Top

LATEST PUBLICATIONS



Apple Steps Up Encryption to Thwart Police Cracking of iPhones

June 14, 2018

Category: Mobile security

Apple said Wednesday it was strengthening encryption on its iPhones to thwart police efforts to unlock handsets without legitimate authorization. The move by Apple, the latest in an ongoing clash with law enforcement, comes amid reports of growing use of […]


5 Tips for Protecting SOHO Routers Against the VPNFilter Malware

June 4, 2018

News of how the Russians are alleged to have infected more than 500,000 home routers worldwide via the VPNFilter malware broke last week, leaving home users and security managers scratching their heads about how to best to lock themselves down. […]


Is Cryptojacking Replacing Ransomware as the Next Big Threat?

May 24, 2018

Category: Malware

Monitoring cyberthreats over time reveals interesting insights into the strategies used by cybercriminals and the evolution of the attack vectors they target. While the threat landscape continues to be quite diversified, trends do seem to run in predictable cycles. For […]


Network security

Improving the Adoption of Security Automation

June 20, 2018

Via: Dark Reading

IT has always added value through automation, but its penetration into security practices historically has been lower than in other functional areas. For example, in the just-released Oracle and KPMG Cloud Threat Report 2018, only 35% of respondents said that […]


Phishing

How to Recognize a Business Email Compromise Attack

June 20, 2018

Via: Security Intelligence

Business email compromise (BEC) is a type of phishing scheme in which an attacker impersonates a high-level executive and attempts to trick an employee or customer into transferring money or sensitive data. This crime is particularly stealthy because it employs […]


Cloud security

5 Tips for Integrating Security Best Practices into Your Cloud Strategy

June 19, 2018

Via: Dark Reading

Do ‘cloud-first’ strategies create a security-second mindset? Too often, I hear system administrators tell me that their organization’s cloud-first strategy is jeopardizing security. With each new software-, infrastructure, and platform-as-a-service adopted by line-of-business users or within enterprise IT, security seems […]


Network security, Threats & Malware, Vulnerabilities

How to Overcome Cognitive Biases That Threaten Data Security

June 19, 2018

Via: Security Intelligence

Did you know the software that powers our brains contains security flaws that need to be patched? I’m talking about cognitive biases, which are the wetware vulnerabilities that collectively constitute the single greatest threat to enterprise data security. The Interaction […]