Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

The Rise of Ransomware as a Service (RaaS)

2019 Has been an interesting year for Ransomware thus far. After plaguing countless victims with dreaded ransom notes and bringing some pretty large corporations to their knees, the attack method built a strong reputation for inflicting cyber terror on consumers and businesses. As cyber criminals noticed increasing success from this method, the trends shifted towards more targeted enterprise attacks with the potential for more lucrative payouts.

Be the leader in the new password-volution: memorized secrets

Remember when you were younger, and you wanted to do something that all your friends were doing, yet you knew your parents would never approve? Perhaps it was skating in that home-made “Half-Pipe”, or that time you wanted to try some equally dangerous stunt? Of course, your parents disapproved, to which you probably responded with the time-honored refrain: “But everyone is doing it!” That was never a convincing argument.

End Users as the Strongest Link

“It’s okay that you don’t understand.” This comment came after I was frustrated with myself for not being born a genius at math. Usually, when you don’t know a subject or you don’t understand it enough, subject matter experts (i.e. your teachers/professors/mentors/etc) put you down for it. But this time was different because I had a real subject matter expert who cared about the end goal: students educated in math.

Countdown to CCPA: Steps to Start Getting Your Content in Compliance

The California Consumer Protection Act (CCPA), set to go into effect in January 2020, will have a big impact on companies that do business in California or collect the personal information of California citizens. Driven by growing public demand for privacy, CCPA is the latest in a line of regulations that gives individuals greater control over how their personal data can be collected, stored, purchased, or shared by private companies. Wondering what CCPA means for your business?

What is Cybersecurity Analytics?

Security analytics is not a particular tool, rather it is an approach to cybersecurity. Thorough analysis of data in order to implement proactive security measures is the essence of security analytics. It includes gathering data from every possible source to identify patterns. Nobody can predict the future but with cybersecurity analytics, you can make pretty accurate, informed guesses about it.

Four Misconceptions About Ransomware Addressed

Ransomware has been a hot topic within the cyber security industry for quite some time now. It’s an often-lucrative cyber-attack method with an attractive return on investment. The motivation behind Ransomware attacks tends to be primarily financial, as cyber criminals can’t resist such easy opportunities to achieve their malicious goals. Ransomware is effective given that almost every individual or organization owns or has access to digital assets which are valuable to them.

How to Avoid Common Software Vulnerability Management Mistakes

Vulnerability management (VM) is an essential process through which organizations can reduce risk in their environments. But myths and misconceptions surrounding VM abound. For instance, organizations commonly approach vulnerability management in the same way as they do patch management. Others are guilty of believing that all attacks rely on vulnerabilities, while others still are under the false impression that all software patches will work without a hitch.

Weekly Cyber Security News 28/06/2019

A selection of this week’s more interesting vulnerability disclosures and cyber security news. Here we are again, another week and another S3 leak. I really don’t understand how this keeps happening. Either its sloppy admin or people with no technical (or security) understanding is being let loose on a complex cloud service – both are not great. You would hope that when you call in experts to help with a problem, you are dealing with someone responsible.

What is Real-Time Threat Intelligence?

Would you sit back in your chair and do nothing while your systems are under attack? You may be, without even realizing it. Businesses are increasingly finding themselves under cyberattacks carried out by hackers or criminals. However, many of them fail to recognize that they have been attacked until it is too late to do anything. That is why timing is the most essential component of cyber security. Fighting attacks proactively instead of reactively can save your systems and networks.