Blog

  • From
  • to

The Importance of Information Security: Explaining Value and Solutions to Executive Stakeholders

“Security threats” are threats in the most visceral sense of the word. With big news of attacks breaking constantly, more corporate executives are beginning to recognize that. The problem is, there’s often a huge communications gulf between a company’s IT security team and the boardroom. The Information Security Forum’s 2016…

November 18, 2016

Sean Roth

3 Reasons Why Mobile Security Training is Essential for Securing Enterprise Endpoints

A single, unsecured laptop, smartphone — or these days, even a smartwatch — can be the entry point for immense damage to your company. (Sorry to break it to you). But among all the solutions available, from endpoint security protocols to good old virus scanners and firewalls, one of the…

November 16, 2016

Scott Gainey

Expect More IoT Botnet Attacks: Mirai Source Code Now Freely Available

The source code for the malware Mirai has been released to the public. This source code, released on Hackforums, can be used to create an Internet of Things botnet that can launch a massive distributed denial of service attack. Last month, it was used to attack KrebsonSecurity and it is…

November 14, 2016

Sarah Vanier

Password Psychology: Why Do We Pick Bad Passwords?

Even after reading about the data breaches in the news and recommendations on websites about how to create a strong password, many consumers are still creating bad passwords. Password psychology gives us some insight into why people change their passwords and why they use bad passwords. The main reason that…

November 11, 2016

Sean Roth

The EU GDPR is Coming. Are You Prepared?

Do you ever find yourself asking, “Where has the time gone?” Keep that in mind when you hear the EU General Data Protection Regulation (GDPR) compliance date is May 25, 2018. While seemingly distant, those preparing might find time flying as they navigate the regulation’s complexities. What is EU GDPR?…

November 10, 2016

Scott Gainey

Risk. Cyber Black Swans. Tesco Bank

We have little detail beyond that at this point, but some questions are already being asked. How organized do you have to be to access 40,000 accounts in a matter of hours? Does a third of your customer base normally log in on a Saturday night? It won’t be the…

November 09, 2016

Andy Norton

Analysis of iOS.GuiInject Adware Library

There ain't no such thing as a free $2 cracked software, especially if one went all-in buying that latest top-notch iOS device! Our crackers friends know, and if one takes the bet to use an out-of-date insecure jailbroken iOS version to install cracked software, he or she is likely to…

November 08, 2016

Arnaud Abbati

IoT Attacks: Will the Office Thermostat be the Achilles of IoT Security Issues?

September 13, 2016 marked one of the largest attacks the Internet has ever seen. Analysis of the event showed that traffic was approximately 620 Gigabits per second. That volume far exceeds what can knock regular websites offline. Based on the size and intensity, it was obvious this was not a…

November 07, 2016

Scott Gainey

Malware Protection? We Got This

To say there are a lot of security vendors saying a lot of conflicting and confusing things is an understatement. There is legacy antivirus, next gen antivirus, next gen endpoint firewalls, and next gen endpoint protection. Signatures have been replaced with mathematical algorithms and machine learning and behavioral detection. Tests…

November 04, 2016

Sarah Vanier

The Rise of the Global Internet: A Cacophony of Freedom

One of the most esteemed political figures of the nineteenth century, Alexis de Tocqueville, wrote these words in a time when the American experiment was new: “Nothing is more wonderful than the art of being free, but nothing is harder to learn how to use than freedom.” This sentiment, from…

November 02, 2016

Sarah Vanier