technologies that are helping to shape the worl...

Read More

The Best Anti-Virus Protection of 2018 – Top AV Protection Programs THE BEST ANTI-VIRUS PROTECTION OF 2018 – TOP AV PROTECTION PROGRAMS

blog article

May 16, 2018

Malware creators are nefarious to the point that they make fatal infections to extract your financial related information or keep your PC from working by any methods. What you require for a perfect virus protection is the best antivirus programming on your PC. Because of the fortunate stars, as the ...

Read More

NIST seeks feedback on its updated Risk Management Framework NIST SEEKS FEEDBACK ON ITS UPDATED RISK MANAGEMENT FRAMEWORK

blog article

May 16, 2018

The National Institute of Standards and Technology (NIST) has released a draft of its update to the Risk Management Framework (RMF), designed to help federal agencies and companies safeguard their information systems from cyber threats. The update will help organizations respond appropriately to pri...

Read More

4 Ways to Defend Against Pretexting Scams 4 WAYS TO DEFEND AGAINST PRETEXTING SCAMS

blog article

May 16, 2018

Contrary to belief, insider threats are not always employees looking to steal company data and information with malicious intent. Many instances of data exfiltration at the hands of insiders are the result of simple mistakes, such as responding to a pretexting email. These unintentional insider thre...

Read More

Bad Apps: Protect Your Smartphone from Mobile Malware BAD APPS: PROTECT YOUR SMARTPHONE FROM MOBILE MALWARE

blog article

May 15, 2018

Smartphone apps make life easier, more productive, and more entertaining. But can you trust every app you come across? Malicious mobile apps create easy access to your devices for Android and iOS malware to wreak havoc. And there are many untrusted and potentially dangerous apps lurking around in ap...

Read More

The Cyber Security Skills Gap is Getting Wider THE CYBER SECURITY SKILLS GAP IS GETTING WIDER

blog article

May 14, 2018

For any cyber security specialist who’s due a pay review, recently published threat reports make worthwhile reading. The latest annual roundup from FireEye confirms the Cyber Security Skills Gap as one of the biggest risks facing businesses. Specialists in this area are dubbed a “scarce ...

Read More

Researchers use new technique to target Android phones RESEARCHERS USE NEW TECHNIQUE TO TARGET ANDROID PHONES

blog article

May 14, 2018

It appears that researchers have found a new way to hack smartphones. The technique is called ‘Rowhammer’, in which hackers manipulate the physical electric charge in memory chips, corrupting the data and even running specific code. The cyber attack is able to compromise fundamental comp...

Read More

What’s the Difference between a Penetration Test and a Vulnerability Assessment? WHAT’S THE DIFFERENCE BETWEEN A PENETRATION TEST AND A VULNERABILITY ASSESSMENT?

blog article

May 14, 2018

In the world of cybersecurity, nothing is static. The cyber threat environment is dynamic and evolving. There are new vulnerabilities discovered on a daily basis. Attacks are getting more sophisticated – they’re getting more complex and flying under the radar of traditional detection tec...

Read More

Why Antivirus Protection for Android is Needed? WHY ANTIVIRUS PROTECTION FOR ANDROID IS NEEDED?

blog article

May 12, 2018

Smartphones have evolved much in the recent years. Today, smartphones are capable of doing things which can be done only by a computer, a few years back. Unfortunately, with more features added to smartphones with each OS upgrades, there is more opportunity for criminal hackers to infect them with m...

Read More

GDPR: 3 Ways to Protect Employees & Decrease Insider Threat Risk GDPR: 3 WAYS TO PROTECT EMPLOYEES & DECREASE INSIDER THREAT RISK

blog article

May 11, 2018

It might not seem like it, thanks to the added work it has created for organizations inside and outside of the EU, but the new GDPR compliance regulations were designed with the benefit of people in mind. The goal: “to protect all EU citizens from privacy and data breaches in an increasingly d...

Read More

Best Antivirus Protection Software 2018 BEST ANTIVIRUS PROTECTION SOFTWARE 2018

blog article

May 10, 2018

Malware authors are so nefarious that they create deadly viruses to uncover your financial data or prevent your PC from working by any means. What you require is the ideal antivirus software on your PC. Thanks to the lucky stars, as the giant leaders in the security industry, to deliver their best p...

Read More

NIST and automotive industry collaborate on new cybersecurity guidelines NIST AND AUTOMOTIVE INDUSTRY COLLABORATE ON NEW CYBERSECURITY GUIDELINES

blog article

May 09, 2018

Cybersecurity threats are on the rise. In response, the Automotive Industry Action Group (AIAG) has released the Cyber Security 3rd Party Information Security publication, which details cybersecurity guidelines for the automotive industry. The idea for the guidelines came about when a manufacturer a...

Read More

6 practical cybersecurity tips for SMEs 6 PRACTICAL CYBERSECURITY TIPS FOR SMES

blog article

May 07, 2018

Any business that employs fewer than 250 people can be categorized as a small and medium-sized enterprise (SME). There are more SMEs than there are corporations and overall, SMEs employ more people. SMEs serve as a driving force for competition and innovation in many economic sectors. Media coverage...

Read More

NIS Regulations – get our updated compliance guide NIS REGULATIONS – GET OUR UPDATED COMPLIANCE GUIDE

blog article

May 04, 2018

The EU Directive on security of network and information systems (NIS Directive) must be transposed into national law by 10 May 2018. The Directive requires operators of essential services (OES) and digital service providers (DSPs) to implement effective security measures appropriate to associated ri...

Read More

What is Computer Worm? How does it Spreads WHAT IS COMPUTER WORM? HOW DOES IT SPREADS

blog article

May 02, 2018

A computer worm is a type of malware which is intended for infecting vulnerable computers in a network. Computer worms tend to quickly replicate themselves and wiggle their way into poorly protected computers. Even today worms exist, the worm component of the dreaded Wanna Cry ransomware made it pos...

Read More

UnityPoint Health email accounts compromised in phishing attack UNITYPOINT HEALTH EMAIL ACCOUNTS COMPROMISED IN PHISHING ATTACK

blog article

May 01, 2018

UnityPoint Health has revealed that several employee email accounts were subject to a phishing attack . Upon discovery of the incident on February 15, UnityPoint changed the passwords of the affected accounts and enrolled forensic specialists to investigate. Affected information included patient nam...

Read More

When should an organization report a data breach? WHEN SHOULD AN ORGANIZATION REPORT A DATA BREACH?

blog article

Apr 27, 2018

From May 25, 2018, compliance with the EU General Data Protection Regulation(GDPR) will be mandatory for organizations that process EU residents’ personal information. The Regulation joins a number of US federal and state laws that hold organizations accountable for mitigating and managing inf...

Read More

Flawed routers with hardcoded passwords were manufactured by firm that posed “national security risk” to UK FLAWED ROUTERS WITH HARDCODED PASSWORDS WERE MANUFACTURED BY FIRM THAT POSED “NATIONAL SECURITY RISK” TO UK

blog article

Apr 27, 2018

Earlier this month the UK’s National Cyber Security Centre (NCSC) issued a warning to telecoms firms about the potential risks posed by devices manufactured by Chinese-state owned enterprise ZTE. “NCSC assess that the national security risks arising from the use of ZTE equipment or servi...

Read More

Insider Threats Remain #1 Security Headache for Organizations, Research Shows INSIDER THREATS REMAIN #1 SECURITY HEADACHE FOR ORGANIZATIONS, RESEARCH SHOWS

blog article

Apr 27, 2018

Businesses cannot come up with a mitigation strategy to efficiently detect, identify and manage insider threats, according to research from the Ponemon Institute, so they risk the loss of critical confidential data and resources, network shutdown and reputational damage. In the past year, 159 organi...

Read More

Yahoo gets $35 million slap on wrist for failing to disclose colossal 2014 data breach YAHOO GETS $35 MILLION SLAP ON WRIST FOR FAILING TO DISCLOSE COLOSSAL 2014 DATA BREACH

blog article

Apr 25, 2018

In an ongoing investigation by the Securities and Exchange Commission, Yahoo (now Altaba) has been fined $35 million for failing to report a known data breach in two straight years of SEC filings. Publicly traded companies in the United States are required by law to disclose any mishaps that may imp...

Read More

5 ways to improve your information security 5 WAYS TO IMPROVE YOUR INFORMATION SECURITY

blog article

Apr 25, 2018

Organizations are always looking for ways to improve their security posture, but the process is often frustrating. As soon as they secure one weakness, cyber criminals find another one. But if you take a step back, you’ll notice that, as much as cyber criminals’ tactics evolve, they alwa...

Read More

NIST releases updated version of the Cybersecurity Framework NIST RELEASES UPDATED VERSION OF THE CYBERSECURITY FRAMEWORK

blog article

Apr 24, 2018

After circulating a draft in December and accepting feedback, on April 16, 2018, the US Department of Commerce’s National Institute of Standards and Technology (NIST) released version 1.1 of its Cybersecurity Framework (CSF). Formally titled “Framework for Improving Critical Infrastructu...

Read More

Why you shouldn’t ignore the NIS Directive WHY YOU SHOULDN’T IGNORE THE NIS DIRECTIVE

blog article

Apr 24, 2018

By 9 May 2018, the Directive on security of network and information systems (NIS Directive) will have been transposed into UK law. However, unlike the EU General Data Protection Regulation (GDPR) (GDPR), which organisations are currently scrambling to comply with, there is little commotion about the...

Read More

Cybersecurity Metrics Your Board of Directors Should Care About & Why CYBERSECURITY METRICS YOUR BOARD OF DIRECTORS SHOULD CARE ABOUT & WHY

blog article

Apr 23, 2018

Businesses today are going through an incredible digital transformation – moving to the cloud, embracing the Internet of Things (IoT), implementing automation, etc. – all at a lightning fast pace. This is opening them up to new and expanding cybersecurity threats that are difficult to ma...

Read More

List of free GDPR resources LIST OF FREE GDPR RESOURCES

blog article

Apr 23, 2018

The General Data Protection Regulation (GDPR) will be enforced from May, requiring all organizations that handle EU residents’ data to abide by its strict terms. If yours is one of the millions of organizations that need to comply with the GDPR, then no doubt you are getting slightly hot under...

Read More

Cybersecurity of smart medical devices, hospital networks is top priority for the FDA CYBERSECURITY OF SMART MEDICAL DEVICES, HOSPITAL NETWORKS IS TOP PRIORITY FOR THE FDA

blog article

Apr 20, 2018

Securing medical devices is a top priority after countless vulnerabilities have been detected in connected medical devices and hospital infrastructures. Not only are hospital networks exposed to remote hacker attacks and security breaches, but they also struggle with insider threats and major errors...

Read More

Women Underrepresented at RSAC - Let WOMEN UNDERREPRESENTED AT RSAC - LET'S DO SOMETHING ABOUT IT

blog article

Apr 20, 2018

Although I’m excited to be at the RSA Conference with my Morphisec colleagues, it reminds me of the impetus for starting our Women in Cybersecurity Scholarship. Of 28 keynote speakers at RSAC, only seven are women, and six of these were added at the last minute following a string of scathing t...

Read More

Best Free Anti-Spyware and Antivirus Removal Software BEST FREE ANTI-SPYWARE AND ANTIVIRUS REMOVAL SOFTWARE

blog article

Apr 19, 2018

Spyware is a type of malicious software that secretly monitors and collects user information from PCs without their knowledge. It can gather valuable information such as user passwords, credit card details, and other confidential information by secretly recording user’s keystrokes and web brow...

Read More

THREAT INTELLIGENCE BRIEF: APRIL 18, 2018 THREAT INTELLIGENCE BRIEF: APRIL 18, 2018

blog article

Apr 18, 2018

“Great Western Railway urges online customers to update passwords after cyber-attack. The firm said hackers used an automated system to gain access to 1,000 customer accounts on its website and is taking action. While only a very small number of accounts have been affected by the attack, cyber...

Read More

U.S. official warns of U.S. OFFICIAL WARNS OF 'UNINTENDED CONSEQUENCES' OF EUROPEAN DATA PRIVACY LAW

blog article

Apr 18, 2018

SAN FRANCISCO (Reuters) - U.S. Department of Homeland Security Secretary Kirstjen Nielsen warned on Tuesday that a European data privacy law taking effect next month may have “unintended consequences” that harm the United States’ ability to protect itself from cyber attacks. The Eu...

Read More

Securing Your Organization SECURING YOUR ORGANIZATION'S HUMAN LAYER

blog article

Apr 18, 2018

In my time in the trenches, and in my previous role as a Gartner research analyst and industry advisor, I spent a LOT of time helping organizations across the world think through their cybersecurity programs. Much of this time was thinking through the defensive measures and how technology can assist...

Read More

New York City to offer free cybersecurity tools to deter criminal hackers NEW YORK CITY TO OFFER FREE CYBERSECURITY TOOLS TO DETER CRIMINAL HACKERS

blog article

Apr 17, 2018

New York Mayor Bill de Blasio recently announced that, in an effort to improve cybersecurity, the city will be offering a free mobile app that warns users when suspicious activity is detected on their devices. The program, NYC Secure, is a pioneering cybersecurity initiative protecting New Yorkers o...

Read More

US, UK issue odd warning about Russian hackers US, UK ISSUE ODD WARNING ABOUT RUSSIAN HACKERS

blog article

Apr 17, 2018

The U.S. Department of Homeland Security (DHS), Federal Bureau of Investigation (FBI), and the UK’s National Cyber Security Centre (NCSC) have today issued a joint Technical Alert about malicious cyber activity carried out by the Russian government. To summarize the alert - It claims hackers t...

Read More

The Cyber Threat Alliance – Stopping Attackers in their Tracks THE CYBER THREAT ALLIANCE – STOPPING ATTACKERS IN THEIR TRACKS

blog article

Apr 16, 2018

When you think about the future of threat intelligence, we can all agree that threats morph, constantly. Sophisticated new botnets, the increase in DDoS-as-a-Service tools, and the rise in cryptocurrency are creating an unpredictable environment where even novice attackers can demand ransoms, carry ...

Read More

Cyber-nationalism in Cybersecurity Standards CYBER-NATIONALISM IN CYBERSECURITY STANDARDS

blog article

Apr 16, 2018

There are a variety of global standards that have been created to provide guidance to Industrial Control System (ICS) vendors and end users attempting to secure systems.  Examples include ISA/IEC 62443, and ISO/IEC 15408.  Many countries are utilizing these globally accepted standards to d...

Read More

The GDPR: What technical measures do you need to conduct? THE GDPR: WHAT TECHNICAL MEASURES DO YOU NEED TO CONDUCT?

blog article

Apr 12, 2018

Many organisations’ network security defences consist only of patch management and antivirus software. Those are essential, but so is reviewing configurations, third-party applications and hardware. This is what vulnerability scans do. A vulnerability scan is an automated process that finds an...

Read More

Kick-start your career in information security management KICK-START YOUR CAREER IN INFORMATION SECURITY MANAGEMENT

blog article

Apr 12, 2018

Attendees will gain a solid understanding of risk management, technical controls, legal frameworks, physical security, international standards and business continuity, including. The concepts relating to information security management, including confidentiality, integrity and availability (CIA). vu...

Read More

Is blockchain the alchemy to DDoS attacks? IS BLOCKCHAIN THE ALCHEMY TO DDOS ATTACKS?

blog article

Apr 12, 2018

DDoS(Denial of Distributed Service) attack is a type of cyber attack that involves a large number of computers and huge volumes of traffic to overwhelm a server or network, slowing it or rendering it completely unresponsive. Victims of a DDoS attack consist of both the end targeted system and all sy...

Read More

Securing Critical Infrastructure in the Wake of Unprecedented Cyber Threats SECURING CRITICAL INFRASTRUCTURE IN THE WAKE OF UNPRECEDENTED CYBER THREATS

blog article

Apr 11, 2018

Last year saw a worrying trend in the cybersecurity attack arena as critical infrastructure came under fire, with many suggesting in 2018 these attacks could escalate. Various defense departments warned of nation-state campaigns targeting operational technology (OT) within the energy sector and nucl...

Read More

Why ISO 27001 is integral to data protection compliance WHY ISO 27001 IS INTEGRAL TO DATA PROTECTION COMPLIANCE

blog article

Apr 10, 2018

With the EU General Data Protection Regulation (GDPR)’s compliance deadline looming, any organisation that processes EU residents’ data will likely be investigating implementation options to help tackle its compliance project, if it hasn’t already done so. Supervisory authorities s...

Read More

How blockchain could solve the internet privacy problem HOW BLOCKCHAIN COULD SOLVE THE INTERNET PRIVACY PROBLEM

blog article

Apr 09, 2018

Blockchain, with its encrypted and immutable record, will eventually be used create universal digital identities, filled with information that only we will control and that will link back to the issuing banks, governments or even employers. Fintech firms, software makers, telecom providers and other...

Read More

In Plain Sight: Why Military Veterans Are a Great Fit for Cybersecurity Careers IN PLAIN SIGHT: WHY MILITARY VETERANS ARE A GREAT FIT FOR CYBERSECURITY CAREERS

blog article

Apr 05, 2018

Cybersecurity is a major concern for businesses worldwide. Just look at the results from “The Third Annual Study on the Cyber Resilient Organization” by IBM and the Ponemon Institute: The 2018 study found 65 percent of security professionals believe the severity of cyberattacks has incre...

Read More

A Brief History of Malware — Its Evolution and Impact A BRIEF HISTORY OF MALWARE — ITS EVOLUTION AND IMPACT

blog article

Apr 05, 2018

A brief look at the history of malware shows us that this malicious menace has been with us since the dawn of computing itself. According to Scientific American, the idea of a computer virus extends back to 1949, when early computer scientist John von Neumann wrote the “Theory and Organization...

Read More

IBM X-Force Report: Fewer Records Breached in 2017 IBM X-FORCE REPORT: FEWER RECORDS BREACHED IN 2017

blog article

Apr 04, 2018

The 2018 IBM X-Force Threat Intelligence Index has found the number of records breached dropped nearly 25 percent in 2017, as cybercriminals shifted their focus on launching ransomware and destructive attacks that lock or destruct data unless the victim pays a ransom. Last year, more than 2.9 billio...

Read More

Crossing the watershed – digital skills crises will soon be history CROSSING THE WATERSHED – DIGITAL SKILLS CRISES WILL SOON BE HISTORY

blog article

Apr 04, 2018

There is no shortage of talent, only of employers who train that talent. Thirty years ago it took around 18 months turn a University Graduate into a competent analyst programmer. During that second year about 30% left for more money. Hence the reluctance to train and sporadic skills “crises&ld...

Read More

Annual Cybersecurity Report: Impacts on Government ANNUAL CYBERSECURITY REPORT: IMPACTS ON GOVERNMENT

blog article

Apr 03, 2018

In our just released 2018 Annual Cybersecurity Report: Impacts on Government, we found that cyber attacks against agencies across the U.S. are increasing every day. From ransomware and distributed denial of service (DDoS) to IoT botnets and cryptojacking, the mix of threats are also becoming more le...

Read More

Protective Layers – Cybersecurity for Healthcare PROTECTIVE LAYERS – CYBERSECURITY FOR HEALTHCARE

blog article

Apr 03, 2018

Layered defense is key to a successful Cybersecurity Strategy in Healthcare which starts with endpoint management. The number of internet connected (IoT) devices is exploding. In a healthcare setting, these “endpoint” devices not only provide significant new opportunities for improving p...

Read More

How CISMP can help your information security career HOW CISMP CAN HELP YOUR INFORMATION SECURITY CAREER

blog article

Apr 03, 2018

A career in information security management is very alluring: it’s rewarding, there’s a high demand for skilled professionals and it comes with a generous salary. All you need to do to get started is gain a Certificate in Information Security Management Principles (CISMP). CISMP provides...

Read More

WHAT DOES A CYBER THREAT HUNTER DO? WHAT DOES A CYBER THREAT HUNTER DO?

blog article

Apr 02, 2018

Learn about what a cyber threat hunter does in Data Protection 101, our series on the fundamentals of information security. The cyber threat hunter role is becoming increasingly important in the modern enterprise, as companies strive to stay ahead of the latest threats and implement rapid response t...

Read More

OPM tells agencies how to respond to cyber workforce needs OPM TELLS AGENCIES HOW TO RESPOND TO CYBER WORKFORCE NEEDS

blog article

Apr 02, 2018

The Office of Personnel Management released updated guidance to help agencies identify and address critical cybersecurity workforce needs. The document sets out a series of timelines detailing how agencies should identify and classify high-value IT and cybersecurity positions before developing actio...

Read More

What Changes Q1 Brought to Cybersecurity WHAT CHANGES Q1 BROUGHT TO CYBERSECURITY

blog article

Apr 02, 2018

So far, 2018 has brought a number of new trends to the cybersecurity space, some of which were predicted correctly and some were not. Mari Galloway, director of finance and communications at the Women's Society of Cyberjutsu looked at what Q1 brought us. The first quarter of 2018, what an intere...

Read More

Treat Security Data With the Same Purpose as Financial Data TREAT SECURITY DATA WITH THE SAME PURPOSE AS FINANCIAL DATA

blog article

Mar 30, 2018

Data is a precious and vehemently defended resource within financial organizations. In most instances, financial data must be verified for accuracy and the results are well documented, retained and accessible for reference at any time. Additionally, scenarios that result in high profitability or lar...

Read More

State of Software Security: Checking the Pulse of the Healthcare Industry STATE OF SOFTWARE SECURITY: CHECKING THE PULSE OF THE HEALTHCARE INDUSTRY

blog article

Mar 30, 2018

Over the past year, our scans of thousands of applications and billions of lines of code found a widespread weakness in applications, which is a top target of cyber attackers. And when you zoom in from a big picture view down to a micro-level, there are a few industries that are struggling to keep u...

Read More

Healthcare Cybersecurity Vulnerabilities HEALTHCARE CYBERSECURITY VULNERABILITIES

blog article

Mar 29, 2018

Do you know where your healthcare system is vulnerable?  As new technology and innovation continue to emerge in healthcare, vulnerabilities aren’t falling behind and pop up everywhere.  So, what can you do? To protect your organizations, first of all, you need to be aware of the most...

Read More

Banks in Denial over Their Resilience to DDoS attacks BANKS IN DENIAL OVER THEIR RESILIENCE TO DDOS ATTACKS

blog article

Mar 28, 2018

Are retail and investment banks in denial about being adequately protected from the frequent advanced DDoS attacks they’re getting hit with today? It is mid-March 2018 – just three months into the year and 3 major banks have already been taken offline by DDoS attacks, making global headl...

Read More

Key Findings of 2018 Cyber Threat Report and How Government Can Respond KEY FINDINGS OF 2018 CYBER THREAT REPORT AND HOW GOVERNMENT CAN RESPOND

blog article

Mar 28, 2018

Symantec’s 2018 Internet Security Threat Report is here. Based on data collected by Symantec’s massive security infrastructure (the largest civilian threat collection network in the world), the report has become the de facto standard for giving enterprises and public organizations essent...

Read More

NIST Cybersecurity Framework Series Part 3: Detect NIST CYBERSECURITY FRAMEWORK SERIES PART 3: DETECT

blog article

Mar 28, 2018

Enterprise chief information security officers have their work cut out for them in the current threat landscape. As attack and infection strategies become more complex and difficult to predict, the business’s CISO must ensure that the organization’s most critical information assets and t...

Read More

Push for Progress: Empowering Women in Cybersecurity With Voice, Vision and Innovation PUSH FOR PROGRESS: EMPOWERING WOMEN IN CYBERSECURITY WITH VOICE, VISION AND INNOVATION

blog article

Mar 27, 2018

International Women’s Day has come and gone, but that doesn’t mean the push for progress is over. All across the world — in industries far and wide — women were celebrated for their accomplishments on March 8. Here at IBM, women were asked to submit a video or photo to demons...

Read More

Strengthen Cybersecurity Through a United Industry STRENGTHEN CYBERSECURITY THROUGH A UNITED INDUSTRY

blog article

Mar 23, 2018

Every process requires detail, precision and collaboration. If all of the components of the process aren’t working together, it fails. And that can result in catastrophe. As an example, let’s consider a relatively simple machine and one of its primary components: the bicycle and, more sp...

Read More

A preview of the new NIST Cybersecurity Framework A PREVIEW OF THE NEW NIST CYBERSECURITY FRAMEWORK

blog article

Mar 23, 2018

The NIST Cybersecurity Framework has become the de facto set of guidelines for critical infrastructure organizations to assess information security risk and implement adequate cybersecurity measures to manage risk, while protecting consumer privacy. Since being published in February 2014, the framew...

Read More

Small Steps Towards a Secure IoT SMALL STEPS TOWARDS A SECURE IOT

blog article

Mar 21, 2018

A few weeks ago, the UK’s Department for Digital, Culture, Media and Sport, along with the National Cyber Security Centre, released a public draft of a new report into the security of IoT devices. The “Proposed Code of Practice for Security in Consumer IoT Products and Associated Service...

Read More

STOP. THINK. CONNECT.™ Partnership for Systemwide Information Security Awareness STOP. THINK. CONNECT.™ PARTNERSHIP FOR SYSTEMWIDE INFORMATION SECURITY AWARENESS

blog article

Mar 21, 2018

By becoming a STOP. THINK. CONNECT.™ partner, UC joined more than 700 organizations worldwide making a difference in online safety and cybersecurity. Several UC locations, as well as the systemwide Information Security Awareness Workgroup, were already using STOP. THINK. CONNECT.™ resour...

Read More

Did Microsoft admit that Surface Pro 4 Flickergate is a hardware problem? DID MICROSOFT ADMIT THAT SURFACE PRO 4 FLICKERGATE IS A HARDWARE PROBLEM?

blog article

Mar 21, 2018

The infamous problem with screen flicker and shaking on the Surface Pro 4 – a problem so ubiquitous it spawned the flickergate.com web site – may be nearing a resolution. Finally. I’ve been talking about the Surface Pro 4 flickering and shaking problem since October 2015. In April ...

Read More

The Top 5 Application Security Activities for GDPR Compliance - Part II THE TOP 5 APPLICATION SECURITY ACTIVITIES FOR GDPR COMPLIANCE - PART II

blog article

Mar 21, 2018

When looking at any modern application, one will find a myriad of components, frameworks, APIs and code snippets written by various developers inside and outside your organization. Not all of them are as secure as they should be, and not all of them default to the most secure protocol, design patter...

Read More

How to Get Vital Cybersecurity Messages to Resonate in Higher Ed HOW TO GET VITAL CYBERSECURITY MESSAGES TO RESONATE IN HIGHER ED

blog article

Mar 20, 2018

Higher education IT professionals want — and need — to keep students informed about cybersecurity breaches and loss prevention, but the message may not be getting through, according to a CDW survey of 250 IT staff and 300 students. Here’s one example of the disconnect: 82 percent o...

Read More

Decrypting JobCrypter DECRYPTING JOBCRYPTER

blog article

Mar 19, 2018

Ransomware has been a growing issue for some time now. It has evolved into a big business, moving millions of dollars yearly from victims’ pockets into those of attackers. The modus operandi of ransomware authors is to infect your machine through any vector (phishing, drive-by browser exploits...

Read More

Do IT Pros Consider Security When Purchasing Software? DO IT PROS CONSIDER SECURITY WHEN PURCHASING SOFTWARE?

blog article

Mar 19, 2018

Traditionally, security was about cost avoidance. It was thought of like insurance – something you have to have in case something bad happens, but not something that would boost the bottom line or attract customers. But in today’s environment, we are increasingly seeing that security is ...

Read More

8 questions to ask about your industrial control systems security 8 QUESTIONS TO ASK ABOUT YOUR INDUSTRIAL CONTROL SYSTEMS SECURITY

blog article

Mar 19, 2018

A recent incident where a likely nation-state threat actor inadvertently shut down a critical infrastructure facility in the Middle East when testing new malware has stoked widespread concerns about the vulnerability of industrial control systems (ICSs) to new cyberthreats. Many security experts see...

Read More

The US Cities that are Best at Password Security THE US CITIES THAT ARE BEST AT PASSWORD SECURITY

blog article

Mar 18, 2018

New research reveals the US cities that are best at password security, with Minneapolis topping the list. A study by password manager Dashlane scores cities based on several metrics, including average password strength and average number of reused passwords. Mess With Texas Things might be bigger in...

Read More

An introduction to the NIST Risk Management Framework AN INTRODUCTION TO THE NIST RISK MANAGEMENT FRAMEWORK

blog article

Mar 16, 2018

The Risk Management Framework (RMF) is a set of information security policies and standards for federal government developed by The National Institute of Standards and Technology (NIST). The RMF is covered specifically in the following NIST publications: The Risk Management Framework (RMF) is a set ...

Read More

Introducing CA Veracode Verified INTRODUCING CA VERACODE VERIFIED

blog article

Mar 15, 2018

Are you struggling to respond to customer and prospect concerns about the security of your application? Do you know what good application security looks like, or how to get there? CA Veracode is pleased to announce the CA Veracode Verified program. With CA Veracode Verified, you prove at a glance th...

Read More

Threat Hunting: Common Attack Vectors and Delivery Channels THREAT HUNTING: COMMON ATTACK VECTORS AND DELIVERY CHANNELS

blog article

Mar 12, 2018

It’s generally accepted that the best defense is a good offense. In cybersecurity terms that means taking a more proactive approach to catching our cyber adversaries. Cyber threat hunting is an effective method for searching your network for malware and other threats that have evaded tradition...

Read More

The cost of a cyber attack THE COST OF A CYBER ATTACK

blog article

Mar 09, 2018

With the risk of a cyber attack now being classed as the top threat to organisations, it’s vital to have the right cyber security measures in place to protect your organisation from an attack. It’s not just an organisation’s reputation that can be damaged by a data breach – t...

Read More

How to Prevent a Breach From Spring Break HOW TO PREVENT A BREACH FROM SPRING BREAK

blog article

Mar 08, 2018

Spring Break, the latest named vulnerability, is more serious than the moniker implies. Spring Break is a critical remote code execution vulnerability in Pivotal Spring REST, one of the most popular frameworks for building web applications, and the effects of this vulnerability are widespread. A pat...

Read More

Maturity models in cyber security: what MATURITY MODELS IN CYBER SECURITY: WHAT'S HAPPENING TO THE IAMM?

blog article

Mar 08, 2018

Most generally, a maturity model is a tool for assessing an organisation's effectiveness at achieving a particular goal. They enable organisations to identify where their practices are weak or not taken seriously and where their practices are truly embedded. In the context of cyber security, mat...

Read More

The Trends Are In: Cisco’s 2018 Cybersecurity Report THE TRENDS ARE IN: CISCO’S 2018 CYBERSECURITY REPORT

blog article

Mar 07, 2018

Recently, Cisco published the 2018 Annual Cybersecurity Report providing analysis and insights on the latest security trends and threats across the industry. John N. Stewart, Cisco’s Senior Vice President, Chief Security and Trust Officer captured the highlights in his latest blog, but I wante...

Read More

Morphisec Uncovers New Attack Vector Named CIGslip That Bypasses Microsoft Code Integrity Guard (CIG) MORPHISEC UNCOVERS NEW ATTACK VECTOR NAMED CIGSLIP THAT BYPASSES MICROSOFT CODE INTEGRITY GUARD (CIG)

blog article

Mar 07, 2018

Morphisec researchers Michael Gorelik and Andrey Diment have discovered CIGslip, a new method which can be exploited by attackers to bypass Microsoft’s Code Integrity Guard (CIG) and load malicious libraries into protected processes such as Microsoft Edge. The new attack vector manipulates the...

Read More

HOW QUICKLY WILL YOU RECOVER FROM A CYBER ATTACK? HOW QUICKLY WILL YOU RECOVER FROM A CYBER ATTACK?

blog article

Mar 07, 2018

Protecting your business emails is about more than just filtering out spam, malware, and business e-mail compromise emails. In the context of migrating to Microsoft Office 365 and other cloud-based systems, email becomes an even more critical lifeline for the business – and a broader cyber res...

Read More

AppSec Buyers’ Insights: Binary vs. Source Code Scanning APPSEC BUYERS’ INSIGHTS: BINARY VS. SOURCE CODE SCANNING

blog article

Mar 06, 2018

The discussion surrounding which is superior – binary or source code scanning – has plagued the static analysis market since its inception. A source code scanner analyzes un-compiled code, whereas a binary scanner analyzes compiled code, but in the end, the result is the same. They are s...

Read More

2018 SonicWall Cyber Threat Report: Actionable Intelligence for the Cyber Arms Race 2018 SONICWALL CYBER THREAT REPORT: ACTIONABLE INTELLIGENCE FOR THE CYBER ARMS RACE

blog article

Mar 06, 2018

Make no mistake, we are in a global cyber arms race. But it can’t be won alone: we are in this together. That is why SonicWall is passing along findings, intelligence, analysis and research from our SonicWall Capture Labs to you today in our 2018 SonicWall Cyber Threat Report. By sharing actio...

Read More

CRYPTOMINING GOLD RUSH ONE GANG RAKES IN $7M OVER 6 MONTHS CRYPTOMINING GOLD RUSH ONE GANG RAKES IN $7M OVER 6 MONTHS

blog article

Mar 05, 2018

The bloom is on the criminal cryptomining of computer resources and the reason is obvious – it’s lucrative. One cryptomining gang tracked by researchers over the past six months minted $7 million with the help of 10,000 computers infected with mining malware. The rise of malicious crypto...

Read More

3 STRATEGIES FOR WHEN MANAGEMENT DOESN’T GET THE IMPORTANCE OF INFORMATION SECURITY 3 STRATEGIES FOR WHEN MANAGEMENT DOESN’T GET THE IMPORTANCE OF INFORMATION SECURITY

blog article

Mar 05, 2018

The information security industry is broken. We talk about it all the time. There are things that happen constantly in our industry that put data (and people) at risk.  One of those things is management groups who don’t fully understand the importance of information security as a business...

Read More

Web-based attacks still reign supreme according to the EU Cybersecurity Agency WEB-BASED ATTACKS STILL REIGN SUPREME ACCORDING TO THE EU CYBERSECURITY AGENCY

blog article

Mar 02, 2018

Web-based attacks and malware do not just hold the cybercrime crown, but they’re on the rise — that’s according to the latest Threat Landscape Report by the EU Agency for Network and Information Security (ENISA). In its sixth annual report, ENISA also reported that in 2017 attacker...

Read More

Breach Costs Equifax $275 Million Dollars BREACH COSTS EQUIFAX $275 MILLION DOLLARS

blog article

Mar 02, 2018

March 2, 2018 — Equifax Inc said today that it expects $275 million in costs in 2018 related to the credit reporting company’s massive data breach last year, offset by $75 million in insurance proceeds. The costs mainly reflect technology and data security upgrades, legal fees, and the o...

Read More

U.S. cybersecurity threat risk remains high -- no signs of lessening U.S. CYBERSECURITY THREAT RISK REMAINS HIGH -- NO SIGNS OF LESSENING

blog article

Feb 27, 2018

The United States’ cybersecurity in both the public and private sectors is at continual risk, according to Director of National Intelligence (DNI) Daniel R. Coats. And the country should expect attacks from both nation state and non-state actors. Furthermore, the “potential for surprise&...

Read More

32 Cybersecurity Experts Predict Threats and Trends for 2018 32 CYBERSECURITY EXPERTS PREDICT THREATS AND TRENDS FOR 2018

blog article

Feb 26, 2018

Cybersecurity continues to be a hot topic in both media and business. The reasons are evident – the last two years saw consistent growth in cyber breaches with 2017 hitting a new record high. Namely, the recent 2017 Annual Data Breach Year-End Review by Identity Theft Resource Center revealed ...

Read More

My Cybersecurity Predictions for 2018 MY CYBERSECURITY PREDICTIONS FOR 2018

blog article

Feb 21, 2018

As BlackBerry’s Chief Security Officer, I regularly speak with Fortune 500 C-Suites and leaders representing the world’s top global brands, listening and learning about what security concerns keep them up at night. I also try to spend just as much time speaking with security researchers ...

Read More

Wireless Security: Why You Need to Take It Seriously In 2018 WIRELESS SECURITY: WHY YOU NEED TO TAKE IT SERIOUSLY IN 2018

blog article

Feb 13, 2018

When waves of cyber attacks hit last year, such as WannaCry and Not Petya ransomwares, businesses lost billions of dollars in high-profile breaches. In addition, more than half of the U.S. population’s Social Security information was compromised in the Equifax breach. It was a record-breaking ...

Read More

Cybersecurity Now a Priority in Fed Government’s Modernization Initiative CYBERSECURITY NOW A PRIORITY IN FED GOVERNMENT’S MODERNIZATION INITIATIVE

blog article

Feb 13, 2018

As the security needs of federal agencies change, the government’s modernization efforts will also require them to change how they think about cybersecurity. The federal government dedicates roughly 80 percent of its entire information technology (IT) budget to maintaining existing legacy syst...

Read More

Cyber Security Trends 2018 CYBER SECURITY TRENDS 2018

blog article

Feb 13, 2018

With 2017 remembered for massive data breaches, ransomware attacks and new-found vulnerabilities, we’ve asked Tim Erridge, Director of Advisory at Context, to look at what’s in store for the months ahead. With both the GDPR and the NIS Directive coming into effect in 2018, organizations ...

Read More

What’s shaping cybersecurity in 2018? WHAT’S SHAPING CYBERSECURITY IN 2018?

blog article

Feb 09, 2018

This year Cisco hosted the first CISO Experience at Cisco Live Barcelona, on 29 and 30 January. The event attracted over 60 Chief Information Security Officers (CISOs) and other senior security leaders, who discussed the topics that are shaping cybersecurity in 2018. In this first blog of the CISO E...

Read More

Malicious Trends: Cryptojacking Could Surpass Ransomware as Primary Money Maker MALICIOUS TRENDS: CRYPTOJACKING COULD SURPASS RANSOMWARE AS PRIMARY MONEY MAKER

blog article

Feb 07, 2018

Cryptocurrencies are hot. According to https://coinmarketcap.com, there are now over 1300 cryptocurrencies with new initial coin offerings (ICOs) accelerating all the time. Even Kodak is getting into the act with KODAKcoin. And currently, the price trajectory of Bitcoin is higher than a North Korean...

Read More

What Is Cyber Resilience and Why Should I Care? Part 1 WHAT IS CYBER RESILIENCE AND WHY SHOULD I CARE? PART 1

blog article

Feb 06, 2018

I’ll be the first to admit it - there’s a lot of acronyms, buzzwords, and catchphrases in the cybersecurity industry today and it can be difficult to understand how a product reflects the core values that give these words life. Take cyber resilience, for example, it’s often thought...

Read More

Missing in Action: Several Prominent Malware of 2017 MISSING IN ACTION: SEVERAL PROMINENT MALWARE OF 2017

blog article

Feb 06, 2018

Thus far in 2018, PhishMe Intelligence™ has observed a lull in multiple malware families that were prominent throughout 2017. There are several possible reasons for this hiatus. It is likely that some malware families have petered out and will not return in widespread campaigns. In sharp contr...

Read More

Advanced Security in All Sorts of Places ADVANCED SECURITY IN ALL SORTS OF PLACES

blog article

Feb 06, 2018

There’s a growing trend spreading through many different organizations in which automated and advanced security features are being developed, capabilities which were previously in the realm of more traditional security vendors. There’s now more security in more places than ever before, w...

Read More

Security and the $150B industry no one is talking about SECURITY AND THE $150B INDUSTRY NO ONE IS TALKING ABOUT

blog article

Feb 05, 2018

Think 2018 is IBM’s flagship conference where thinkers like you come together to innovate and educate—making the world of business work smarter. Together we will explore the journey to cloud and AI, blockchain, security, and Infrastructure discovering partnerships that unlock business an...

Read More

INFORMATION SECURITY NEWS ROUNDUP: JANUARY 2018 INFORMATION SECURITY NEWS ROUNDUP: JANUARY 2018

blog article

Feb 01, 2018

A new year means new developments in the world of information security news. We’ve already started to see some of Evan’s 2018 Information Security Predictions come true. The NSA is dealing with a shrinking talent pool as many employees jump to the private sector. Ransomware was one of th...

Read More

SUCCESS STORY: FLOWMON HELPS MSP TO DEAL WITH DDOS ATTACKS SUCCESS STORY: FLOWMON HELPS MSP TO DEAL WITH DDOS ATTACKS

blog article

Feb 01, 2018

Aspire, award-winning managed services company specialising in hosted services and data centre solutions started to become the victim of several large volumetric style DDoS attacks, aimed at both its network and the networks of its customers. Dealing with these attacks was a manual and time consumin...

Read More

2018 Industry Analyst Cybersecurity Predictions 2018 INDUSTRY ANALYST CYBERSECURITY PREDICTIONS

blog article

Jan 31, 2018

Key insights from top industry analysts to help demystify the cybersecurity landscape and reinforce critical areas of focus for organizations worldwide. Security services, IoT, integrated platforms, GDPR, skills shortage, detection and response, machine learning, automation and orchestration are jus...

Read More

The Rise of IoT Botnet Threats and DDoS attacks THE RISE OF IOT BOTNET THREATS AND DDOS ATTACKS

blog article

Jan 30, 2018

Earlier this month, a report by Neustar International Security Council (NISC) revealed that many businesses viewed unsecured IoT devices as their biggest concern about the state of their organisation’s security. While ransomware and financial data theft were still viewed as among the top threa...

Read More

SECURITY TRENDS 2018: THE TOP CYBERSECURITY COMPANIES SECURITY TRENDS 2018: THE TOP CYBERSECURITY COMPANIES

blog article

Jan 29, 2018

What makes a cybersecurity company the best?” is not an easy question to answer. It’s tough to identify the top cybersecurity companies when they aren’t going around telling consumers how many infections they missed or advertising how many breaches they allowed. There are dozens of...

Read More

Five cybersecurity threats to keep on your radar in 2018 FIVE CYBERSECURITY THREATS TO KEEP ON YOUR RADAR IN 2018

blog article

Jan 29, 2018

Criminal hackers are finding increasingly sophisticated ways to infiltrate cyber targets. In 2018, organizations can expect even more menacing, intense cyber attacks as threat actors seek new ways to target victims. Here are five cybersecurity threats to look out for. The IoT is becoming more widesp...

Read More

List of data breaches and cyber attacks in January 2018 LIST OF DATA BREACHES AND CYBER ATTACKS IN JANUARY 2018

blog article

Jan 29, 2018

The first list of 2018 is by no means a short one. In fact, this is one of the longest lists that I’ve ever put together. Thankfully, the total number of leaked records is far lower than previous months. Yay? I count this month’s total to be 7,073,069. If I have missed anything, please d...

Read More

In the United States will Create a Government Agency for Cybersecurity IN THE UNITED STATES WILL CREATE A GOVERNMENT AGENCY FOR CYBERSECURITY

blog article

Jan 29, 2018

The US House of Representatives passed a bill to establish an agency for cybersecurity and infrastructure security. The project was developed within 5 months and was supported by the majority of members of the House of Representatives. The creation of a new agency involves the reorganization of a nu...

Read More

So you want to be an ethical hacker? 21 ways to get started SO YOU WANT TO BE AN ETHICAL HACKER? 21 WAYS TO GET STARTED

blog article

Jan 28, 2018

The cyber security job market is experiencing a major workforce shortage. Millions of positions will be unfilled in the next few years as companies try to shore up their defenses against threat actors in our connected world. If you’re technically inclined, and if you’re willing to work h...

Read More

New Malware and Mirai Botnet Variants Pose Significant Threats NEW MALWARE AND MIRAI BOTNET VARIANTS POSE SIGNIFICANT THREATS

blog article

Jan 25, 2018

There is no shortage of malware on the Dark Web. In particular, during the past week security researchers from various points around the world have been talking about three threats, two of which are variants of the now infamous Mirai botnet code.

Read More

Small Businesses - Big Targets for Cyberattacks SMALL BUSINESSES - BIG TARGETS FOR CYBERATTACKS

blog article

Jan 24, 2018

Cybersecurity has become a complex undertaking, but too many small businesses have fallen so far behind the curve that a successful attack could seriously impact them. That level of cyber risk reflects the exposure of modern businesses to email security issues that still mean an entire company can b...

Read More

WHAT’S THE DIFFERENCE BETWEEN CYBERSECURITY AND CYBER RESILIENCE? WHAT’S THE DIFFERENCE BETWEEN CYBERSECURITY AND CYBER RESILIENCE?

blog article

Jan 23, 2018

While the term “cybersecurity” is as old as the hills in the security world, the term “cyber resilience” has been gaining momentum. This is a good thing. Cybersecurity management is complex and always changing, and focusing on security alone simply isn’t enough – ...

Read More

Just Keep Swimming: How to Avoid Phishing on Social Media JUST KEEP SWIMMING: HOW TO AVOID PHISHING ON SOCIAL MEDIA

blog article

Jan 22, 2018

Phishing attacks attempt to steal your most private information, posing major risks to your online safety. It’s more pressing than ever to have a trained eye to spot and avoid even the most cunning phishing attacks on social media.

Read More

DDoS Protection: a Big Need for Small Business DDOS PROTECTION: A BIG NEED FOR SMALL BUSINESS

blog article

Jan 22, 2018

Small businesses that are third party vendors to large businesses really have to step up their cyber security game to protect their networks, because large businesses are increasingly concerned about the quality of their network partners.

Read More

Information Security Advisory: 2018 InfoSec Predictions INFORMATION SECURITY ADVISORY: 2018 INFOSEC PREDICTIONS

blog article

Jan 22, 2018

2017 proved to be a challenging year on many fronts in the information security realm. The Equifax breach, WannaCry ransomware attacks, and Russian manipulation of social media were just some of the lowlights. How will 2018 pan out? Here are some thoughts from the Kroll Information Security team: Th...

Read More

Cybersecurity Trends: What to Expect in 2018 and Beyond CYBERSECURITY TRENDS: WHAT TO EXPECT IN 2018 AND BEYOND

blog article

Jan 17, 2018

The last year saw huge spikes in ransomware and threat actors have become even more proficient at lateral movement. Organizations aren't getting breached by advanced persistent threats specifically targeting them – at least for the most part. Opportunistic threat actors are taking advantag...

Read More

Mobile Security Threats of 2018 MOBILE SECURITY THREATS OF 2018

blog article

Jan 16, 2018

Mobile security is the topmost concern among the organizations today, thanks to mobility and BYOD (Bring Your Own Device). Most employees now routinely access corporate data from smartphones and tactfully keep sensitive information away from wrong hands. Now the truth is mobile malware are spreading...

Read More

PHISHING ATTACK PREVENTION: HOW TO IDENTIFY & AVOID PHISHING SCAMS PHISHING ATTACK PREVENTION: HOW TO IDENTIFY & AVOID PHISHING SCAMS

blog article

Jan 15, 2018

Phishing attacks are one of the most common security challenges that both individuals and companies face in keeping their information secure. Whether it's getting access to passwords, credit cards, or other sensitive information, hackers are using email, social media, phone calls, and any form o...

Read More

Are You Ready for the Evolution of Ransomware? ARE YOU READY FOR THE EVOLUTION OF RANSOMWARE?

blog article

Jan 15, 2018

With 2017 in the rearview mirror, we’re looking towards the changes a new year will bring. However, while the calendar may have changed, the threat of ransomware across industries and geographies has remained. And worse, it‘s looking like it’s about to evolve into an even greater p...

Read More

Mobile Threat Landscape: What to expect in 2018 MOBILE THREAT LANDSCAPE: WHAT TO EXPECT IN 2018

blog article

Jan 12, 2018

Last year, we witnessed more mobile attacks and data breaches than ever before. Ransomwares (like WannaCry, NotPetya…) have often made the headlines as their attacks increased by 300% in the first quarter of 2017 (Panda Lab), and globally, the volume of unknown malwares has quadrupled year-ov...

Read More

Top 10 Cybersecurity Tips for Businesses in 2018 TOP 10 CYBERSECURITY TIPS FOR BUSINESSES IN 2018

blog article

Jan 12, 2018

While your people are without a doubt the power behind your business, they can also be a weakness when it comes to cybersecurity. Organizations must protect against all types of threats – internal and external – and, the first step to doing this is understanding the basics of cybersecuri...

Read More

Top Seven Cybersecurity Predictions for 2018 TOP SEVEN CYBERSECURITY PREDICTIONS FOR 2018

blog article

Jan 11, 2018

With a turbulent 2017 finally behind us, what’s the cybersecurity forecast for 2018? Some predictions need no crystal ball – the cyber labor shortage will continue, spending on security solutions will go up, the breaches that do occur will be bigger and messier.

Read More

5 Cybersecurity Challenges and Trends: What to Expect in 2018 5 CYBERSECURITY CHALLENGES AND TRENDS: WHAT TO EXPECT IN 2018

blog article

Jan 10, 2018

Cybercriminals are going to create 3.5 million new, unfilled cybersecurity jobs by 2021. Compare that with one million openings in 2016. That’s an increase of 350 percent in just five years. And with that increase comes some serious cybersecurity revenue dedication. Everywhere, businesses are ...

Read More

The Healthcare / Cyber-Security Connection THE HEALTHCARE / CYBER-SECURITY CONNECTION

blog article

Jan 09, 2018

One of the businesses in the spotlight lately when it comes to cyber-attacks is healthcare – in fact, 46% of healthcare organizations experienced a data breach. The data associated with this industry is extremely sensitive and highly regulated, and also actively sought by hackers.

Read More

8 Cyber Security Predictions for 2018 8 CYBER SECURITY PREDICTIONS FOR 2018

blog article

Jan 09, 2018

In preparation for the upcoming publication of the 2018 Annual SonicWall Threat Report, we’re busy reviewing and analyzing data trends identified by SonicWall Capture Labs over the course of 2017.
The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector th...

Read More