Making the Business Case for Web Isolation

Making | April 4, 2019

article image
The business case for any security system has an assumption that something fails. The cost of a failure includes fines and remediation efforts but also less obvious ones such as lost productivity and the loss of public trust in your brand. This white paper, Making the Business Case for Web Isolation examines these costs and demo

Spotlight

VirtualArmour

VirtualArmour is a managed security services provider that delivers solutions to help enterprises build, monitor, manage, maintain and secure their networks from cloud to core. VirtualArmour focuses on cultivating a short list of best-in-breed industry and technology partners and products then providing the highest levels of expertise and knowledge around them. This enables VirtualArmour to build, design, deploy and manage solutions for customers that are affordable, highly reliable, scalable, and backed by thorough and unrivaled knowledge of the related technologies, products, and platforms. VirtualArmour was founded in 2001 by a team of networking and security industry experts on the premise that MSSP’s were not delivering comprehensive and effective solutions for today’s IT challenges. Our services run 24/7/365 by leveraging highly trained engineers through our primary NOC located in Littleton, Colorado and our Secondary NOC located in Middlesbrough UK.

OTHER ARTICLES

Guide to Cloud Security Certification: Which Ones Are the Best of the Best?

Article | April 27, 2021

As your organization looks to move to cloud computing, security certification will become more critical. Cloud solutions have unique security considerations that are different from an on-premise solution. IT professionals that are managing these solutions should be well-versed in multi-layered protection, encryption, monitoring, and more. Not only is certification important for your own IT staff, but it should also be part of your recruiting strategy. Experience combined with certifications can be invaluable foclr protecting your cloud environment. You want to ensure that the data you store in the cloud is protected from security threats.

Read More

How much do behavioural biometrics improve cyber security?

Article | February 19, 2020

Experts often consider biometrics security the next big thing in cyber security. It encompasses a broad category that includes verifying a person's fingerprint, iris, gait and other factors that should be unique to the person checked. However, various tests proved that some biometric-based security has substantial room for improvement For example, researchers have hacked into smartphones that have fingerprint scanners by pressing the print of the rightful owner into a piece of Play-Doh and holding that impression against the reader. What those results indicate is that people should not assume that biometrics options are a foolproof choice for cyber security needs.

Read More

A COVID-19 Cybersecurity Poll: Securing a Remote Workforce

Article | March 17, 2020

As the coronavirus pandemic continues to sweep the globe, and cities and states impose social-distancing measures, businesses are sending their users home to work. And this massive, unprecedented shift to distance working brings with it a whole new set of cybersecurity challenges. For instance, a lack of IT resources can bite many organizations as they move to enable remote strategies. And when workers and students are sent outside the normal perimeter, managing device sprawl, and patching and securing hundreds of thousands of endpoints, becomes a much a bigger challenge. Threatpost editors wanted to learn more about challenges and best practices from the IT and security professionals on the front lines of this. Please take a few minutes to take the Threatpost poll. The answers will be collected the results will be published in an article later this week.

Read More

New Ransomware hitting Industrial Control Systems like a nuclear bomb

Article | February 10, 2020

Researchers at security firms including Sentinel One and Drago’s have been mystified by a piece of code named Ekans or Snake, over the last month. Drago’s publically released its full report on Ekans Ransomware that has recently inflicted Industrial Control Systems and these are some of the most high-value systems that bridge the gap between digital and physical systems. In the history of hacking, only a few times a piece of malicious code has been marked attempting to intrude Industrial Control Systems. Ekans is supposed to be the first Ransomware with real primitive capability against the Industrial Control Systems, software, and hardware used in everything from oil refineries to power grids. Researchers say this ransomware holds the capability to attack ICS by Honeywell and GE as well.

Read More

Spotlight

VirtualArmour

VirtualArmour is a managed security services provider that delivers solutions to help enterprises build, monitor, manage, maintain and secure their networks from cloud to core. VirtualArmour focuses on cultivating a short list of best-in-breed industry and technology partners and products then providing the highest levels of expertise and knowledge around them. This enables VirtualArmour to build, design, deploy and manage solutions for customers that are affordable, highly reliable, scalable, and backed by thorough and unrivaled knowledge of the related technologies, products, and platforms. VirtualArmour was founded in 2001 by a team of networking and security industry experts on the premise that MSSP’s were not delivering comprehensive and effective solutions for today’s IT challenges. Our services run 24/7/365 by leveraging highly trained engineers through our primary NOC located in Littleton, Colorado and our Secondary NOC located in Middlesbrough UK.

Events