Latest Blog Posts

Fb15a82ed0e5badeb14a485b672f0787

Conceptual and Technical Challenges in Multi-cloud Security

August 30, 2018 Added by:Zohar Alon

Becoming an expert with one cloud platform takes a lot of time and working with multiple clouds at the same time is more difficult and can make teams prone to errors.

Comments  (0)

760f8b3ac86e3ac286c6e0d4bdd9a039

How Full Admin Rights Could Pose a Threat to Your Business

August 28, 2018 Added by:Andrew Avanessian

Having unrestricted admin rights in place poses a significant risk of privilege escalation attacks and lateral movement.

Comments  (0)

4b07a2ec18add0e3dda7f96842143f05

Why the World Needs Disruptive, Effective, Modern Cyber Protection

August 28, 2018 Added by:Boris Vaynberg

Companies need to look for a solution that strengthens their cyber defenses dramatically by preventing attacks before they enter and harm their organization, their customers and their brand.

Comments  (0)

21ebb461b9add7173e8e69f62ef440b4

When a Regulators’ Visit Can Be the Least of Your Worries

August 28, 2018 Added by:Jesse Canada

Companies today have a huge task on their hands with the sheer volume of red tape to demonstrate compliance.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

"Dark Tequila" Campaign Targets Users in Mexico

August 27, 2018 Added by:Ionut Arghire

A series of cyberattacks attempting to steal financial information and login credentials from Mexican users, that hve been ongoing for at least five years, Kaspersky Lab says.recently discovered complex malicious campaign has been

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Most SMBs Not Equipped to Handle Security Concerns: Study

August 06, 2018 Added by:Ionut Arghire

Most small and medium businesses (SMBs) are not equipped to handle IT security concerns and distribute security responsibilities across other roles, a recent Untangle survey reveals.

Comments  (0)

A98c8f7dbb46467b790e2ac1fbbd3f50

Cryptojacking – More than a Nuisance, It Poses a Serious Threat to Data Centers

August 02, 2018 Added by:Liviu Arsene

Pre-execution security technologies coupled with core antimalware technologies can effectively detect and not just block the cryptojacking payload, but also prevent the attack from occurring.

Comments  (0)

211571f3e14099fd9a6c172426982ca5

Changing Security Behaviors Via a Top Down Approach

August 02, 2018 Added by:Perry Carpenter

When it comes to changing behaviors and building better security hygiene, the role of the leader is not only critical, but it is the impetus to change.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Amnesty International Targeted with NSO Group Spyware

August 01, 2018 Added by:Ionut Arghire

An Amnesty International staff member was recently targeted with spyware linked to the infrastructure previously associated with Israel surveillance vendor NSO Group.

Comments  (0)

23cdc45f8cc85a3009e56cf5bd89a095

Plug Your Cloud Cybersecurity Holes

July 26, 2018 Added by:Marie Hattar

Threat detection and analytics are only as effective as the granularity the network infrastructure provides for packet access.

Comments  (0)

0b8e9d7009308c174e700bcaf89c4474

Criminal Cyberattacks Are Up. Can Automated Security Help Bring Them Down?

July 26, 2018 Added by:James Lee

Companies that still rely on manual processes – security tools that require frequent tuning or manual CVE patching, for example – fare worse if they are breached.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

U.S. Now Leads by Number of DDoS Botnet C&C Servers

July 25, 2018 Added by:Ionut Arghire

The United States was the top region by number of distributed denial of service (DDoS) botnet command and control (C&C) servers in Q2 2018, Kaspersky Lab reports.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Singapore Health Database Hit by 'Major' Cyberattack

July 20, 2018 Added by:Mike Lennon

Singapore’s Ministry of Health (MOH) said that a Singapore Health Services (SingHealth) database containing patient data, including personal information on Prime Minister Lee Hsien Loong, was hit by a “major” cyberattack.

Comments  (0)

0b8e9d7009308c174e700bcaf89c4474

Q3 Oracle CPU Preview: Fewer Java SE Patches May Not Mean Fewer Flaws

July 16, 2018 Added by:James Lee

The July 2018 quarterly Oracle Critical Patch Update (CPU) is expected to set a new two-year high for total Oracle product patches.

Comments  (0)

A98c8f7dbb46467b790e2ac1fbbd3f50

Memory Protection beyond the Endpoint

July 16, 2018 Added by:Liviu Arsene

Re-engineering security solutions to fit the new infrastructure, performance, and scalability needs of organizations is crucial as advanced threats often exploit security blind spots.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Intent Based Networking: Turning Intentions into Reality

July 16, 2018 Added by:Avishai Wool

Professor Avishai Wool, CTO and co-founder of AlgoSec, examines the potential of Intent-Based Networking and how it can improve network security.

Comments  (0)


« First < Previous | 1 - 2 - 3 - 4 - 5 | Next > Last »