cyberthreat
Cybersecurity: Chernobyl and its Cyber Lessons
Looking at cybersecurity through the lens of a nuclear disaster can help your organization be more prepared when emergencies arise HBO’s recent “Chernobyl” series, which re-told the story of the nuclear accident ...
Countdown to Zero: Why Zero Trust is in the Spotlight
In today’s expanding threat landscape, a zero-trust architecture is critical to protecting the enterprise “The best offense is a good defense” is a common adage in the sports world. After all, no ...
Ransomware, Phishing and Endpoint Attacks: The Top 3 Cyberthreats
Cyberthreats have been prevalent on the internet for decades now. Unfortunately, malware has been evolving more rapidly than the anti-malware software needed to combat it. The three most active cyberthreat categories worldwide ...
U.S. Army, Towson University Aim to Advance Intrusion Detection
Researchers at the Army Research Lab (ARL) within the U.S. Army Combat Capabilities Development Command and Towson University are collaborating on an effort to make intrusion detection alerts more useful to cybersecurity ...
IBM Warns Retailers of Trojan Threat
IBM has issued a cybersecurity advisory warning about an attack method originally developed for defraud banks that now is being applied to the retail sector. Limor Kessem, global executive security advisor for ...
The Rise of Fileless Malware
Fileless malware that can evade traditional anti-virus programs means organizations must employ additional measures to monitor and secure their networks. From crypto-ransomware and destructive malware to advanced persistent threats that exploit zero-day ...
Are You Prepared for a Malicious Insider Threat?
Earlier this month, Tesla became the poster child of the damage a single malicious insider can do to your company. Tesla CEO Elon Musk sent an email to employees about an employee ...
Why Fileless Malware Will Continue Its Rapid Expansion
Fileless malware has received a lot of attention lately, and with good reason. In the last year, fileless malware, also commonly referred to as a zero-footprint attack, has successfully infiltrated a number ...
Ready for tax season phishing scams?
As tax season looms, so do phishing scams. For cybercriminals, this is the ideal time of year to deceive unsuspecting individuals into releasing sensitive private or company information. Businesses must therefore take ...
Mitigating Cyber-Risks in Everyday Technology Use
The various applications, devices and networks in use across the world have now become so intertwined that it’s hard to keep them separate. The cloud allows users to access data and information ...