While attackers continue to innovate, traditional intrusion prevention systems (IPS) have stood still, generating low-value alerts for security teams as attackers slip past in pursuit of high-value targets. Organizations have countered by piling more and more equipment on the network hoping to solve the problem....
Making the right decisions about how to deploy Office 365 can be a show-stopper, particularly as you consider branch office and remote user connectivity. Each Office 365 user generates between 12 and 20 persistent connections. Each connectivity option, ExpressRoute, hub-and-spoke or direct-to-Internet, deals with this...
What if you had a secret weapon that provided the visibility and context you need to make a quick judgment about the severity of an alert and more important, understand the context of what was going on before and after that alert?
With metadata, you do. Rich metadata can answer many questions about what's happening...
This monthly Security Agenda will highlight some of the most recent additions to our course library. March's edition features Former Federal CISO
Gregory Touhill giving a "Cyber State of the Union." Other industry influencers like Retired RSA Chair Art Coviello, FBI Cyber Division Supervisory Special Agent Jay...
The business of the cyberattack has matured into a billion dollar industry. Forrester even predicts the devastating effects of a cyberbreach will lead to the failure of a Fortune 1000 company in 2017 (Predictions 2017: Cybersecurity Risks Intensify, November 2016, Forrester). Extortion-based attacks like ransomware...
As challenging as ransomware has proven to be against so many organizations across regions and sectors, certain characteristics actually can help defenders gain an edge at detecting malware. Lastline's Engin Kirda explains how.
"Ransomware is a threat that needs to be taken seriously," says Kirda, cofounder and chief...
As effective as ransomware has proven to be in attacks against so many organizations across regions and sectors, certain characteristics actually can help defenders gain an edge in detecting malware. Lastline's Engin Kirda explains how.
Hackers have been targeting the likes of AOL and Yahoo, in part, because a certain generation of users - including many senior U.S. officials - continue to use the services to send and store state secrets. Let's make sure future generations don't make similar mistakes.
In this white paper, Fidelis Cybersecurity will outline key steps to take in the first 72 hours of detecting an alert, how to distinguish what type of incident you are facing and the key differences on how to respond. Based on our firsthand experience, we provide lessons learned from the front lines to explain why it...
Little is known about Evgeniy M. Bogachev, the alleged hacker and Gameover Zeus botnet mastermind. There are clues, however, that he's been helping Russian intelligence agencies, according to a new report. If true, that wouldn't be a surprise.
Security product testers have architectured their test suites to adhere to the technologies of the past 10 years. However, as endpoint security and the threat landscape continue to evolve, so must testing suites evolve as well. Advanced methodologies and a more robust testing criteria are essential to keep...
A look at the return of the Crypt0L0cker ransomware leads the latest edition of the ISMG Security Report. Also, assuring the security of medical devices; and U.S. federal prosecutors drop charges against a child porn suspect rather than reveal the hacking technique used to ensnare him.
Crypt0L0cker ransomware - originally tied to the Gameover Zeus gang - has returned, researchers warn, and in some cases is digitally signed to make it appear legitimate. Other attack campaigns are spreading Cerber and Sage Locker via spam emails sent via short-lived domain names.
The notion of "next-gen" is now promoted by some providers of endpoint security software as a way to improve the efficacy of protecting endpoints from compromise, given the prominent role endpoints play in cybersecurity attacks, the ways in which mobility and cloud apps have expanded the attack surface area, and the...
High-profile, targeted attacks from malicious actors now occur with frightening and increasing regularity. This evolution of advanced threats overwhelms both IT organizational bandwidth and the capabilities of legacy antivirus tactics, particularly as the increasing number of endpoint devices used by employees expands...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.