Monthly Archives: March 2019
Get your organization “Privilege Ready”
by Morey Haber, CTO, BeyondTrust People are organizations’ most valuable resource. But they can also be its greatest vulnerability, especially when armed with weak credentials, all-too-powerful privileged accounts, and security […]
New study reveals widespread security vulnerabilities in popular apps
by Dr. Krisztina Pusok, director for research & public policy at the American Consumer Institute It’s becoming easier than ever for consumers to unknowingly download potentially damaging applications onto their […]
DMSniff POS Malware has flown under the radar for at least four years
Malware researchers at Flashpoint revealed that at least since 2016, a PoS malware dubbed DMSniff has flown under the radar. Malware researchers at Flashpoint revealed that since 2016, a PoS […]
8 Cyber security tips For SMBs
By Sherie Raymond, the data security writer, and editor at Origin Writings It is a common story. A small to medium business believes that no one will hack them – […]
State of SOAR Report: Security teams feel human capital crunch as alerts grow
By Rishi Bhargava Today’s business landscape is a delicate balancing act between technological advancement and security. Workplace changes and technological innovations have made it easier to do business and live […]
Cyber security awareness month
Mind the Gap: Cultivating the Next Generation of Cyber Talent by Angie Lienert, President & CEO of IntelliGenesis, LLC There are currently 350,000 open cybersecurity positions in the U.S. […]
Microsoft Patch Tuesday updates for March 2019 patches two Windows flaws exploited in targeted attacks
Microsoft Patch Tuesday updates for March 2019 address 64 flaws, including two Windows zero-day vulnerabilities exploited in targeted attacks. Microsoft Patch Tuesday updates for March 2019 address 64 vulnerabilities, including […]
Some Countermeasures to cyber attacks
by Milica D. Djekic Cyber incidents are something that would occur so frequently and it’s not the question if anyone would be breached, but rather when that would happen. In […]
How SMBs can prepare for California’s new data privacy law
by Ari Vared, Senior Director of Product, CyberPolicy On June 28, 2018, California legislators passed one of the toughest data privacy laws in the country. Targeting tech companies like Amazon, […]
Attack methodologies in practice
by Milica D. Djekic Many would believe that the attack methodologies got so complicated in practice. The case is that the skillful hacker would certainly know how to take advantage […]
NETSCOUT ANALYSIS: FACEBOOK OUTAGE
Users around the world experienced an hours-long Facebook and Instagram outage today. The NETSCOUT Threat Intelligence team has investigated the source of the outage and observed the following: “At approximately […]
Vulnerability research hub Crowdfense is willing to pay $3 Million for iOS, Android zero-day exploits
World-leading vulnerability research hub Crowdfense is offering up to $3 million for full-chain, zero-day exploits for iOS and Android. Vulnerability research firm Crowdfense is offering up to $3 million for […]
March 2019 – Patch Tuesday Analysis
As March Patch Tuesday landed I happened to be in a room full of IT Admins talking about best practices for patch management. One of those best practices happened to […]
The safe progress
by Milica D. Djekic Since the 18th century and the first steam engine over the 19th and 20th century and the beginning of electrification unless the end of the 20th […]
6 Things to check before selecting a cyber security score
by Doug Clare, FICO Most cybersecurity experts agree it is no longer a matter of if, but simply a matter of when your organization will become the victim of a […]
How to internally respond after a breach
by Nik Whitfield, CEO, Panaseer There is no such thing as 100% secure. Frustrating for security professionals, but a fact of life as it’s now not about if but about […]
Crooks use The Pirate Bay to spread PirateMatryoshka malware via reputed seeders
Crooks are abusing the torrent website The Pirate Bay to distribute the PirateMatryoshka malware that fuels the victim’s PC with unwanted software. Crooks abusing torrent services to distribute malware is […]
Vulnerabilities in car alarm systems exposed 3 million cars to hack
Security experts at Pen Test Partners discovered several vulnerabilities in two smart car alarm systems put three million vehicles globally at risk of hack. The flaws could be exploited by […]
The Cyber Risk Handbook – Creating and Measuring Effective Cybersecurity Capabilities
Free eBook: “The Cyber Risk Handbook – Creating and Measuring Effective Cybersecurity Capabilities ($43 Value) FREE For a Limited Time” This resource is the practitioner’s guide to implementing, measuring and […]
SaaS DNS Security: Are you Protected?
By Kanaiya Vasani, Executive Vice President, Products and Corporate Development at Infoblox Is Software as a Service (SaaS) security solutions truly the panacea they are publicized to be? The answer […]
How Organizations Should Choose a Load Balance for Managing and Securing Application Traffic in the Cloud
By Kamal Anand, Vice President and General Manager, Cloud Business Unit at A10 Networks Load balancing of application traffic has been around for a long time. But, as more organizations move […]
Shattered! Security in a Fragmented World of Workloads
By Satyam Tyagi, Director Product Management, ColorTokens Inc. Look at me, I’m in tatters! Don’t you know the crime rate is going up, up, up, up, up? To live in […]
Software Should Come with a “Nutrition” Label
By Tae Jin “TJ” Kang, CEO, Insignary, Inc. During the latter half of the 18th Century and throughout the 19th Century, the Industrial Revolution fundamentally changed the geographical, political and […]
Phishing in the Dark: Employee Security Gaps Are Growing
By Atif Mushtaq, CEO of SlashNext Phishing is often equated with phishing emails containing malware attachments or links to malicious sites. However, as email security solutions improve and phishing awareness […]
Overcoming Software Security Issues Caused by the Third-Party Software Procurement Model
By Tae Jin “TJ” Kang As software becomes more sophisticated, organizations of all sizes continue to harness its capabilities to transform their go-to-market strategies and streamline their operations. Whether the […]
Prioritizing Security in a Multi-Cloud World
By Scott Manson, Managing Director, Middle East & Turkey, McAfee Cloud awareness and adoption continues to grow, as more enterprises take advantage of the benefits that come with multiple cloud […]
Operation Eligible Receiver – The Birth Place of Cyber security: Configurations
By Josh Paape More than twenty years ago, the National Security Agency conducted an exercise to test the response capabilities of critical Department of Defense information systems in the case […]
Why Wi-Fi Hacking Will Persist Despite WPA3
By Ryan Orsi, Director Product Management, WatchGuard Technologies In 2017, the famed Key Re-installation Attack or “Krack” attack shocked the world by defeating WPA2 encryption. As a result, the Wi-Fi […]
Want to Secure Your Endpoints? Go Beyond the Endpoint
By Jai Balasubramaniyan, Director of Product Management, ColorTokens Inc. Traditional endpoint security control has always been about malware, threat analysis, and remediation. However, it is useless for an endpoint to […]
Changing the Economics of Responding to Cyber Attacks in the Healthcare Sector
By John Attala, Director, North America, Endace The healthcare sector has been and continues to be under attack. As long as malicious criminals and hackers have the upper hand in […]