With the emergence of new technologies, unexpected competitors and rapidly shifting customer needs, the challenges of today’s businesses are countless. Meanwhile, the threats to network security are greater than ever and – as demonstrated by many high-profile news stories over the past few years – can have a major impact on daily operations.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

AZORULT CAMPAIGN ADOPTS NOVEL TRIPLE-ENCRYPTION TECHNIQUE

thraetpost | February 03, 2020

news image

A recent wave of AZORult-laced spam caught the attention of researchers who warn that malicious attachments associated with the campaign are using a novel obfuscation technique, in an attempt to slip past spam gateways and avoid client-side antivirus detection. What makes this campaign unique is the use by threat actors of a triple-encrypted AZORult downloader being pushed by the otherwise non-descript malspam assault. AZORult is remote access trojan popular on Russian forums and most recently s...

Read More

DATA SECURITY

SYNACK LAUNCHES AN APP STORE EXPERIENCE FOR MORE FLEXIBLE, SMARTER CYBERSECURITY SOLUTIONS

Synack | October 20, 2021

news image

Synack, the premier crowdsourced platform for on-demand security expertise, today is giving customers the easiest, most flexible and most innovative approach for deploying critical cybersecurity solutions to defend against today's digital threats. Synack Campaigns empowers organizations with on-demand access to a community of 1,500 skilled and trusted ethical hackers to perform a range of tasks, from targeted security checks to cloud configuration assessments. Customers ...

Read More

STOP MEASURING YOUR CYBERSECURITY IN TERMS OF BUDGET

DCMS | May 11, 2020

news image

Almost every month there is a new report detailing how firms are increasing their cybersecurity budgets, or buying the latest tech to help defeat hackers. The typical way that companies have looked to improve their cyber capabilities is by investing in the...

Read More

DATA SECURITY

MITRE INVENTION TO TEST CYBERSECURITY PRODUCTS AGAINST DATA ENCRYPTION RISKS, SUCH AS RANSOMWARE

MITRE Engenuity | March 17, 2021

news image

Miter Engenuity will survey business cybersecurity items' capacity to identify the danger presented by the gatherings normally known as Sandworm and Wizard Spider, both of whom have utilized information encryption as a vital component of their attacks. Applications for assessment are accessible through May 28. Examiners accept that Sandworm utilized information encryption to cause more than $10 billion in harm to industry in attacks with its NotPetya malware. The gathering is ...

Read More
news image

AZORULT CAMPAIGN ADOPTS NOVEL TRIPLE-ENCRYPTION TECHNIQUE

thraetpost | February 03, 2020

A recent wave of AZORult-laced spam caught the attention of researchers who warn that malicious attachments associated with the campaign are using a novel obfuscation technique, in an attempt to slip past spam gateways and avoid client-side antivirus detection. What makes this campaign unique is the use by threat actors of a triple-encrypted AZORult downloader being pushed by the otherwise non-descript malspam assault. AZORult is remote access trojan popular on Russian forums and most recently s...

Read More
news image

DATA SECURITY

SYNACK LAUNCHES AN APP STORE EXPERIENCE FOR MORE FLEXIBLE, SMARTER CYBERSECURITY SOLUTIONS

Synack | October 20, 2021

Synack, the premier crowdsourced platform for on-demand security expertise, today is giving customers the easiest, most flexible and most innovative approach for deploying critical cybersecurity solutions to defend against today's digital threats. Synack Campaigns empowers organizations with on-demand access to a community of 1,500 skilled and trusted ethical hackers to perform a range of tasks, from targeted security checks to cloud configuration assessments. Customers ...

Read More
news image

STOP MEASURING YOUR CYBERSECURITY IN TERMS OF BUDGET

DCMS | May 11, 2020

Almost every month there is a new report detailing how firms are increasing their cybersecurity budgets, or buying the latest tech to help defeat hackers. The typical way that companies have looked to improve their cyber capabilities is by investing in the...

Read More
news image

DATA SECURITY

MITRE INVENTION TO TEST CYBERSECURITY PRODUCTS AGAINST DATA ENCRYPTION RISKS, SUCH AS RANSOMWARE

MITRE Engenuity | March 17, 2021

Miter Engenuity will survey business cybersecurity items' capacity to identify the danger presented by the gatherings normally known as Sandworm and Wizard Spider, both of whom have utilized information encryption as a vital component of their attacks. Applications for assessment are accessible through May 28. Examiners accept that Sandworm utilized information encryption to cause more than $10 billion in harm to industry in attacks with its NotPetya malware. The gathering is ...

Read More