Malware

Qualys IOC EDR Indication of Compromise

Effective Cybersecurity Requires Threat Intelligence and Comprehensive Visibility

Qualys is a sponsor of TechSpective Technology and cybersecurity are constantly changing and evolving—as are the tools, techniques and processes used by cyber attackers. Just because something may have been relatively effective once upon a time doesn’t necessarily mean it […]

Effective Cybersecurity Requires Threat Intelligence and Comprehensive Visibility Read More »

Inner Circle podcast hosted by Tony Bradley TechSpective

Mikko Hyppönen Discusses When It’s OK to Respond to a Cyber Attack with Missiles

Inner Circle Podcast Episode 039 If a nation state launches a cyber attack against another nation state, is it acceptable to retaliate by launching missiles and engaging in a physical response? Or should cyber attacks only be met with a

Mikko Hyppönen Discusses When It’s OK to Respond to a Cyber Attack with Missiles Read More »

IT security cybersecurity

Understanding the Difference Between IT and Cyber Security

IT and cybersecurity are fundamental components of any company’s data security plans. Although used interchangeably, there are differences between how these terms are defined and what they involve. IT (information technology) security refers to protecting data and information systems from

Understanding the Difference Between IT and Cyber Security Read More »

DNS hijacking cybersecurity

PayPal, Netflix, Gmail, and Uber Users among Targets in New Wave of DNS Hijacking Attacks

Since March 29, 2019, Ixia’s Application and Threat Intelligence (ATI) center has been tracking the latest malicious campaign against consumer-grade routers. Today, April 5th, we captured a new wave of attacks that use a different DNS server. The purpose of

PayPal, Netflix, Gmail, and Uber Users among Targets in New Wave of DNS Hijacking Attacks Read More »

cloud security cybersecurity McAfee

Top Cloud Security Steps Every Business Needs to Keep up with the Evolution of Security

Organizations of all sizes and across all segments know that transitioning to cloud services is vital to innovation, growth, and competitive advantage. They are well aware that they can’t afford to slow down the progress of their digital transformation. And,

Top Cloud Security Steps Every Business Needs to Keep up with the Evolution of Security Read More »

machine learning exploit detection recursive neural network

Using Machine Learning to Reduce False Positives

Today’s threat landscape is massive and expanding at an alarming rate—especially given the explosion of mobile devices, hybrid cloud environments, DevOps, and containers. Organizations of all sizes, and across all industries, struggle to keep up with the volume of legitimate

Using Machine Learning to Reduce False Positives Read More »

Scroll to Top