Analysis of Cybercrime Infrastructure

Proofpoint security researchers have published an analysis that exposes the inner workings of a cybercrime operation targeting online banking credentials for banks in the United States and Europe. This Proofpoint research report provides a detailed and rarely seen inside view of the infrastructure, tools and techniques that enabled this cybercrime group to infect over 500,000 PCs.

Spotlight

Glocomms

Glocomms exists to enable technology-driven careers. Each and every day, we play our part in advancing the emerging technology industry by working with smart people with choices to contribute to cutting-edge technology for our clients. We believe, through our existing network and our ability to leverage our scientifically-driven recruitment model, we are able to deliver exceptional talent to our clients with both speed and accuracy.

OTHER WHITEPAPERS
news image

XDR vs. SIEM: A Cybersecurity Leader’s Guide

whitePaper | December 27, 2022

As threats intensify and SecOps teams are called upon to defend digital environments that keep growing in size and complexity, and with a defensible perimeter that has all but disappeared, cybersecurity vendors are responding with a new generation of software and service solutions.

Read More
news image

Cyber Risk Appetite: Defining and Understanding Risk in the Modern Enterprise

whitePaper | January 16, 2020

Managing risk is a balancing act for organizations of all sizes and disciplines. While some organizations take on too much risk, others arguably do not take on enough. Complicating this equation is the emergence of cyber as one of the most impactful sources of risk in the modern enterprise. In fact, cyber security is now increasingly reviewed by corporate boards of directors and often discussed with financial analysts who see cyber security risk as an imminent and paramount business risk. Because the consequences of cyber security failures can be damaging to business revenues and brand reputation, CEOs have lost their positions as a result of data breaches and inept preparation and planning.

Read More
news image

Cyber security considerations 2022

whitePaper | September 12, 2022

The threat landscape is expanding. Cybercriminals are as entrepreneurial as ever and using increasingly sophisticated tools and technologies. In this fluid environment, we believe Chief Information Security Officers (CISOs) and their teams should adopt a mindset of enablement — cyber security is no longer just about prevention.

Read More
news image

Closing the Human Error Gap in Cybersecurity

whitePaper | June 23, 2023

The increasing reliance on digital technology has made cybersecurity a critical concern for organizations worldwide. While technological advancements have provided businesses with unprecedented opportunities, they have also exposed them to a myriad of cyber threats. In this context, human error has emerged as a significant vulnerability. While an overwhelming majority of the human error related wrong decisions are unintentional, they can happen to anyone. This whitepaper aims to provide a comprehensive approach to closing the human error gap in cybersecurity, focusing on both cybersecurity awareness training and proactive security measures that minimize the need for users to be cyber smart.

Read More
news image

Awesome Cyber Security Facts - Infographic

whitePaper | November 15, 2019

Check out our "Awesome Cyber Security Facts" infographic below to see how crucial cyber security attack was for some businesses, what are our main weaknesses in terms of personal cyber security and even more.

Read More
news image

Cloud Privilege Broker 22.1 Security Whitepaper

whitePaper | September 15, 2022

There is complete end-to-end encryption from BeyondInsight with Cloud Privilege Broker through to the Cloud Platform Infrastructure. Cloud Privilege Broker services communicate with each other through distributed queues over TLS encryption.

Read More

Spotlight

Glocomms

Glocomms exists to enable technology-driven careers. Each and every day, we play our part in advancing the emerging technology industry by working with smart people with choices to contribute to cutting-edge technology for our clients. We believe, through our existing network and our ability to leverage our scientifically-driven recruitment model, we are able to deliver exceptional talent to our clients with both speed and accuracy.

Events