Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

PCI DSS 3.2 - Protecting Your Organization from the Next Big Ransomware Threat

As the number of Ransomware attacks continues to rise, retail and healthcare organizations are increasingly challenged to keep pace. Ensuring employees are aware of common attack types and staying vigilant in testing, patching and monitoring your systems can drain the resources of any team.

3 Emerging Innovations in Technology that Will Impact Cyber Security

The war between security experts charged with the responsibility of protecting information and cyber-criminals who threaten to compromise the integrity of data for different entities has become a cat and mouse game. For instance, as soon as white hats counter one form of malicious behavior using encryption tools, there is the almost immediate development of yet another malevolent form of threat for information systems.

Internet of Things security practices for your business

Wearables, smart speakers, remote security systems, connected cars, inventory trackers, smart headphones: these are just a handful of the connected devices in modern workplaces. The Internet of Things (IoT), or internet-enabled devices that collect and act upon data, is becoming more popular with ever-increasing applications. Far beyond a smart coffee pot that automatically gets the brew going to start the workday, the Internet of Things is changing business security and vulnerability in a big way.

EventSentry SysAdmin Tools: Digital Signature Verification with checksum.exe

Windows supports a code-signing feature called Authenticode, which allows a software publisher to digitally sign executable files (e.g. .exe, .msi, …) so that users can verify their autenticity. The digital signature of a file can be viewed in the file properties in Windows explorer on the “Digital Signature” tab.