How to survive the worsening cyber threat landscape

Read Michael Nadeau’s article about the current worsening cyber threat landscape on CSO Online : Don’t expect the cyber threat landscape to get safer anytime soon. That’s the message given by speakers at two recent Boston-based events. “By any measure you want to use, the trend line is going the wrong way,” said Rob Joyce, […]

The need for better proactive cyber defense

Read why  Lloyd McCoy Jr. says that there is a need for better proactive cyber defense on CSO Online : After years of theorizing about “proactive cyber defense,” talk is finally starting to be put into action. Let’s not delay. As cyberattacks become frighteningly more commonplace (the Equifax hack of 143 million consumer IDs is […]

Europol: Ransomware top threat in 2017 cybercrime ‘epidemic’

Ransomware eclipsed most other forms of cybercrime as on-line crime surged in 2017, European policing agency Europol said on Wednesday, citing high-profile attacks such as “WannaCry” that reached millions of computers. Read why Europol, the European Union policing agency says that ransomware is the top threat of 2017 on Reuters.

Ransomware Analysis Promises Bleak Future with No Recovery

The future of ransomware does not offer any good news, as analysis shows new tactics and advancements by operators. According to analysis by Carbon Black’s Threat Analysis Unit of 1000 ransomware samples, researchers found that ransomware will increasingly target Linux systems and look to conduct SQL injections to infect servers and charge a higher ransom price. […]

Ransomware, BEC, ICS Top Midyear Security Concerns

Business email compromise (BEC) attacks and SCADA vulnerabilities are two top concerns among security experts thinking back on the first half of 2017. Threat actors have begun to rely on time-tested strategies to launch simple attacks and trick businesses out of billions, according to a report released today by Trend Micro. Read about the new […]

The real cost of alarm fatigue

Read Tony Rowan explain the cost of cyber security fatigue that develops in a company’s IT team on Help Net Security : One of the toughest challenges for an IT security team is managing and sifting through the deluge of security alerts that are created on a daily basis.  Teams can waste considerable time chasing […]

SIEM challenges: Why your security team isn’t receiving valuable insights

Read Brad Taylor’s article about security information and event management (SIEM) software cyber security challenges on Help Net Security : Today, many enterprises use security information and event management (SIEM) software to help detect suspicious activity on their networks. However, to be effective organizations need to surround a SIEM with security experts, advanced use cases, threat intelligence, […]

8 top cyber-attack maps and how to use them

Cyber-attack maps can be fun to look at, but are they useful? As usual, when it comes to security context is key, so CSO looked at eight of the web’s most popular cyber-attack maps. While the maps themselves are mostly eye candy with limited context, there are some creative ways they can be used. Read […]

Ransomware threat escalating, warns Europol

The No More Ransom initiative boasts 109 partners and 54 decryption tools covering 104 kinds of ransomware a year after it was set up to counter the still-growing threat of ransomware to businesses, governments and individuals. Read about the latest Europol warning to businesses about the escalating ransomware threats on Computer Weekly.

What does a sound cyber strategy look like?

Read George Ralph’s article about what a company’s cyber security strategy should look like on Hedge Week : Cybersecurity has never been as important as it is today. Cyber attacks are becoming ever more ambitious and overt. The two big recent malware attacks, Petya and WannaCry both used phishing attacks to spread malware through networks, with […]