Data Protection February 18, 2015 Using Outlier Detection to Catch Sneaky Data Breaches 5 min read - Organizations should use outlier detection tools to spot anomalies in their systems that could result in potentially damaging threats.
Identity & Access February 12, 2015 How to Control Your Threat Landscape by Managing Identities 3 min read - If you are afraid of your organization appearing in the headlines, you must get control of your threat landscape by properly managing identities.
Advanced Threats February 5, 2015 Who Hacked Sony? New Report Raises More Questions About Scandalous Breach 4 min read - According to a new report, Russian cybercriminals used spear-phishing attacks to breach Sony Pictures Entertainment at the end of 2014.
January 28, 2015 Cybercriminals Threaten Data Dump From Hacked Malaysia Airlines Website 3 min read - Cybercriminals belonging to Lizard Squad have threatened to dump data from a hacked Malaysia Airlines website, though the airline refutes the claim.
January 16, 2015 Report: PCI Noncompliance Common Among Companies That Suffer Payment Card Breaches 3 min read - According to a report from Verizon, many companies that suffer payment card breaches are not actually fully compliant with PCI standards.
January 8, 2015 Bitcoin Exchange Service Bitstamp Temporarily Suspended After Hack 2 min read - Bitcoin exchange service Bitstamp suspended its operations temporarily after cybercriminals stole $5 million worth of the virtual currency after a hack.
December 17, 2014 Top 5 Biggest Data Breaches in 2014 3 min read - A look at the top data breaches that compromised millions of records containing personal information from major retailers and other companies in 2014.
November 13, 2014 Stolen Vendor Credentials: Retail’s Real Problem? 3 min read - Stolen vendor credentials are to blame for the recent Home Depot breach, giving attackers the access they needed to get into high-level systems.
Malware November 3, 2014 Uncloaking the Dark Arts of Evasive Malware 4 min read - With all the security breaches, it seems like cybercriminals keep getting through. Malware is evolving to evade detection by traditional defenses.
Application Security October 31, 2014 Making the Case for Application Security 3 min read - Though application security can be challenging for security teams to take on, detecting vulnerabilities in applications is vital for staying secure.