Monthly Archives: August 2019
Advanced Malware Detection – Signatures vs. Behavior Analysis
By John Cloonan, Director of Products, Lastline, Inc. Malware has threatened our computers, networks, and infrastructures since the eighties. It is constantly evolving, and deploying products that effectively detect it […]
Multi-Factor Authentication and Mobile Devices
Smart Security Makes Life Easier for Users…and Harder for Hackers By George Brostoff, CEO, SensibleVision Security is as much about deterrence as prevention. From the highest-clearance government servers to the […]
Veiled Vulnerability
AD By Charles Parker, II In this day, there are vulnerabilities throughout the environment. These are blatant with malicious websites and more camouflaged as with phishing and ransomware. With another […]
A new variant of Trickbot banking Trojan targets Verizon, T-Mobile, and Sprint users
A new Trickbot Trojan variant is targeting Verizon Wireless, T-Mobile, and Sprint users, confirming the evolution of the threat. TrickBot is a popular banking Trojan that has been around since October […]
NK is the new Iraq?
By Rodrigo Ruiz Referring to the television series Orange is the new black, I can not but consider it very convenient to blame the North Koreans for the worldwide incident […]
State Cyber security Regulation: Another Patchwork Approach?
By Jami Mills Vibbert with Venable LLP Until recently, state oversight of cybersecurity has been relatively limited. Indeed, although 48 of 50 states have laws related to data breach notification, […]
Trump’s Cyber security Executive Order: A Promising Start to Securing Digital Infrastructure…But Don’t Forget What’s Beyond the Firewall
By Lou Manousos, CEO, RiskIQ After some high-profile cyberattacks and information breaches, the cybersecurity posture of the U.S. government has never been more front and center in the public consciousness. […]
French Police remotely disinfected 850,000 PCs from RETADUP bot
The French police force, National Gendarmerie, announced to have neutralized the Retadup malware on over 850,000 computers taking over its C2 server. The French police force, National Gendarmerie, announced the successful […]
Lazarus: Data Leakage With Cryptographic System
By Rodrigo Ruiz & Rogério Winter You have most probably already received the recommendation or even the imposition of keeping a “strong password” in your applications. A strong password is […]
5 ways small businesses can be affected by a cyber security breach
By Asher de Metz A large-scale cybersecurity breach is hugely damaging for any organization, and with hackers becoming increasingly sophisticated, the chances of getting caught out are constantly growing. No […]
How context-aware security adds layers of protection to single sign-on services
By François Amigorena, CEO, IS Decisions Single sign-on, to the user, is a godsend. No more wasting time putting in passwords to individual sites or applications, no more trying to […]
What does your 2020 insider threat plan look like?
As we head into 2020, while it’s likely commonly acknowledged that every organization must take steps to mitigate risk, very few are prepared for threats that come from inside the […]
Apple released an emergency patch to address CVE-2019-8605 iOS flaw
Apple has released an emergency patch in iOS 12.4.1 that addresses the CVE-2019-8605 use-after-free vulnerability that allowed iPhone jailbreak. Recently, Apple accidentally unpatched a vulnerability it had already fixed, making current versions […]
Reducing the attack surface: how to empower your staff while keeping your network secure
By Pascal Bergeot is CEO of Goverlan Goverlan’s Pascal Bergeot considers what the recent Google Document hit means for remote workers and advises what companies need to do to reduce […]
The intelligent control systems and their perspectives
By Milica D. Djekic The current industry would deal with many intelligent and even smart mechatronics solutions. Also, those sorts of solutions would be used as part of smart homes, […]
Post-Quantum Information Security
By Hunter Bannister, East Carolina University As long as there is sensitive data there is always going to be another person out there who wants to have it which is […]
Part III: Current and Future IoT Threats
The relationship between IoT and Wi-Fi By Ryan Orsi, Director Product Management, WatchGuard Technologies In parts one and two of this series, I covered the importance of understanding the anatomy […]
The Risks (and Prevention) of Crime-as-a-Service in Healthcare
By Kurt Long, Founder, and CEO, FairWarning The recent study from the Brookings Institution detailing that 25 percent of hacking attempts will focus on healthcare data should serve as a […]
WannaCry ‘Remedies’: The Second Wave of Attacks
By Fernando Cuervo, Detect Monitoring Service Leader, Easy Solutions Since May 12th, over 200,000 victims in 150 countries have been hit by a massive, international ransomware cyber attack called WannaCry. […]
Yet Another Case for Viable Back-Ups and Testing
Mistakes Happen By Charles Parker, II InfoSec has the distinct tendency to be very taxing and stressful, at the most inopportune times, field to work in. There are the usual […]
Five tips for educating your employees on cyber security
By Asher de Metz Are you watching your employees closely enough? You may be surprised to know that your main concern when it comes to cybersecurity is not some external […]
Mastercard data breach affected Priceless Specials loyalty program
Mastercard disclosed a data breach that impacted customer data from the company’s Priceless Specials loyalty program. The American multinational financial services corporation notified the data breach to the German and Belgian Data […]
Is Your Company’s Data Being Sold on the Dark Web?
By Jerald (Trip) Nine Learn how Comodo can help you for free if any of your information is already for sale on the Dark Web. As companies scramble to find […]
The Internet of Things
Exchanging Convenience for Security By Daniel Jetton, VP Cyber Services, OBXtek, Inc. Prologue Picture this scenario. Recently, I purchased a smart grill, which automatically starts and heats up via an […]
Don’t Become Another Data Breach Statistic
7 tips from a security expert to implement now By Lee David Painter, CEO, Hypersocket Software Hardly a week goes by without a new data breach grabbing the headlines. Already […]
Hacking: Cheaper than a Nando’s chicken
By Jonathan Stock, Cyber Security Recruitment Consultant, IntaPeople. Now don’t get me wrong, hacking can be expensive, individuals or groups can sit in front of 200 computer screens with all […]
The challenges of interference within modern industrial systems
By Milica D. Djekic The new industrial revolution is known as the 4th generation of industrial systems would bring us a completely new approach to the industry’s assets. The 4th […]
WannaCry/Ransomware? Secure your Enterprise Using Blockchain-Enabled Cybersecurity
By Narayan Neelakantan, Co-Founder and CEO, Block Armour Ransomware has fueled a new wave of cybercrime against organizations. While ransomware targets both enterprises as well as individuals, the former offers […]
The CIO discuss information security leadership
By Mr. Suer Recently, I got to ask members of the CIOChat about their CISO colleagues. To be fair, this was an above-board and positive discussion. And their guidance should […]
Don’t be an Easy Target
7 Ways to Keep Your Server Secure By Michael Ryan, CEO, South River Technologies Keeping corporate servers safe is a constant concern for IT professionals. Typically, the first step in […]