January 2014 NY Info Security Meetup - spotflux

| April 26, 2016

article image
spotflux - There are few companies out there that care about your privacy. At spotflux our passion is to fight this trend, and to enhance the overall internet experience for our users. We love the internet as much as you do, and believe that there should be someone looking out for you. That's our goal.

Spotflux officially launched in March 2012 at SXSW. Co-founders Chris Naegelin and Dean Mekkawy were high school friends and techies during the 1990's when the internet was a much friendlier place. In 2011, after working in the "real world" for almost a decade, Dean and Chris decided that it was time to bring back some sanity to the internet and give people a choice when it comes to privacy online. Starting with just a few servers in Chris's basement, spotflux was born, and the two of them set off to build a beta client that amassed over 100,000 users in just a few months. Today, spotflux is a lean venture backed startup that continues to grow at exponential rates as people seek to reclaim their privacy online.

Spotlight

Clarium Managed Services

Clarium is the cybersecurity company that offers the full spectrum of breach prevention down to where it counts, the endpoint – with prevention delivered to your company via the cloud. We are a certified service provider and specialist for Palo Alto Networks Traps™ advanced endpoint protection service and its’ WildFire™ cloud-based threat analysis service, the industry’s most advanced analysis and prevention engine for highly evasive zero-day exploits and malware.

OTHER ARTICLES

The British government thinks process sensor cyber issues are real – what about everyone else

Article | February 16, 2020

When Joe refers to analogue devices, he is generally referring to ISA99 / IEC 62443 Level 0 devices, i.e. the sensors and actuators required in any cyber physical system. The vulnerability of these devices is often ignored as the security measures required to protect them are not purely technical but also involve physical and personnel security aspects along with process security (both of the metrology and processing by the device, as well as configuration management and control issues over the lifecycle of analogue devices). The security situation is not helped by the simplistic application of the triad of security goals (confidentiality, integrity and availability) to cyber physical systems.

Read More

CISOS PARTICIPATE IN CYBER WARGAMES TO HONE RANSOMWARE RESPONSE PLANS WITH EC-COUNCIL

Article | March 2, 2020

EC-Council, leading global information security certification body, conducted a table-top, cyber wargame among top cybersecurity executives in Tampa, Florida. The sold-out session, “CISO wargame,” included 27 senior executives from the largest managed IT service providers in the United States. The event presented the security experts with a simulated incident where an organization is hit by a ransomware attack. Participants had to work to contain the damage of the attack, which grew more complicated as the 4-hour exercise unfolded. Participants were tasked with deciding whether to pay a ransom and use ransom negotiators as well as to communicate with employees, stockholders, and the media about the breach.

Read More

A COVID-19 Cybersecurity Poll: Securing a Remote Workforce

Article | March 17, 2020

As the coronavirus pandemic continues to sweep the globe, and cities and states impose social-distancing measures, businesses are sending their users home to work. And this massive, unprecedented shift to distance working brings with it a whole new set of cybersecurity challenges. For instance, a lack of IT resources can bite many organizations as they move to enable remote strategies. And when workers and students are sent outside the normal perimeter, managing device sprawl, and patching and securing hundreds of thousands of endpoints, becomes a much a bigger challenge. Threatpost editors wanted to learn more about challenges and best practices from the IT and security professionals on the front lines of this. Please take a few minutes to take the Threatpost poll. The answers will be collected the results will be published in an article later this week.

Read More

Guide to Cloud Security Certification: Which Ones Are the Best of the Best?

Article | April 27, 2021

As your organization looks to move to cloud computing, security certification will become more critical. Cloud solutions have unique security considerations that are different from an on-premise solution. IT professionals that are managing these solutions should be well-versed in multi-layered protection, encryption, monitoring, and more. Not only is certification important for your own IT staff, but it should also be part of your recruiting strategy. Experience combined with certifications can be invaluable foclr protecting your cloud environment. You want to ensure that the data you store in the cloud is protected from security threats.

Read More

Spotlight

Clarium Managed Services

Clarium is the cybersecurity company that offers the full spectrum of breach prevention down to where it counts, the endpoint – with prevention delivered to your company via the cloud. We are a certified service provider and specialist for Palo Alto Networks Traps™ advanced endpoint protection service and its’ WildFire™ cloud-based threat analysis service, the industry’s most advanced analysis and prevention engine for highly evasive zero-day exploits and malware.

Events