Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Threat Modeling in Times of Crisis

With most of the country sheltering in place and so many people working remotely, work-life balance is taking on a new meaning and cloud infrastructure is taking a beating. The dramatic increase in daily activity and network use is creating both a visibility challenge and an operating model shift for already lean security teams.

Pros and Cons of the FAIR Framework

The Factor Analysis of Information Risk (FAIR) framework was developed by Jack Jones. FAIR is a risk management framework championed by the open group that enables organizations to analyze, measure, and understand risk. The FAIR model evaluates factors that contribute to IT risk and how they impact each other while breaking down risk by identifying and defining the risk model. FAIR is most often used to establish probabilities for the frequency and magnitude of data loss.

COVID-19 Ongoing Cyber Updates

Cyberint research team closely monitors threats related to COVID-19, leveraging the global fear and uncertainty around it. Utilizing thematic lures, a variety of cyberattacks have been launched during a time when many are seeking critical information on the outbreak. Exploiting the headline-dominating crisis, individuals, organizations and governments alike are tricked into opening malicious payloads, visiting malicious websites and are subject to misinformation or fraud.

Appknox Webinar - All Things Security for Your Remote Workforce!

Remote work poses unique challenges for companies because employees are not physically working on-site, they're often relying on their own Wi-Fi networks and devices to access company data and infrastructure. To mitigate security risks, companies must implement clear and comprehensive data security policies and take proactive measures to ensure complete cybersecurity for their remote teams.

Cybersecurity challenges of the work-from-home model

Just recently, the World Health Organization declared coronavirus a global pandemic. This decision brought with it several health and safety measures, and normal life came to a halt in many countries. This resulted in many organizations around the world adopting telecommuting methods to prevent the spread of COVID-19. While people are adjusting to the sudden changes in the way they work, cybercriminals are using this opportunity to exploit new vulnerabilities the work-from-home environment presents.

Ensure a secure and reliable Zoom video conferencing service

We are excited to announce a new solution for our customers to monitor the performance, availability, and security of their Zoom video conferencing service. The Sumo Logic for Zoom app is available today in our app catalog. This new app will be added to our ‘Work From Home’ solution which is available for free, with no obligation.

Cybersecurity in Education (K-12) with the CIS Controls

Acknowledging recent reports of ransomware targeting educational institutions, it is no wonder that there have also been articles that attempt to lure in readers with “free” tools. What is disappointing is that these “free” tools are little more than marketing pieces that direct you to click on readily available documentation from Microsoft or Google.

Insider Data Theft: Definition, Common Scenarios, and Prevention Tips

People tend to trust those they work with: employees, business partners, subcontractors. But these people, who have access to all kinds of corporate data, don’t always prove worthy of such trust. Insider data theft statistics show that one in four employees won’t think twice before stealing sensitive data from their current company if it will help them sign a contract with a competitor.

How Do DDOS Attacks Work?

DDoS attacks are considered as one of the most popular cyber-attacks and they have the ability to make systems go down for a very long time. Read more to learn how they work and how you can stop them. What is a DDoS attack? DDoS attack (also known as the distributed denial of service attack) is a dangerous and common type of cyber-attacks. It aims to overwhelm the target through disrupting the regular traffic of a service, network or a server.