The key to success with prevention strategies like remote browser isolation

It is tempting as a security practitioner to think you can prevent every attack. Especially in a people-strapped industry, why wouldn’t you want to? If we could just use technology and prevent attacks, we wouldn’t need that many new security practitioners after all. Prevention is definitely a good strategy, and has prompted much investment from […]

Insider threats and the misuse of privileged credentials

IT professionals may understand what their most valuable assets are, but they are still struggling to safeguard IT assets against the unpredictability of human behaviour. Whilst HR and finance departments are the easiest target for social engineering, it is in fact IT staff who pose the biggest insider risk to networks, whether caused by accidental or intentional actions. […]

How to survive the worsening cyber threat landscape

Read Michael Nadeau’s article about the current worsening cyber threat landscape on CSO Online : Don’t expect the cyber threat landscape to get safer anytime soon. That’s the message given by speakers at two recent Boston-based events. “By any measure you want to use, the trend line is going the wrong way,” said Rob Joyce, […]

The need for better proactive cyber defense

Read why  Lloyd McCoy Jr. says that there is a need for better proactive cyber defense on CSO Online : After years of theorizing about “proactive cyber defense,” talk is finally starting to be put into action. Let’s not delay. As cyberattacks become frighteningly more commonplace (the Equifax hack of 143 million consumer IDs is […]

Europol: Ransomware top threat in 2017 cybercrime ‘epidemic’

Ransomware eclipsed most other forms of cybercrime as on-line crime surged in 2017, European policing agency Europol said on Wednesday, citing high-profile attacks such as “WannaCry” that reached millions of computers. Read why Europol, the European Union policing agency says that ransomware is the top threat of 2017 on Reuters.

Ransomware Analysis Promises Bleak Future with No Recovery

The future of ransomware does not offer any good news, as analysis shows new tactics and advancements by operators. According to analysis by Carbon Black’s Threat Analysis Unit of 1000 ransomware samples, researchers found that ransomware will increasingly target Linux systems and look to conduct SQL injections to infect servers and charge a higher ransom price. […]

Ransomware, BEC, ICS Top Midyear Security Concerns

Business email compromise (BEC) attacks and SCADA vulnerabilities are two top concerns among security experts thinking back on the first half of 2017. Threat actors have begun to rely on time-tested strategies to launch simple attacks and trick businesses out of billions, according to a report released today by Trend Micro. Read about the new […]

The real cost of alarm fatigue

Read Tony Rowan explain the cost of cyber security fatigue that develops in a company’s IT team on Help Net Security : One of the toughest challenges for an IT security team is managing and sifting through the deluge of security alerts that are created on a daily basis.  Teams can waste considerable time chasing […]

SIEM challenges: Why your security team isn’t receiving valuable insights

Read Brad Taylor’s article about security information and event management (SIEM) software cyber security challenges on Help Net Security : Today, many enterprises use security information and event management (SIEM) software to help detect suspicious activity on their networks. However, to be effective organizations need to surround a SIEM with security experts, advanced use cases, threat intelligence, […]

8 top cyber-attack maps and how to use them

Cyber-attack maps can be fun to look at, but are they useful? As usual, when it comes to security context is key, so CSO looked at eight of the web’s most popular cyber-attack maps. While the maps themselves are mostly eye candy with limited context, there are some creative ways they can be used. Read […]