CISO July 25, 2019 This Is What Experts Say Will Turn the Tide Against Increasing Cyberthreats 3 min read - Most organizations could blunt the vast majority of cyberthreats by making better use of the tools they already have and protecting their most precious data.
Advanced Threats July 23, 2019 What’s New in the 2019 Cost of a Data Breach Report 5 min read - According to the latest Ponemon Institute study, the average cost of a data breach in 2019 is $3.92 million, up 1.5 percent from last year.
July 22, 2019 MegaCortex Ransomware Uses Aggressive Ransom Notes to Coerce Payments 2 min read - Researchers analyzed a sample of the MegaCortex ransomware family that used an aggressive ransom note to bully victims into meeting their demands.
Incident Response July 19, 2019 How to Create an Effective Incident Response Plan 4 min read - Build an incident response plan, practice implementing it, and orchestrate and automate to make operations more efficient.
Incident Response July 16, 2019 The Wild West Era Has Ended — What’s Next for Data Privacy? 9 min read - People often think of the cybersecurity industry as the Wild West, but data privacy regulations have been influencing the way companies respond to a data breach for well over a decade.
Threat Hunting July 15, 2019 Threat Intelligence Is the SOC’s Road Map to DNS Security 3 min read - Threat intelligence provides the context SOC analysts need to proactively identify DNS security threats and prevent future DNS attacks.
CISO July 12, 2019 Why Security Incidents Often Go Underreported 4 min read - If you saw a coworker browsing through a database they weren't supposed to have access to, would you report it? New research suggests that employees often underreport such security incidents.
Data Protection July 10, 2019 Why Cybercriminals Are Targeting Travel and Transportation 4 min read - Why are travel companies increasingly targeted in cyberattacks? Valuable data and customer hospitality demands make the travel and transportation industry especially tempting to cybercriminals.
July 1, 2019 Attackers Disperse Cryptocurrency-Mining Malware via a Golang-Based Spreader < 1 min read - Threat actors launched an attack campaign that uses a Golang-based spreader to distribute cryptocurrency-mining malware, according to researchers.
Application Security June 25, 2019 Why Doxing Is the Dr. Jekyll and Mr. Hyde of Cloud Security 4 min read - It's time for cloud security teams to turn the tables on malicious actors and use doxing — in the form of attacker reconnaissance — to uncover vulnerabilities before they turn into full-blown threats.