With ransomware attackers having already launched attack code with themes ranging from horror movies and Pokemon to Hitler to cats, it was only a matter of time before they decided to beam Star Trek's Kirk and Spock direct to would-be victims' PCs.
While attackers continue to innovate, traditional intrusion prevention systems (IPS) have stood still, generating low-value alerts for security teams as attackers slip past in pursuit of high-value targets. Organizations have countered by piling more and more equipment on the network hoping to solve the problem....
Making the right decisions about how to deploy Office 365 can be a show-stopper, particularly as you consider branch office and remote user connectivity. Each Office 365 user generates between 12 and 20 persistent connections. Each connectivity option, ExpressRoute, hub-and-spoke or direct-to-Internet, deals with this...
What if you had a secret weapon that provided the visibility and context you need to make a quick judgment about the severity of an alert and more important, understand the context of what was going on before and after that alert?
With metadata, you do. Rich metadata can answer many questions about what's happening...
BitSight Technologies has just concluded a new study that rates the cybersecurity performance of Fortune 1000 enterprises. What are the key takeaways? Data Scientist Jay Jacobs shares his analysis.
One significant point: Despite the rash of high-profile breaches and the reality that organizations are dedicating...
When it comes to cybersecurity there are two major vulnerability components - the human and the network. Humans and hardware defined networks are hard to change and secure. With the right software and protocols, securing the network is doable for government agencies.
The cloud is a network of servers housing data, software, and services. Cloud services are commonly accessed via the Internet, instead of locally in a data center. Keeping your data safe requires forward-thinking approaches to cybersecurity.
Download this whitepaper to learn how you can augment your existing...
As challenging as ransomware has proven to be against so many organizations across regions and sectors, certain characteristics actually can help defenders gain an edge at detecting malware. Lastline's Engin Kirda explains how.
"Ransomware is a threat that needs to be taken seriously," says Kirda, cofounder and chief...
A federal watchdog agency review of the Massachusetts Medicaid information security program identified weaknesses that appear to be common at government agencies as well as healthcare organizations. What key vulnerabilities were identified?
As effective as ransomware has proven to be in attacks against so many organizations across regions and sectors, certain characteristics actually can help defenders gain an edge in detecting malware. Lastline's Engin Kirda explains how.
The rapid evolution of malware and proliferation of solutions have created a state of chaos for security leaders, says Naveen Palavalli of Symantec. What strategy and solutions will help restore order to anti-malware defense?
Feeding this sense of chaos is the sheer amount of malware being created, says Palavalli,...
FireEye's Mandiant investigative unit is seeing a revival in tried-and-true hacking techniques, ranging from social engineering to the snatching of OAuth tokens. Why are these old techniques still working?
Historically, the only way organizations could come close to capturing high-fidelity data about what's happening on their network was to invest in a packet capture system.
That's so yesterday.
Full packet capture systems were never designed to facilitate the detection or investigation of advanced threat actors....
In this white paper, Fidelis Cybersecurity will outline key steps to take in the first 72 hours of detecting an alert, how to distinguish what type of incident you are facing and the key differences on how to respond. Based on our firsthand experience, we provide lessons learned from the front lines to explain why it...
Canadian authorities narrowly escaped a data breach by stopping an intrusion at the country's statistics agency. The cyberattack used a zero-day vulnerability in Apache Struts 2, which has now been patched.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.