Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is doxing, and how do you protect yourself from it?

If you’ve spent a lot of time on the internet, you’ve probably heard the term “doxing” before. You may know that it has something to do with online bullying, harassment, and crime, but still have questions about exactly what it means. If so, you’re not alone. Here, we’re going to explain what doxing is, how it works, and how you can protect your sensitive data.

How Independent School Districts (ISDs) Can Prevent Data Breaches

Independent school districts (ISDs) are the perfect target for cybercriminals because their networks are typically poorly secured. Many schools have inadequate security practices due to the lack of education, training, or funding. ISDs are publicly funded primary and secondary educational institutions, including elementary, middle, and high schools.

How open source C++ code can introduce security risks

Open source libraries and frameworks are a great way to jump-start development projects. Open source empowers developers to do some great things without reinventing the wheel and developing solutions for problems that have already been solved. However, adding any code to a project carries an inherent risk of introducing potential vulnerabilities that may have made their way into it through error or malice.

Webinar: The Best (Tested) MFA Features for Admins and Users - 18 August 2022

Password security has been a hot topic since the Internet’s inception. Once upon a time, securing your accounts was as simple as not setting your password as “password.” Now, there can’t be talk about password security without multi-factor authentication (MFA) and how it has become a critical solution to protect users, data, networks, and more. WatchGuard and Miercom, an independent organization focused on product testing, have worked together on testing three MFA solutions and assessing performance in user and admin experiences.

MAC Spoofing Detection with Forescout

Learn how to tackle a common problem known as “MAC Spoofing” faced by many security teams looking to control access to the network. In this video you will gain an understanding what MAC Spoofing is, why it's a problem, and how Forescout is uniquely positioned to help detect it. You will be able to differentiate between the two primary MAC Spoofing scenarios and the strategies used for detection and learn how to configure Forescout to detect both scenarios and test successfully.

Introducing the Ransomware Content Browser

Splunk SURGe recently released a whitepaper, blog and video that outline the encryption speeds of 10 different ransomware families. The outcome of this research was that it is unlikely that a defender will be able to do anything once the encryption has started. Ransomware today is also mostly “human-operated” where many systems are sought out and compromised before any encryption activities occur and, once they do, the encryption is just too fast to meaningfully affect the damage done.

6 Ways to Manage Regulatory Risk in Cybersecurity

Keeping up with ever-changing regulatory requirements for cybersecurity can prove difficult for many organizations, which may unknowingly become non-compliant if they fail to adapt to new laws and regulations. Healthcare organizations and financial services must be even more vigilant with compliance. Both sectors are subject to even stricter requirements due to the large quantities of personally identifiable information (PII) they manage.

Black Hat USA 2022: Key Highlights

Arriving at the keynote hall for Black Hat 2022, I was immediately struck by the size of the crowd – after the seemingly endless pandemic hiatus, the cyber industry had come out in force. The mood was one of enthusiasm, and the entire place reverberated with the vibrancy of reunion. It was a great event for the industry – and for HelpSystems – and a few things stuck out.