Cybercriminals are using more covert tactics with ransomware, carefully targeting organizations they believe are likely to pay a significant amount of money. Here are 12 tactics that can help [...]
To enable more effective threat detection and response, organizations must incorporate threat intelligence and threat detection frameworks that look beyond simple indicators of compromise (IOCs).
The threat landscape has shifted dramatically in the past few years. According to the 2019 Verizon Data Breach Investigations Report, 94% of all breaches are from attacks targeting people. So if [...]
Ransomware was once a blip on the cyber security radar, but times have changed: Ransomware attacks grew nearly 500 percent, to 3.8 million attacks, from 2014 to 2015. Ransomware has been [...]
2014 was a banner year for cyberattackers, but not security. The high-profile data breaches of last year prove that antivirus is not enough, and the numbers of spear-phishing and web-based [...]
When is a patch not a patch? When it becomes another exploit on your network. We sometimes lose sight of these obvious points when talking about patching and vulnerability management. At [...]
In the past, IT security was like insurance, viewed as an expense, not a revenue generator. That perception left IT with minimal dollars allocated to securing networks, data, and other assets. [...]
IT administrators have plenty of perimeter security tools at their disposal, from firewalls to spam filters to intrusion detection solutions. But despite all the preventative measures, most [...]