Latest Blog Posts

Ffc4103a877b409fd8d6da8f854f617e

2016 SecurityWeek CISO Forum to Take Place on June 1-2 at Half Moon Bay

May 26, 2016 Added by:InfosecIsland News

SecurityWeek’s 2016 CISO Forum will take place on June 1-2, 2016 at the Ritz Carlton, Half Moon Bay.

Comments  (0)

B261bfcc99f93249e275ddd135ffec57

Avoiding Ransomware with Strong Endpoint Security

May 26, 2016 Added by:Dean Dyche

Ransomware attacks are growing in volume and sophistication. To best defend against ransomware, users must ensure that their machines remain up to date with the latest patches and security updates.

Comments  (0)

7a381426c4258d879207e4550cc28f12

Making the Most of User Entity Behavior Analytics: Expectations, Features and Best Practices

May 24, 2016 Added by:Brian Soldato

User Entity Behavior Analytics (UEBA) platforms are very promising. In the near future, expect to see user behavior analytics platforms integrate more directly with infrastructure and with automated response.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

“EITest” Exploit Kit Redirection Campaign Running Strong

May 22, 2016 Added by:InfosecIsland News

A long-lasting website infection campaign meant to redirect users to exploit kits (EKs) such as Angler and Neutrino continues to run strong roughly one year and a half after being originally discovered.

Comments  (0)

A2f01e8907594a5cc33b21086a702036

Baiting the Phishermen: When Companies Strike Back at Scammers (Do Not Try This at Home)

May 16, 2016 Added by:Steven Rogers

It is never too late to remind employees about phishing emails and where to route suspicious finds.

Comments  (0)

B0b557cb2e5eb9c6304d00a8a61a9d34

Cloudflare vs Tor: Is IP Blocking Causing More Harm than Good?

May 10, 2016 Added by:Peter Zavlaris

To some, the Tor network is believed to be a haven for threat actors, as well as a platform for launching web based attacks.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Malvertising Hits Top Celebrity News Site

May 10, 2016 Added by:Ionut Arghire

Malvertising, the malicious activity that involves spreading malware via online advertising, has been trending up over the past few years, and 2016 might become a record-breaking year for it, Cyphort Labs researchers suggest.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Threat Hunting is the New Black in Security: Report

May 09, 2016 Added by:Ionut Arghire

Allowing organizations to identify and mitigate network vulnerabilities as early as possible, threat hunting is a new trend in enterprise security, recently released SANS Institute research reveals.

Comments  (0)

591c39c65cf5c298ccd0f1cd5818e961

Cloud Security Can’t Be Ignored Anymore, Thanks to Millennials

May 09, 2016 Added by:Vanishree Rao

Thanks to digital preferences of millennials, increased digitization and cloudification will drive the demand for cloud security products and services.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Steam Patches Crypto Code to Prevent Padding Oracle Attacks

May 03, 2016 Added by:Ionut Arghire

Steam recently patched security vulnerabilities in its system to prevent attackers from tapping into the data transmitted between a local client and the Steam network to view plain-text passwords or take over accounts.

Comments  (0)

37b77b2d6c99c432123b1b46fa64e566

The Role of CASBs in Protection Against the 2016 “Treacherous 12"

May 03, 2016 Added by:Ganesh Kirti

We looked at how well CASBs would fare in helping enterprises survive the treacherous 12 and guess what? CASBs clearly address nine of the treacherous 12 (along with many other risks not mentioned in the report).

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Nemucod Malware Downloader Evolves into Ransomware

April 26, 2016 Added by:Ionut Arghire

Nemucod, a previously known JavaScript malware family designed to download additional malicious software onto the compromised computers, has evolved into ransomware and is now using 7-Zip to encrypt its victims’ files.

Comments  (0)

866acb3cb223a9bbf8171ffc9dee19ae

Bangladesh Bank: Why Aren't We Talking About Privileged Account Management?

April 26, 2016 Added by:Jim Legg

While prevention of the initial breach is an important layer of an enterprise security strategy, perimeter-based threat protection alone is not sufficient to protect against today’s increasingly sophisticated and targeted external security threats.

Comments  (0)

591c39c65cf5c298ccd0f1cd5818e961

End-to-end Encryption, Today -- Loophole Closed or Moved?

April 22, 2016 Added by:Vanishree Rao

End-to-end encryption does not solve the problem, despite the common perception that it is the holy grail of instant-messaging security. It is necessary that service providers shift their attention toward non-traditional key-derivation mechanisms to close the loophole.

Comments  (0)

41d5440f596e714d7ca33eccabc5fcab

Access Management Increases Security, Cuts Costs

April 22, 2016 Added by:Dean Wiech

While IT spending may be cut back, investments in identity and access management (IAM) solutions continue to grow because of security issues, flexibility and an overall cost savings.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Nuclear Exploit Kit Targets Non-English Users in Over 150 Countries

April 21, 2016 Added by:Ionut Arghire

Researchers at Cisco Talos have recently had a closer look at Nuclear and noticed that its operators have switched focus toward non-English users, but that they are targeting people in more than 10,000 different cities in over 150 countries worldwide.

Comments  (0)


« First < Previous | 4 - 5 - 6 - 7 - 8 | Next > Last »