Data Protection June 27, 2017 Funny Money: Exploring the Connection Between Bitcoin and Ransomware 3 min read - Fraudsters obviously prefer to deal in digital currency to remain anonymous, but bitcoin and ransomware are also intertwined in other, more complex ways.
Endpoint June 22, 2017 Health Care Endpoint Hygiene: A Post-WannaCry Call to Action < 1 min read - The idea of employing basic endpoint hygiene to keep your data safe seems like a no-brainer. So why was the WannaCry ransomware attack so damaging?
CISO June 19, 2017 Cyber Solstice: IT Security Tasks to Tackle on the Longest Day of the Year 3 min read - Security professionals should take advantage of the longest day of the year to take care of security tasks that are typically placed on the back burner.
June 14, 2017 Attackers Leverage SambaCry Flaw to Run Cryptocurrency Miner 2 min read - Actors have exploited a patched flaw to push a cryptocurrency miner to vulnerable Linux machines. The attacks take advantage of a vulnerability in Samba.
Banking & Finance June 12, 2017 Financial Sector Remains a Top Target in 2017 2 min read - Our prediction at the end of 2016 held true: The influx of advanced DDoS, POS and other attacks targeting the financial sector has yet to abate in 2017.
June 7, 2017 Cold Comfort: Outdated Software Puts Companies in the Hot Seat 2 min read - Outdated software offers familiarity for IT teams, but that's cold comfort when it comes to the hot seat of legal challenges and ransomware infections.
Network June 7, 2017 Using Network Insights to Stay One Step Ahead of Emerging Threats 3 min read - With the right network insights, analysts can deal with existing threats such as WannaCry, and quickly detect and respond to new attacks as they emerge.
CISO May 30, 2017 Four New Cyberthreats on the CISO’s Radar 2 min read - An effective defense against cyberattacks such as ransomware, dronejacking and hacktivism requires a deep understanding of the evolving threat landscape.
Malware May 25, 2017 Unwrapping the Mystery: Did a Big, Slimy Internet Worm Make Hundreds of Organizations WannaCry? 6 min read - IBM X-Force revealed that WannaCry spread to its targets like a computer worm. But unlike a classic worm, it carried a malicious payload of ransomware.
Incident Response May 25, 2017 Incident Response: Planning for the Attack Before It Happens 2 min read - An effective backup strategy is simply one part of a larger security and incident response plan, which should be developed proactively.