Healthcare January 22, 2019 What Does Healthcare Cybersecurity Look Like in a Future of Connected Medical Devices? 3 min read - What can health care companies do to mitigate the risks inherent in the future of health care cybersecurity?
Data Protection January 9, 2019 Deciphering the Encryption Paradox 2 min read - The practice of protecting network data with encryption is gaining steam, and with good reason. But companies need adequate network visibility to keep up with threats that evade traditional detection.
January 8, 2019 NRSMiner Crypto-Mining Malware Infects Asian Devices With the Help of EternalBlue Exploit 2 min read - Security researchers report that the newest version of NRSMiner crypto-mining malware is causing problems for companies that haven't patched the EternalBlue exploit.
Intelligence & Analytics January 8, 2019 SIEM Event Normalization Makes Raw Data Relevant to Both Humans and Machines 2 min read - In its raw form, log data is almost impossible for a human to process, so advanced SIEM solutions conduct a process called event normalization to deliver a homogeneous view.
January 4, 2019 Ursnif, Emotet, Dridex and BitPaymer Malware Families Team Up to Wreak Havoc 2 min read - Researchers discovered a link between four malware families — Ursnif, Emotet, Dridex and BitPaymer — that suggests threat actors may be combining efforts to develop more sophisticated attack vectors.
CISO January 4, 2019 Your Security Strategy Is Only as Strong as Your Cyber Hygiene 3 min read - Without full network visibility and regular utilization of cyber hygiene best practices, your enterprise could face very real, but entirely preventable, security risks.
Government January 3, 2019 Government Cybersecurity Processes Must Change Drastically to Keep Up With Complex Attack Vectors 3 min read - Since governments have so many potential attack vectors to manage, government cybersecurity professionals need clear processes, procedures and authority to harden vulnerable environments.
Identity & Access January 2, 2019 It’s Time to Dispel These Dangerous Password Security Myths 4 min read - Passwords are bad, and alternatives abound. But first we need to overcome the common myths and misconceptions about the password.
Endpoint December 27, 2018 Is 5G Technology a Blessing or a Curse for Security? Depends Who You Ask 3 min read - With blazing fast speeds and lower latency, will 5G technology mitigate or exacerbate existing network security concerns?
Incident Response December 11, 2018 Why You Need a BGP Hijack Response Plan 5 min read - BGP hijack attacks are increasing in popularity, but are still largely unaddressed in many organizational incident response plans.