Monthly Archives: May 2019
Microsoft Patch Tuesday addresses dangerous RDS flaw that opens to WannaCry-like attacks
Microsoft Patch Tuesday updates for May 2019 address nearly 80 vulnerabilities, including an RDS flaw allowing WannaCry-Like attacks. Microsoft Patch Tuesday updates for May 2019 address nearly 80 vulnerabilities, including […]
The Attribution Problem – Using PAI to Improve Actor Attribution
By Brian Pate, SVP, Babel Street Within the cyber community, conventional wisdom is that malicious actors can carry out attacks while hiding their true identities. Historically, analysts and investigators have […]
Why CIOs/CISO’s Positions Are Becoming More Challenging
By Gamal Emara, Country Manager – UAE at Aruba, a Hewlett Packard Enterprise company It’s your worst possible nightmare. A hacker has breached the company’s network and shut down its […]
The Hottest Career on the Block
By Nick Galov Our world is changing fast. Thirty years ago, you left school, choose a potential career path, and worked towards earning the appropriate qualification. You’d then find work […]
The Critical Role TAPs Play in Network Security and Resiliency
By Alastair Hartrup, CEO, Network Critical Networks continue to be under persistent attack. As a matter of fact, according to CyberEdge’s 2019 Cyberthreat Defense Report, the percentage of organizations breached […]
WhatsApp zero-day exploited in targeted attacks to deliver NSO spyware
Facebook fixed a critical zero-day flaw in WhatsApp that has been exploited to remotely install spyware on phones by calling the targeted device. Facebook has recently patched a critical zero-day […]
Is Your Encryption Flexible Enough?
Introducing the XOTIC™ Crypto System By Richard Blech, CEO, Secure Channels Inc. Introduction The science of modern cryptography utilizes mathematics as the basis for transforming information into an encoded secret […]
The Role of Security Appliances in SD-WAN Adoption
By Brendan Patterson, Vice President of Product Management at WatchGuard Technologies SD-WAN is one of the hottest networking technologies, and as we head into 2019 its growth is only expected […]
May Patch Tuesday
Be Aware of Skype for Android Vulnerability and Windows Error Reporting Elevation of Privilege Vulnerability by Chris Goettl, Director of Product Management, Security, Ivanti Looks like a busy, but pretty […]
Data Sniffing is Threatening Your Personal IoT. Here’s a Workaround
By William J. Tomlinson, Ph.D., Senior Member of the Technical Staff at Draper The human body is becoming a node in the Internet of Things, and that may be creating […]
Security breach suffered by credit bureau Equifax has cost $1.4 Billion
Equifax revealed its earnings release related to the security breach suffered in 2017, the incident has cost about $1.4 billion plus legal fees. Equifax revealed this week its earnings release related to […]
Why Cyber Defense in the Power Industry is so Unique
By Gowri Rajappan, Director of Technology and Cybersecurity at Doble Engineering Company Every organization connected to the internet is at risk of being the victim of a cyber attack. In […]
Standardizing Security: Mitigating IoT Cyber Risks
(Part II of an II Part Series) By Daniel Jetton, Vice President of Cyber Services, OBXtek And Carter Simmons, Deputy Program Manager, OBXtek Introduction In the first part of this […]
Over 100 flaws in management and access control systems expose buildings to hack
Security researcher Gjoko Krstic from Applied Risk discovered over 100 vulnerabilities that expose buildings to cyber attacks. Security researcher Gjoko Krstic from Applied Risk discovered over 100 vulnerabilities in management […]
Empower your Kid with Cyber security
Train Your Lil-champ to be a Cyber Warrior By Devin Smith, Marketing Director, ReviewsDir We, as parents always want the best for our kids; we want them to learn everything […]
86% of Cyber security Professionals Expect to Move In 2019, there’s One Way to Fight against It
A people first approach to security is critical for success but it seems challenging and sometimes daunting. By Karl Sharman, Vice-President, BeecherMadden Human error is the number one cause of […]
It’s all about the Logs
Looking into Your Past Will Secure Your Network’s Future By Gary Brown, Principal Consultant/CISO, Mosaic451 We see it repeatedly. The newly installed CISO or CIO installs the latest blinky-box in […]
The Privileged Account Security and the Internet of Things
By Milica D. Djekic The Internet of Things (IoT) literarily flooded the marketplace and some statistics would suggest that so soon every single person in the world would deal with […]
More than a Buzzword: Survey Reveals Cyber Threat Intelligence Trends
By Corin Imai, Senior Security Advisor, DomainTools Cyber Threat Intelligence (CTI), the collection and analysis of information about current and potential cyber-attacks and attempts, has evolved significantly in recent years. […]
Two Steps on – One Step Back
By Milica D. Djekic Repeating is the mother of knowledge, the ancient Latin saying would suggest. Further, the Chinese proverb would tell – Practice leads to great skill or Practice […]
4 Signs Your Organization is a Good Cyber Attack Target, and What to Do about It
By Nathan Burke, CMO, Axonius By now we’re all well aware of the transformative technologies accelerating across the enterprise today. Trends like cloud, virtualization, BYOD, work-from-home, mobile devices, and IoT […]
The Internet of Things Signal Transmission Challenges
By Milica D. Djekic The Internet of Things (IoT) is a quite fast growing landscape and it’s so important to understand why its safety and security matter. That technology would […]
Network Traffic Analysis (NTA)
By Timothy Liu, CTO & Co-Founder, Hillstone Networks Network Traffic Analysis (NTA) was first created and defined by Gartner as an emerging category of security solutions that use network communications […]
LightNeuron, a Turla’s backdoor used to compromise exchange mail servers
Russia-linked APT group Turla has been using a sophisticated backdoor, dubbed LightNeuron, to hijack Microsoft Exchange mail servers. Russia-linked APT group Turla has been using a sophisticated backdoor, dubbed LightNeuron, […]
Zero Trust Security
Security for the Cloud-Native Era By Amir Sharif, Co-founder at Aporeto Cybercrime on the Rise Every day, hackers succeed at gaining access to the well-protected systems. Adversaries are more skilled […]
On Security and Privacy, States Are Taking the Lead
By Andrea Little Limbago, Chief Social Scientist, Virtru When Toyota announced the second data breach of the year, initial signs pointed to the group OceanLotus, a Vietnamese-linked state-sponsored espionage group. […]
Phishing Awareness – The More They Know, the Less the Threat
By Matthew Goodwin In this paper, I will be going over what phishing email attacks are and how end-user training can help secure an organization against such attacks. In my […]
Reflecting on April Patch Tuesday
Updates This Month from Microsoft, Adobe, Wireshark, Oracle and Opera By Chris Goettl, Director of Product Management, Security, Ivanti Ever wonder why there are so many updates in April? I […]
Your Security Teams are Destroying Critical Evidence
Why Stopping Siloed Attacks is No Longer Enough By Erik Randall, Security Engineer, Exabeam Gone are the days of smash-and-grab cyberattacks: Cybercrimes are now sophisticated sequences that take place over […]
Enterprise Insider Threats on the Rise
New report finds 59 percent of organizations have experienced at least one insider attack in the last 12 months By Rich Campagna, CMO, Bitglass With news of hacking incidents, new […]