Application Security January 7, 2019 The System Development Life Cycle: A Phased Approach to Application Security 7 min read - By completing the phases of the system development life cycle (SDLC), security teams can integrate processes and technologies into the development process and improve application security.
January 4, 2019 Ursnif, Emotet, Dridex and BitPaymer Malware Families Team Up to Wreak Havoc 2 min read - Researchers discovered a link between four malware families — Ursnif, Emotet, Dridex and BitPaymer — that suggests threat actors may be combining efforts to develop more sophisticated attack vectors.
CISO January 4, 2019 Your Security Strategy Is Only as Strong as Your Cyber Hygiene 3 min read - Without full network visibility and regular utilization of cyber hygiene best practices, your enterprise could face very real, but entirely preventable, security risks.
CISO January 2, 2019 Why Proactive Data Compliance Is Imperative for Secure Digital Transformation 4 min read - The risks associated with failure to establish proactive data compliance go far beyond regulatory violations and loss of consumer trust. Compliance is critical for secure digital transformation.
December 10, 2018 Latest Malware Strains Target Cloudera Hadoop for Bitcoin Mining and DDoS Attacks 2 min read - Security researchers discovered that several new malware strains are targeting known Cloudera Hadoop vulnerabilities for bitcoin mining and distributed denial-of-service (DDoS) purposes.
CISO November 15, 2018 4 Tips to Make the Most of Your Security Budget 4 min read - Getting an increase security budget approved is one thing; spending it effectively is another challenge altogether. Follow these tips to get the most value out of your SOC's funds.
November 2, 2018 DemonBot Targeting Hadoop Clusters to Perform DDoS Attacks 2 min read - Security researchers reported that a new bot called DemonBot is targeting Hadoop clusters to execute distributed denial-of-service (DDoS) attacks.
October 19, 2018 New Gallmaker Attack Group Using Living-off-the-Land Tactics in Espionage Campaign < 1 min read - A new attack group known as Gallmaker spied on military and government organizations by employing living-off-the-land tactics.
October 17, 2018 Threat Actors Obfuscate JavaScript to Hide Crypto-Mining Malware 2 min read - Cybercriminals buried crypto-mining malware inside compromised websites in an effort to hijack victims' computing resources.
Identity & Access October 8, 2018 How Analytics Can Help You Better Understand Access Risks 4 min read - The increasing complexity of modern IAM makes it hard to understand your organization's access risks. Identity analytics can help by enhancing existing processes with a rich behavioral and event data.