Malware

Inner Circle podcast hosted by Tony Bradley TechSpective

Mikko Hyppönen Discusses When It’s OK to Respond to a Cyber Attack with Missiles

Inner Circle Podcast Episode 039 If a nation state launches a cyber attack against another nation state, is it acceptable to retaliate by launching missiles and engaging in a physical response? Or should cyber attacks only be met with a

Mikko Hyppönen Discusses When It’s OK to Respond to a Cyber Attack with Missiles Read More »

IT security cybersecurity

Understanding the Difference Between IT and Cyber Security

IT and cybersecurity are fundamental components of any company’s data security plans. Although used interchangeably, there are differences between how these terms are defined and what they involve. IT (information technology) security refers to protecting data and information systems from

Understanding the Difference Between IT and Cyber Security Read More »

DNS hijacking cybersecurity

PayPal, Netflix, Gmail, and Uber Users among Targets in New Wave of DNS Hijacking Attacks

Since March 29, 2019, Ixia’s Application and Threat Intelligence (ATI) center has been tracking the latest malicious campaign against consumer-grade routers. Today, April 5th, we captured a new wave of attacks that use a different DNS server. The purpose of

PayPal, Netflix, Gmail, and Uber Users among Targets in New Wave of DNS Hijacking Attacks Read More »

cloud security cybersecurity McAfee

Top Cloud Security Steps Every Business Needs to Keep up with the Evolution of Security

Organizations of all sizes and across all segments know that transitioning to cloud services is vital to innovation, growth, and competitive advantage. They are well aware that they can’t afford to slow down the progress of their digital transformation. And,

Top Cloud Security Steps Every Business Needs to Keep up with the Evolution of Security Read More »

machine learning exploit detection recursive neural network

Using Machine Learning to Reduce False Positives

Today’s threat landscape is massive and expanding at an alarming rate—especially given the explosion of mobile devices, hybrid cloud environments, DevOps, and containers. Organizations of all sizes, and across all industries, struggle to keep up with the volume of legitimate

Using Machine Learning to Reduce False Positives Read More »

cybersecurity predictions IoT security smart city security

Cybersecurity Professionals Weigh In On What to Expect in 2019

2019 is underway. Two weeks down, fifty to go. Technology continues to evolve rapidly and the threat landscape is constantly shifting. It’s challenging for organizations to try and stay a step ahead of cybercriminals and break out of the cycle

Cybersecurity Professionals Weigh In On What to Expect in 2019 Read More »

Scroll to Top