Multi-factor Authentication Implementation Options
“2FA to 5FA – What are the options available?” By David Smith Independent Consultant at Smart Card Institute At some point of time, we have all used an OTP (One-time…
How Real-Time Asset Intelligence Enables Full Posture Control
By Ellen Sundra, VP of Americas Systems Engineering, Forescout Technologies The massive growth of devices hitting our networks is not a secret or a new discussion. We have all seen…
Why “Cloud Security 101” Isn’t So Simple After All
By Josh Stella, co-founder, and CTO of Fugue The term “cloud misconfiguration” may not seem like an adequate term to describe the leading cause of cloud data breaches. It connotes…
Advanced Malware Detection – Signatures vs. Behavior Analysis
By John Cloonan, Director of Products, Lastline, Inc. Malware has threatened our computers, networks, and infrastructures since the eighties. It is constantly evolving, and deploying products that effectively detect it…
Multi-Factor Authentication and Mobile Devices
Smart Security Makes Life Easier for Users…and Harder for Hackers By George Brostoff, CEO, SensibleVision Security is as much about deterrence as prevention. From the highest-clearance government servers to the…
Lazarus: Data Leakage With Cryptographic System
By Rodrigo Ruiz & Rogério Winter You have most probably already received the recommendation or even the imposition of keeping a “strong password” in your applications. A strong password is…
Kaspersky report: Malware shared by USCYBERCOM first seen in December 2016
The malware samples shared by USCYBERCOM last week were first detected in December 2016 in attacks attributed to Iran-linked APT33. Last week the United States Cyber Command (USCYBERCOM) uploaded to…
Hackers target Drupal servers chaining several flaws, including Drupalgeddon2 and DirtyCOW
Hackers targeted Drupal web servers chaining some known vulnerabilities, including Drupalgeddon2 and DirtyCOW issues. Security experts at Imperva reported an attack against Drupal Web servers running on Linux-based systems. Hackers exploited the Drupalgeddon2 flaw…