APT (Advanced Persistent Threats)

Laptop

Cybersecurity: What You Need to Know for 2016

2015 was quite a year! Hacks and ransomware got personal. APT attacks and cybercrime-as-a service became widespread. The scary future of IoT hacking became a reality with the demonstration of self-driving car hacks. And, a new threat vector of mobile devices […]

Cybersecurity: What You Need to Know for 2016 Read More »

Holidays

‘Tis the season for holiday hackers

The holidays are a wonderful time of year, but ‘Tis the Season’ now has a double meaning for both holiday festivities and malicious malware scamming. Malware has been a popular topic of discussion from a movie studio’s network being hacked,

‘Tis the season for holiday hackers Read More »

binary fingerprint Cylance

The bad guys are probably already inside your network

Organizations and IT security professionals spend a lot of time focusing on guarding against external threats–building up the defensive wall that keeps internal systems and data safe from outside attackers. Those efforts are all well and good, but miss the

The bad guys are probably already inside your network Read More »

shattered glass

TalkTalk breached by ‘significant and sustained’ hack

TalkTalk–a London-based phone and broadband company–has been breached by hackers. The attack could possibly have compromised sensitive data on all of its 4 million customers. A TalkTalk spokesperson called it a “significant and sustained” attack. I know it’s almost the

TalkTalk breached by ‘significant and sustained’ hack Read More »

Lizard Stresser

Top 3 trends in today’s threat landscape

Every day there seems to be a new malware threat that we hear about, from remotely controlling cars and medical equipment, to attacks on well-known security vendors such as Kaspersky Lab and Bitdefender. Each threat seems to be bigger and

Top 3 trends in today’s threat landscape Read More »

Office of Personnel Management

The OPM data breach was probably inevitable

Breaches big and small have been in the news, from small organizations losing banking files to global groups like Sony losing seemingly everything to hackers. But with the recent Office of Personnel Management (OPM) hack that was revealed recently, with

The OPM data breach was probably inevitable Read More »

hospital operating room

How can hospitals protect their medical equipment from malware?

The challenges in protecting hospitals from cyber attacks are very similar to those faced in ICS and SCADA environments; the equipment used in hospitals is not user-serviceable and therefore often running out-of-date software or firmware. This creates a dangerous situation

How can hospitals protect their medical equipment from malware? Read More »

Big data analytics leads the way for next-gen malware protection

With advancements in technology Internet security threats have increased manifold as cyber criminals have managed to invade systems with innovative malware agents. They use sophisticated and deceptive cyber-attack technologies that are not recognized by traditional antivirus methods. To spot such

Big data analytics leads the way for next-gen malware protection Read More »

Cylance

New threats need a new approach to cyber defense

At one point you could defend a kingdom by creating a moat–a small man-made river–around the castle. A moat offers little–if any–protection today. Attacks evolve over time, so defense must also adapt and evolve to remain effective. The same is true

New threats need a new approach to cyber defense Read More »

Scroll to Top