October Is Malvertising Awareness Month

October Is Malvertising Awareness Month

Malvertising campaigns have pushed more than a billion malware and spam-laden ads through online advertising networks onto "secure" web browsers. Why ad-blocking software failed to stem the tide ...
How to Secure Your Content Management System (CMS)

How to Secure Your Content Management System (CMS)

The cybersecurity weaknesses of Content Management Systems make online attacks easy and likely. How to improve CMS security in the enterprise? ...
GDPR: A Letter from Elizabeth Denham

GDPR: A Letter from Elizabeth Denham

Following GDPR enforcement actions against Google, BA and Marriott, what's next for US companies with business in the EU? Compliance violators will be facing off with empowered and patient EU bureaucrats in ...
ActiveX Data Leaks: Making Bad (Non-) Browsers Worse

ActiveX Data Leaks: Making Bad (Non-) Browsers Worse

ActiveX, in combination with locally installed browsers and plugins, still poses a potent threat for enterprise cybersecurity. An overview ...
Showdown: VPN vs. Cloud Browser

Showdown: VPN vs. Cloud Browser

In many companies, VPN has become a staple of the traditional IT security stack. Annually, mid-sized organizations (<5,000 employees) spend an average of $60 per user on VPN technology and maintenance. Not ...
85% of Infected Websites Are NOT Blacklisted

85% of Infected Websites Are NOT Blacklisted

Website attacks increased by 59% in 2018, according to the 2019 Website Security Report [PDF] recently published by Scottsdale, AZ-based SiteLock, a provider of business website security solutions. Most of the attacks ...
Cloud Browser Economics 101

Cloud Browser Economics 101

"Free" browsers drive up IT security expenses in the enterprise. This itemized comparison shows how organizations using the Silo Cloud Browser save, vs. the traditional security approach with locally installed browsers ...
Browser Security: The Worst Code Injections and How They Work

Browser Security: The Worst Code Injections and How They Work

What do browser-based attacks have in common? They target locally installed browsers through malicious code injects ...
Webinar: Cloud-based Research Platform for Threat Hunters

Webinar: Cloud-based Research Platform for Threat Hunters

Webinar: Authentic8 and Recorded Future are presenting a cloud-based research platform for threat hunters ...
Financial Services: How to Minimize Vendor Risk Online in One Step

Financial Services: How to Minimize Vendor Risk Online in One Step

Here’s a quick tip for CISOs and compliance officers in banks, credit unions, investment or wealth management firms who worry about cybersecurity threats that emanate from vendors and third-party apps: Disconnect from ...