Author Description

Gary M

Author Posts

It’s Tax Season…for Cryptocurrency

Cryptocurrency has much to do with information security.  There’s electronic commerce implications – remember Overstock.com was the…

Meeting the Threat in 2019: Cybersecurity for Retail Companies

Envisioning a Future of Prevention By Megan Berkowitz Though it was not disclosed for roughly a year,…

Federal Shutdown is No Holiday for Identity Thieves

by Yan Ross, ICFE Director of Special Projects As the federal shutdown enters its second month without…

Armor Detects and Neutralizes 681 Million Cyber Attacks Launched at its Cloud Customers in 2018

Armor, a leading global cloud security provider, reported that during 2018 it detected and neutralized over 681…

Detecting Persistent Cloud Infrastructure/Hadoop/YARN Attacks Using Security Analytics

By Oleg Kolesnikov of the Securonix Threat Research Team The Securonix Threat Research Team has been actively investigating and…

Prioritization to Prediction: Getting Real About Remediation.

Getting Real About Remediation In an ideal world, security teams would patch every vulnerability as soon as…

Huge Data Breach Now Uncovered: Collection #1

Collection #1 dump, 773 million emails, 21 million passwords The popular cyber security expert Troy Hunt has…

DarkHydrus adds Google Drive support to its RogueRobin Trojan

Security experts attributed new malicious campaigns to the DarkHydrus APT group (aka Lazy Meerkat), threat actors used…

Four Methods for Encrypting Sensitive Data in a Cloud Environment

The scale of organizations moving their business processes to a hybrid or cloud environment continues to grow…

The Inevitability of Cyber Crime

Think of all the ways you could be a victim of a crime. Do you register any…

Show Buttons
Hide Buttons