Staying Ahead of the Threat Landscape

Staying Ahead of the Threat Landscape

Radware fends off thousands of attacks on a daily basis, resulting in thousands of satisfied customers around the world. However, the evolutionary nature of the cyberattack threat landscape requires every defender to ...

The Future of Nano IoT Security

Imagine you’re sitting on your couch relaxing on a Sunday afternoon when your smart device alerts you that you are having a heart attack or that you have gone into renal failure ...
Russian hacker gets 35 years in prison for running counter-AV service

Russian hacker gets 35 years in prison for running counter-AV service

A citizen of the former USSR who had been living in Riga, Latvia faces three charges related to his operation of “Scan4you,” an online counter-antivirus service that helped hackers dodge anti-malware solutions, ...
Five Less Commonly Discussed Facts About Ransomware Everyone Should Know

Five Less Commonly Discussed Facts About Ransomware Everyone Should Know

By now, it is safe to assume that almost everyone in business has at least heard about ransomware. But, what are the implications of ransomware attacks? And what should you know about ...
After failing to jailbreak friend, Washtenaw County hacker gets seven years in prison

After failing to jailbreak friend, Washtenaw County hacker gets seven years in prison

27-year-old Konrads Voits, convicted of hacking Washtenaw County computer systems to try to get a friend out of prison early, now faces prison time himself. Volts has been sentenced to seven years ...
U.S. Pipeline Network Disables Transactions System After Digital Attack

U.S. Pipeline Network Disables Transactions System After Digital Attack

A major U.S. pipeline network temporarily disabled a system that digitally processes customer transactions following a digital attack. Energy Transfer Partners (ETP), a Fortune 500 oil and natural gas company, disclosed the ...

The FBI’s 10 Most-Wanted Black-Hat Hackers – #9 and #8

Recently, we renewed our countdown of the FBI’s 10 most wanted black-hat hackers. First up was Bezhad Mesri at number 10. He is accused of having compromised Home Box Office (HBO) employees’ ...

Emergency vs Continuous Incident Response

Would you rather be putting out fires or keeping a calm, predictable environment? Continuous monitoring of a cloud environment identifies vulnerabilities so threats can be dealt with before they become an actual ...

Cloud Security This Week – March 23, 2018

New from Evident.io A CISO’s Series of Unfortunate Events Considering the always-increasing potential for threats to your environment, a CISO’s day can become a montage of nightmares before their car even arrives ...

A CISO’s Series of Unfortunate Events

You’ve probably seen those quaint features in business publications like, “A Day in the Life of the CFO.” They always have some campy comments that try to make the person relatable (“…and ...
Loading...