Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Blogs

How to Protect Against a Ransomware Attack

In 2017, ransomware attacks increased by 90 percent, making it the most prevalent variety of malware. Every organization should be thinking about ransomware protection and detection – because proper security is always more prudent than the costs of a ransom or lost time and data. Ransomware is changing and evolving – and so are network security offerings. Here are a few things you need to know to protect your business against a ransomware attack.

Alert Fatigue and Tuning for Security Analysts

Alert fatigue is a real problem in IT Security. This can set in at the worst time, when an analyst checks their tools and sees yet another event, or even another 50-100 events, after they just checked. They click through events looking for the smallest reason they can find to dismiss the event so they won’t need to escalate, or further investigate, the issue.

The Pitfalls Of Leaked Administrative Passwords

The most well-known type of system credential is the administrative, or root password. These types of accounts are “administrators,” meaning they usually have total access to whatever system they are for. Administrator accounts are used by your IT staff or contractors to manage the basic operations of a system. These operational tasks could include maintenance, data migrations, and other common IT work that requires elevated access beyond normal business use.

Zoho CRM and Egnyte

In today’s digital world, modern enterprises need a modern strategy for managing ongoing customer relationships. Salespeople are constantly sending out documents like quotes, sales orders, and invoices, but as processes become more complex, it becomes harder to track every document for every deal. The Egnyte Connect extension for Zoho CRM simplifies this process by providing sales teams and their customers with easy, secure access to all their documents.

Building and Evaluating a Threat Intelligence Program (Part 1)

In the previous post, we discussed the basics of Threat Intelligence and its types by throwing light on the concept of knowns and unknowns. In information security, any information which can aid the internal security team in the decision-making process and reduce the recovery time accordingly is considered as threat intelligence. This first part in this series of articles will discuss threat intelligence cycle and its importance.

2 Big Steps to Keep Electronic Health Records Secure

Many industries have sweepingly digitized their documentation in the name of efficiency – substantial efficiency. The healthcare industry created the electronic health record (EHR) in the name of efficiency as well (among other benefits). But EHRs are far from universal in the medical space. While some hospitals and practices are simply slow to adopt modern practices, the greatest barrier to the universal adoption of electronic health records is privacy and security.

AI and ML: Key Tools in Emerging Cybersecurity Strategy and Investment

Recently, the Defense Advanced Research Project Agency (DARPA) announced a multi-year investment of more than $2 billion in new and existing programs in artificial intelligence called the “AI Next campaign. Agency director, Dr. Steven Walker, explained the implications of the initiative: “we want to explore how machines can acquire human-like communication and reasoning capabilities, with the ability to recognize new situations and environments and adapt to them.”

To phish or not to phish?

We are all no doubt aware of phishing. That age-old practice of sending fraudulent emails with the hope of gaining financial details, obtaining account credentials or tricking a user into installing malicious software. The practice is not new. In fact, before the wide-spread use of the internet, people would often receive letters claiming that they had won some sort of competition and to claim their prize, all they had to do was send some cash to front the delivery costs.