Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Self-Driving Cars: How Automakers can Overcome Cybersecurity Issues

A lot has been going on with autonomous vehicles these days. Almost every famous car manufacturer seems to be in a rush to master the perfected version of self-driving cars. While most people believe that fully autonomous vehicles are still in their infancy stage, manufacturers think that they will dominate the roads by 2020.

Weekly Cyber Security News 28/12/2018

A selection of this week’s more interesting vulnerability disclosures and cyber security news. As we plummet to the end of 2018 in this odd Twilight-zone period between Xmas and New Year. If you’re not out there fending off the hackers then you could be stuck at home feeling in need of geeky fun as family and TV can only go so far. How about this to wind up the family?

How Malware Sandboxes and SIEMs Work in Tandem to Effectively Detect Malware

Rohan Viegas of VMRay explains some of the key factors IT security teams should consider when evaluating a malware analysis sandbox and whether it’s a good fit for their existing SIEM environment. He then outlines how VMRay Analyzer complements and enhances the capabilities of AlienVault’s flagship platform, USM Anywhere.

Doxxing: What It Is How You Can Avoid It

Doxxing means publishing private information about someone online to harass or intimidate them. It has ruined reputations and caused untold distress to hundreds of people. On occasion, doxxing has resulted in injury or even death. Being doxxed can have serious consequences for your safety and privacy. How can you prevent it?

The Dangers of Free VPNs

If you use a free VPN, then you have to wonder how your provider earns money to cover their own costs. The answer often involves advertising, but it can also be through far more sinister means. Running a VPN service costs a significant amount of money. There are setup costs, infrastructure costs, labor and other running costs. The companies behind these services generally want to make a profit as well.

Security Orchestration Use Case: How to Automate Threat Hunting?

Threat hunting is the practice of iteratively and proactively hunting for threats or Advanced Persistent Threats (APT) that are launched by adversaries. Unlike traditional security systems such as antivirus program, firewalls, or SIEM, who use a reactive approach to threats, threat hunting utilizes a proactive approach to pursuing threats even before they compromise organization’s network or IT infrastructure.

How to Maintain Data Security When Employees Work Remotely

We all know the perks of allowing employees to work remotely. From lower overhead (less snacks and drinks to provide) to increased productivity and job satisfaction, working from home is becoming more and more common in today’s business landscape. Unfortunately, with this system comes many data security risks to consider. With so many devices being used for work and various network connections to monitor, how can you allow your employees to work remotely and still maintain data security?

Let's Chat: Healthcare Threats and Who's Attacking

Healthcare is under fire and there’s no sign of the burn slowing. Look, it’s no secret that hackers have been targeting hospitals and other healthcare providers for several years — and probably no surprise that healthcare is one of the top target industries for cybercrime in 2018. In the US alone, in fact, more than 270 data breaches affecting nearly 12 million individuals were submitted to the U.S. HHS Office for Civil Rights breach portal (as of November 30, 2018).