Four ways security teams sabotage their own efforts

There are many reasons why enterprise security teams struggle to succeed in better managing the risks positioned against their data and business-technology systems. Sometimes these obstacles come from elsewhere within the organization, ...
Router malware worse than experts realize

Router malware worse than experts realize

In May, security experts discovered one of the most widespread malware infections in history. Now, they’re warning businesses and consumers that it’s even worse than their first assessment. The VPNFilter malware poses ...
Clustering App Attacks with Machine Learning Part 3: Algorithm Results

Clustering App Attacks with Machine Learning Part 3: Algorithm Results

In the previous blog posts in this series, we discussed the motivation for clustering attacks and the data used and how to calculate the distance between two attacks using different methods on ...
Indonesian Hacker Group Cashes In On Blockbuster Movie Titles

Indonesian Hacker Group Cashes In On Blockbuster Movie Titles

When breaking the law isn’t a barrier, there’s always a way to make a quick buck. We see it every day, and this time from an Indonesian cybercrime campaign infecting vulnerable websites ...

Employees remain obstacle to security

Your staff hates security processes. Of course, this isn’t something we didn’t already know. Antivirus software slows down their machines, and remembering zillions of passwords is a hassle. VPN software is often ...
Matthew Pascucci

Leadership First, Security Second

We’ve recently seen turnover in the government with a recent void in the Cybersecurity leadership and it lead me to think about how this is being handled in enterprises nationwide. Cybersecurity is ...
Email Impersonation Scams: What You or Your IT Staff Can Do to Protect Your Business

Email Impersonation Scams: What You or Your IT Staff Can Do to Protect Your Business

| | Cybersecurity, email, Phishing, security
A major cyber threat to businesses like yours is impersonation scams. The scheme usually involves cybercriminals mimicking business owners and executives through the use of phishing emails. The good news is that ...
Facebook

The Shared Security Weekly Blaze – Ultrasonic Hard Drive Attacks, Dangerous USB Devices, Email Fraudsters Arrested

This is the Shared Security Weekly Blaze for June 18, 2018 sponsored by Security Perspectives – Your Source for Tailored Security Awareness Training and Assessment Solutions, Silent Pocket and CISOBox. This episode ...
Building Zero Trust networks with Microsoft 365

Building Zero Trust networks with Microsoft 365

The traditional perimeter-based network defense is obsolete. Perimeter-based networks operate on the assumption that all systems within a network can be trusted. However, todays increasingly mobile workforce, the migration towards public cloud ...

Cybersecurity: Protecting All the Endpoints

Network security is an issue that is increasingly important as businesses and even households shift more workflow processes and key tasks to the network and into the cloud. While some users may ...
Loading...