• From
  • to

Want to Really Lighten Your SecOps Burden? Look Next Gen AV

If you’ve been actively seeking out a solution to replace legacy antivirus and improve overall endpoint protection, you’ve no doubt gotten a taste of the hype around next-gen AV and ‘math-based’ static prevention, which detects attacks at the pre-execution phase. At first glance, it seems impressive; no dependence on signatures,…

October 27, 2016

Sean Roth

How Big Data is Improving Cyber Security

Big data and analytics is showing promise with improving cyber security. 90% of respondents from MeriTalk’s new U.S. government survey said they've seen a decline in security breaches. 84% of respondents said they've used big data to help block these attacks. Not surprising, companies that are already heavy analytics users…

October 26, 2016

Scott Gainey

Phishing Scams as a Service? Thieves Make It Easier To Steal Passwords

Do you think it's easy for hackers to steal your passwords? In the past, this may not have been the case, but like most things the technology has improved. Now malware developers are offering phishing as a service (PHaaS) that makes it a simple process to set up a fake…

October 24, 2016

Sarah Vanier

GovRAT: Remote Administration Tool Targets US Government Employees

A new variant of the malware GovRAT is targeting government and corporate computers. This hacking platform creates malware that is hard to detect and aggressive in its methods to try and steal sensitive files. GovRAT is Not New Virus Guides observes that, “the name of the malware also plays an…

October 21, 2016

Sean Roth

Next-Generation Endpoints: Where Will New Malware Threats Strike Next?

Most of us who have worked with computers for a while remember the glory days of antivirus. Back then, most malware arrived as an attachment and would be immediately stopped by the antivirus program if we tried to open it. In those days, malware protection was simple. Unfortunately, the intruders…

October 19, 2016

Scott Gainey

Europe’s “Digital Single Market”

When Americans think about the European Union, they often think about regulation, and government oversight, and a “nanny state” kind of ethos, whereby citizens get both support and guidance from a central government source. The simplified contrast is that Europeans live in a comfortable government cradle, where across the Atlantic…

October 17, 2016

Sarah Vanier

New Trojan Virus Is Targeting IoT Devices

The Internet of Things (IoT) is creating a new environment where malware can be used to create powerful botnets. Mirai, a new Trojan virus for Linux, is difficult to detect and already exists in the wild.  The threat is a new variant of the Gafgyt, (aka BASHLITE, aka Torlus) malware,…

October 14, 2016

Sean Roth

Ponemon Institute Identifies High Average Dwell Time for Financial and Retail Businesses

When security experts talk about modern cybersecurity strategy and the real results of cyberattacks, they often talk about dwell time. But this metric, which has become all-important, sometimes takes a backseat to analysis about cost – although it really shouldn’t. Dwell time represents the number of days that a threat…

October 12, 2016

Scott Gainey

A 3-Fold Solution to the Growing Linux Security Problem

In part one of this Linux blog series, we talked about how the open source operating system has been quietly emerging as a fundamental piece of digital innovation. However, the explosive growth of Linux is on a collision course with our topic from part two in this series—security threats. As…

October 10, 2016

Sarah Vanier

Linux Operating System Attacks are Nothing New—But is the Problem Getting Worse?

Because of the Windows operating system’s global dominance in terms of market share, cyber threats tend to focus heavily on its vulnerabilities. However, we know the Linux open source operating system is emerging as a universal force and attackers are taking notice. Attack vectors for the Linux operating system have…

October 07, 2016

Sean Roth

1 2 3 12