July 6, 2018 | Javvad Malik

Things I Hearted this Week, 6th July 2018

Here's an idea.Have convicts in prison manually mine cryptocurrencies.Call it, <wait for it> the blockchain gang!Thank you very much, I'll be here all week.Now on to the serious stuff.10 THINGS TO KNOW BEFORE GETTING INTO CYBERSECURITYYou may know Kevin Beaumont as @GossiTheDog on twitter. He won the 2018 EU blogger awards for…

July 5, 2018 | Danielle Russell

Simplify Compliance Reporting with AlienVault USM Anywhere

USM Anywhere delivers a comprehensive library of predefined compliance report templates for PCI DSS, HIPAA, NIST CSF, and ISO 27001, so you can accelerate your security and compliance programs and be audit-ready faster. It also includes 50+ predefined event reports by data source and data source type, helping to make your daily monitoring and reporting activities more eficient.In addition to predefined…

Get the latest security news in your inbox.

Subscribe via Email

July 3, 2018 | Javvad Malik

Cloud Based Security

Benedict Evans stated that, the best is often the last. He elaborates by saying, "The development of technologies tends to follow an S-Curve: they improve slowly, then quickly, and then slowly again. And at that last stage, they're really, really good. Everything has been optimised and worked out and understood, and they're fast, cheap and reliable."And while…

June 29, 2018 | Javvad Malik

Things I Hearted this Week, 29th June 2018

It's been an absolutely lovely warm week in London. The sun has been shining, allergies have been high, and kids have been missing out on all the wonders because they're too busy being indoors staring at a mobile device or tablet.Things were very different back in my days... and just like that, I've turned into my…

June 26, 2018 | Mike Duffy

SMBs: 3 Signs It’s Finally Time to Replace Your AntiVirus

Antivirus has been a foundational element of protecting endpoints at small and medium-sized businesses for going on three decades. During that time, the threat landscape has changed dramatically. Thanks to the proliferation and commodification of sophisticated hacking tools, SMBs are now seeing the types of attacks formerly leveled almost exclusively at governments and large enterprises.These new attacks — and…

June 25, 2018 | Kanika Sharma

Safety Measures for Protecting Your Business from Cyber Attacks

All sizes of businesses are now targets for cyber criminals. Per the Verizon 2018 DBIR, 58% of data breach victims are small businesses. Furthermore, it is shocking to see that 60% of small businesses are shut down within 6 months of an attack, according to the National Cyber Security Alliance. So, what makes these small enterprises prone to cyber-attacks? Probably it is the…

June 22, 2018 | Chris Doman

Malicious Documents from Lazarus Group Targeting South Korea

By Chris Doman, Fernando Martinez and Jaime BlascoWe took a brief look at some documents recently discussed and reviewed by researchers in South Korea over the past week. The malware is linked to Lazarus, a reportedly North Korean group of attackers. One malicious document appears to be targeting members of a recent G20 Financial Meeting, seeking coordination of the…

June 22, 2018 | Javvad Malik

Things I Hearted this Week, 22nd June 2018

The Tesla InsiderElon Musk sent out an email stating an employee had stabbed the company in the back like Brutus, changing production code, and leaking inside information. I'll admit that like many people who have talked about or written about insider threats in the past, I instinctively punched the air and yelled, "YES! I warned you but you…

Common Scams

The risks organizations face from cyber threats are at epidemic levels.  The threats are sophisticated, attack your weakest links (your employees) and are continuing to evolve at an alarming rate.  Here are some of the most effective cyber scams EDTS Cyber sees facing organizations today. Email Account Compromise:Email account compromise is on the rise, primarily because…

June 20, 2018 | Jose Manuel Martin

GZipDe: An Encrypted Downloader Serving Metasploit

At the end of May a Middle Eastern news network published an article about the next Shanghai Cooperation Organization Summit. A week ago, AlienVault Labs detected a new malicious document targeting the area. It uses a piece of text taken from the report as a decoy:This is the first step of a multistage infection in which several servers and…

June 20, 2018 | Mike LaPeters

10 Opportunities for MSPs and MSSPs to Deliver MDR Services

The proliferation of cybersecurity attacks and greater adoption of cloud applications and services is proving that traditional, prevention-only approaches are ineffective. Instead, organizations are focusing more on a detection and response strategy to manage their cybersecurity risk. However, staying up to date with the latest cybersecurity risks, managing multiple point security products, and finding skilled security resources is proving too…

June 19, 2018 | Devin Morrissey

Corporate Information Security Vs Government Legislation: Who Is to Blame For Data Breaches?

Data breaches have become a hot button topic in recent years. From the ransomware attack that breached the National Health Service in the U.K. to the disastrous Equifax breach that just keeps going, major corporations and government entities are discovering that no one is immune to cyber attack.Where, in the end, does the buck stop? Is there an…

Watch a Demo ›
GET PRICE FREE TRIAL