CISO January 4, 2019 Your Security Strategy Is Only as Strong as Your Cyber Hygiene 3 min read - Without full network visibility and regular utilization of cyber hygiene best practices, your enterprise could face very real, but entirely preventable, security risks.
Threat Intelligence December 20, 2018 IBM X-Force Security Predictions for the 2019 Cybercrime Threat Landscape 5 min read - IBM X-Force's top security predictions for 2019 cover a range of potential attack schemes and consequences, from industry-specific prognostications to a rapid expansion of emerging criminal schemes.
December 14, 2018 Magecart Group’s Use of Credit Card-Skimming JavaScript Attack on the Rise 2 min read - An online retailer was hit by a JavaScript attack from a group associated with Magecart, a collective of cybercriminals that specializes in skimming credit card numbers from compromised websites.
December 10, 2018 Latest Malware Strains Target Cloudera Hadoop for Bitcoin Mining and DDoS Attacks 2 min read - Security researchers discovered that several new malware strains are targeting known Cloudera Hadoop vulnerabilities for bitcoin mining and distributed denial-of-service (DDoS) purposes.
Identity & Access December 7, 2018 Protect the Keys to Your Kingdom With Privileged Access Management 3 min read - The importance of implementing privileged access management (PAM) is undeniable. But how are organizations doing with actually implementing PAM solutions?
Intelligence & Analytics November 9, 2018 Why You Should Start Leveraging Network Flow Data Before the Next Big Breach 4 min read - One of the most crucial types of information for threat detection and incident response is network flow data, which has several unique properties that can help security analysts uncover attacks.
Intelligence & Analytics October 23, 2018 Why You Need to Mature Your User Behavior Analytics Deployment 3 min read - User behavior analytics (UBA) can help security teams uncover ignorant, negligent and malicious activity with advanced machine learning algorithms — but Rome wasn't built in a day.
Identity & Access October 23, 2018 Why You Need Advanced Authentication to Protect Identities Without Compromising User Experience 3 min read - Advanced authentication solutions can help mitigate the risk of fraud by detecting malicious activity without adding unwanted speed bumps to the online user experience.
Application Security October 12, 2018 Is Your Site Protected Against Drupal Security Flaws? 2 min read - This past summer saw a pair of Drupal security flaws exposed and patched. Is your website secure?
Identity & Access October 9, 2018 Out With the Old, In With the New: Separation of Duties the Right Way 3 min read - The capacity to express technical IT concepts in business terms is critical to a better, more informed decision-making process when it comes to user access and separation of duties.