5 mistakes hindering effectiveness of SIEM solutions: Learning from real-life cases
With a SIEM solution installed, the security department can think it’s time to grab some popcorn and watch the system perfectly dealing with all possible threats impending their networks. Ah,…
E-Recycling: Exploring the “End-of-Life” Issues for Connected Devices
A brief digest from the E-Scrap Conference & Trade Show 2019 Orlando, FL – What happens to our beloved tech devices when they die? Wouldn’t it be great if the…
Ransomware: Not Your Typical Threat
Lower Ransomware Risk with Education, Planning, and Relationship Building By Jon Leer, Writer, Leer Technical Communications, LLC Interviewed: John Galda, Director of Risk/Security at Charles River Development © Valerijs Novickis…
How to protect an enterprise from physical attacks
By Yana Yelina, Tech Journalist, EffectiveSoft Nowadays, none of the enterprises is immune to cyberattacks, data breaches, malware, and other types of damage. As a result, news about information leakage…
A Critical Part of a “Courtship”: Why M&As Must Address Cybersecurity from Day One
By David Barton, Chief Information Security Officer, Forcepoint At the height of merger-mania, eager participants frequently viewed cybersecurity as an afterthought. “Let’s just make this acquisition work,” they’d reason, “and…
Software Forensics: Beyond the Law
By Bill Graham, Technical Marketing Consultant, GrammaTech Introduction Traditionally, the term “forensics” is the use of science to discover evidence of criminal activity. Extending this to software broadens the use…
The Trials and Errors of Security Operations Revealed in New Report
By Roberto Sandoval, Manager, WW SIOC Strategic Solutions & Enablement, HPE Security The security industry is going through a volatile period. Threat actors are becoming bolder and evolving quickly, and…
How to Prevent Ransomware
By David Wood, Director of Global Sales at Chetu, Inc. Ransomware is one of the cruelest pieces of malware around. It makes it so you cannot access anything on your…
Genesee County Systems Pwned!
Systems Down By Charles Parker, II; Cybersecurity Lab Engineer There are vast numbers of municipalities of various sizes adjacent to each other throughout each state in the nation. Each of…
Investing In SIEM: How Your Business Can Improve Threat Detection and Response
By Chester Avey, Cyber Security Specialist, Independent. Despite continual advancements in security technologies to protect businesses from cyber threats, there remains no silver bullet to completely prevent breaches. And that’s…
Configuration Mistakes That Provide Field Days for Hackers
By Tim Bandos, Vice President of Cybersecurity at Digital Guardian Sometimes it’s the little things. In hindsight, more often than not, getting hacked can stem from a minor misstep or…
HiddenWasp and the Emergence of Linux-based Threats
By Intezer The Linux threat ecosystem is crowded with IoT DDoS botnets and crypto-mining malware. However, with low detection rates in nearly all leading anti-virus solutions, Linux threats pose new…