Things I Hearted this Week, 25th May 2018

May 25, 2018 | Javvad Malik
May 10, 2018 | Mike LaPeters

Opportunity for Managed Services: InfoSec

The single, biggest opportunity for channel partners in 2018 is to stand in the path of aggressive hackers as they attempt to exploit businesses around the world. Today’s threat landscape is infinitely more complex than even three years ago, and companies are finding themselves more at risk because they just don’t have the infrastructure, resources, personnel and…

May 9, 2018 | Chuck Brooks

Cybersecurity, Is there Light at the End of The Tunnel in 2018?

2017 was certainly a challenging year for cybersecurity. The volume of data breaches continued to climb from the already alarming experiences of previous years. The sophistication and intensity of cyberattacks from social engineering, ransomware, and DDOS attacks also experienced exponential growth. The question remains, what should we expect (or fear) in 2018?Succinctly, in 2017, globally there were a total of 5,207 breaches and 7.89…

Get the latest security news in your inbox.

Subscribe via Email

May 8, 2018 | Javvad Malik

Social Media Risks – The TweetChat

Our latest Tweetchat was on the topic of Social Media risks and featured guest Joseph Steinberg.Why did we choose social media? Social channels are easy to overlook when companies are assessing assets and assigning criticality. Social usually falls under the banner of marketing, so IT teams sometimes have little or no visibility altogether into the digital footprint a company…

May 7, 2018 | Kim Crawley

Explain Biometric Authentication

Authentication in and outside of computing can be done in one of three ways. It can be based on something you know, such as a password. It can be based on something you have, such as a keycard. Or it can be based on something that you are. That’s where biometrics comes in.A very brief history of…

May 4, 2018 | Javvad Malik

Things I Hearted this Week, 4th May 2018

May the fourth. I’m sure there’s a sci fi reference to be made here somewhere, but I just can’t put my finger on it. I’m sure it will come to me soon enough.In the meantime, enjoy the security news, views, and opinions that caught my eye this past week.Schools out…

May 2, 2018 | Joshua Lemon

Social Engineering Tactics

A man and a woman are standing side-by-side at the reception desk of your company. He is wearing dark, tattered jeans and a black sweatshirt with the hood pulled up. She is wearing a light cardigan over a conservative, blue and short, but elegant, heels. Which would you suspect of malicious intent?Gone are the days of the underground malicious…

May 1, 2018 | Chris Doman

MassMiner Malware Targeting Web Servers

Written in collaboration wih Fernando MartinezOne of the biggest malware-trends of 2018 has been the increasing variety of crypto-currency malware targeting servers.One family of mining malware, we’ve termed “MassMiner”, stands out as a worm that not only spreads itself through number of different exploits, but also brute-forces access to Microsoft SQL Servers. It surprised us…

May 1, 2018 | Danielle Russell

AlienVault Monthly Product Roundup April 2018

We are continuously making improvements and rolling out new features to USM Anywhere to help your team to be more effective at detecting and responding to threats. You can keep up with USM Anywhere releases by reading our release notes in the AlienVault Product Forum. Here is a roundup of the highlights from our April 2018 releases:Go Threat Hunting with…

April 30, 2018 | Jeremy Rasmussen

Patching Frequency Best Practices

A client asked the other day for guidance on best practices regarding how often they ought to patch their systems. My immediate thought was “continuously.”  However, most small to mid-sized enterprises don’t have the resources for that.If you go to a source such as the Center for Internet Security they talk about patching…

April 27, 2018 | Javvad Malik

Things I Hearted this Week, 27th April 2018

Master KeysF-Secure researchers have found that global hotel chains and hotels worldwide are using an electronic lock system that could be exploited by an attacker to gain access to any room in the facility. The design flaws discovered in the lock system’s software, which is known as Vision by VingCard and used to secure millions of hotel…

April 26, 2018 | Devin Morrissey

Financial Fraud: What Can You Do About It?

Financial fraud used to be simple. Erase the ink from a check, make it out for more money, and laugh as you withdrew money. Nowadays, it requires a bit more finesse but is still simple in concept. Thankfully, it’s also fairly easy to protect yourself or your company from financial fraud in a highly digitized world.In 2017, massive…

April 25, 2018 | David Bisson

Certificate Lifecycle Management: People, Process and Technology

Trust and Digital CertificatesTrust is a valuable commodity in the age of data proliferation. An abundance of information makes it possible for bad actors to impersonate trusted brands using fake websites and accounts. Organizations therefore need a way to ensure that potential customers can trust their identity when visiting their official website, especially if they decide to purchase their…

Watch a Demo ›