Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

How to Use Data to Identify Trends, Attack Profiles, And Possible Threats?

Data is a raw material, which is often unstructured, extracted in massive quantity, and requires processing before calling it an information and actionable intelligence. A good example is the Indicators of Compromise (IoCs). A big list of domain names or IP addresses can be ingested into the SIEM system to identify whether this list contains any malicious IP or not.

How to create a security culture in your company in 2019

Cybersecurity isn’t just about the computer hardware, software, and networking technicalities that it pertains to. It is also about how human beings behave with computer technology–and what sort of cyber risks that behavior can create. Culture influences behavior, and the security culture of your company can have an immense effect on your cybersecurity. I’ll explain why.

Basics Of IT Security

With the rise of technologies such as Internet of Things and cloud storage solutions, data concerning almost every aspect of our lives are highly connected, making us and our businesses vulnerable to cyber-attacks. Since we are way past the point of turning our back to new technologies, we need to learn how to protect our data while keeping up with the recent developments.

Five Concerning Breaches That Started With an Insider Threat

Human beings have been dubbed as one of the most significant risks when it comes to cyber security in organizations. Behind every breach is a human or entity orchestrating an attack to make it happen. Within the affected organization, there is usually a human action that leads to the success of the attack.

There's no such thing as 100% secure

When Gronk the caveperson chipped out the first wheel from a slab of granite only to watch it roll away down a hill at some speed, he discovered we could build things to make our lives easier. We took this idea and ran with it, and now we have internet connected shoes. However, we also have cybercrime, data theft, phishing, scams, ransomware... the list goes on.

Weekly Cyber Security News 26/04/2019

A selection of this week’s more interesting vulnerability disclosures and cyber security news. Should we be surprised that there are weaknesses in a car app that lets you locate and remotely control them? We’ve been here before – too many times before. Again, possibly bad management, specification and design failures all round, and no one seems to learn.

AT&T Cybersecurity develops new AlienApp for Box for highly secure content management in the cloud

Today, I’m excited to share that we have released AlienApp for Box, a new security integration between AT&T Cybersecurity and Box, a leader in cloud content management. This new feature within USM Anywhere takes advantage of Box's granular logging capabilities and powerful APIs to add an additional layer of security for Box Enterprise customers that enables you to monitor your Box environments for potential threats and malicious activities.

The Netacea Approach | Smarter Bot Management Powered by Machine Learning

The majority of internet traffic is now made up of bots. Many bots are malicious, and actively looking for the next opportunity to attack. In fact, bots make 90% of all login attempts. They also pretend to be human, trying to bypass security measures and evade detection by mimicking human behaviour. Worse, the old defences aren’t enough on their own. Manual analysis, rules-based defences and web application firewalls just can’t keep pace with the ferocity of these attacks.