Endpoint November 4, 2015 In a Sea of Cyberthreats, Don’t Be Distracted by the Shark — Look for the Snails! 2 min read - The genius behind Shark Week is that it sells fear of a threat that you'll likely never encounter. Can the same be said about security vulnerabilities?
Advanced Threats October 16, 2015 What Is Polymorphic Malware and Why Should I Care? 2 min read - Polymorphic malware may be a serious threat, but some of the strategies used to create it could be applied to malware defenses, as well.
Fraud Protection October 12, 2015 The Dyre Trojan and the Art of War < 1 min read - The Dyre Trojan is a great example of a threat that combines sophisticated tactics with an impressive strategy, resulting in a worthy cyber opponent.
October 9, 2015 New Remote-Access Trojan Skitters Through Security Undetected 3 min read - A new remote-access Trojan (RAT) named Moker has been discovered by security researchers — and has skittered past every security measure used.
October 7, 2015 Nuclear Facilities Not Ready for Cyberattacks: What’s the Fallout? 3 min read - According to a new Chatham House report, nuclear facilities aren't ready for cyberattacks. What's the possible fallout facing this industry?
Threat Intelligence October 7, 2015 Comparing Different Tools for Threat Sharing 4 min read - Threat sharing is getting more and more attention from security professionals to detect and quickly respond to security threats.
October 6, 2015 Common Vulnerabilities: The Key to Better Cybersecurity? 2 min read - A new report finds companies share common cybersecurity vulnerabilities. Can this common ground be used to enhance network security?
October 1, 2015 Bad Words: Curse of Macro Malware Makes a Comeback 2 min read - Macro malware is making a comeback in the form of malicious email attachments. How do companies avoid the curse of bad Word docs?
Risk Management October 1, 2015 Security Awareness Is Our Shared Responsibility 2 min read - During National Cyber Security Awareness Month, organizations should do their part to raise security awareness among employees and enforce best practices.
September 28, 2015 New IoT Security Foundation Looks for Confidence in Collaboration 2 min read - IoT security is getting a boost thanks to a new nonprofit organization focused on "promoting excellence" in this emerging field.