Data Availability: Laying the Digital Foundation for a More Intelligent Business
Building strong digital foundations that focus on data availability will be vital to the future of every organization. They must implement effective intelligent data management strategies that help them be…
How to Prevent Ransomware
By David Wood, Director of Global Sales at Chetu, Inc. Ransomware is one of the cruelest pieces of malware around. It makes it so you cannot access anything on your…
Genesee County Systems Pwned!
Systems Down By Charles Parker, II; Cybersecurity Lab Engineer There are vast numbers of municipalities of various sizes adjacent to each other throughout each state in the nation. Each of…
Configuration Mistakes That Provide Field Days for Hackers
By Tim Bandos, Vice President of Cybersecurity at Digital Guardian Sometimes it’s the little things. In hindsight, more often than not, getting hacked can stem from a minor misstep or…
HiddenWasp and the Emergence of Linux-based Threats
By Intezer The Linux threat ecosystem is crowded with IoT DDoS botnets and crypto-mining malware. However, with low detection rates in nearly all leading anti-virus solutions, Linux threats pose new…
Effectively Using Email Authentication Standards for Stronger Message Integrity
By Jeff Stein, Information Security Architect, Reputation.com Once known as electronic mail and used for simple but near-instantaneous communication between computers, email has evolved to be used for a variety…
DDOS as a Distraction
How to Recognize Linked Network Attacks By Sarah Katz, Cyber Security Specialist Given the highly dynamic nature of cyberspace, the threat landscape changes every day. As new risks emerge, both…
The Malware Research Insights
By Milica D. Djekic The malware by itself is any piece of malicious code that is capable to cause damage to the current IT configuration. The malicious applications could function…
Slow Response Times to Blame for Phishing Attack Success on Organizations
By Atif Mushtaq, CEO, and founder, SlashNext Phishing poses a looming vulnerability for many enterprises today because the attackers have upped their game. They can now set up and take…
The Storm after the Breach
How Consumers and Institutions Should Guard against Cybertheft By Archie Agarwal, CEO & founder, ThreatModeler Data breaches and cyberattacks have been hitting several of the highest-profile financial and media institutions…
Hybrid Offenses as a Current Security Concern
By Milica D. Djekic When we say an offense we would mean any kind of criminality being a transnational crime, human trafficking or act of terrorism. In its essence, any…
September Patch Tuesday
Updates are Light, But Ransomware Attacks Escalate By Chris Goettl, Director of Product Management, Security, Ivanti September marks the second month in a row with a relatively light set of…