February 22, 2019 | Javvad Malik

Things I Hearted This Week, 22 Feb 2019

We have two weeks of news to catch up with because I was travelling last week and wasn’t able to submit to the editor in time.But that just means double the security fun. So let’s just jump right into it.Helping The Smaller BusinessesSmall and mid-sized businesses have most of the same cybersecurity concerns…

February 21, 2019 | Kate Brew

Fileless Malware Detection: A Crash Course

Given you’re here, you’re likely new to this topic, so please be aware in that fileless malware, fileless malware attack, and fileless attack are different words for the same thing. With that clear, let’s jump in! What is Fileless Malware and How Does It Work?There are many definitions of a fileless malware…

Get the latest security news in your inbox.

Subscribe via Email

February 20, 2019 | Javvad Malik

Securing People

Cybersecurity has three pillars of people, process, and technology. Enterprises have historically had a skewed focus towards the technology aspect of cyber security - installing another endpoint agent, or deploying another network monitoring device designed to seek out anomalys behaviour.While all these things are well and good, when you look at user awareness plans, and most companies have a…

February 8, 2019 | Javvad Malik

Things I Hearted This Week, 8th February 2019

What a wild week it’s been. There have been assaults on researchers (ok, just one that I know of), there’s a great look into changing company cultures, and RDP has a flaw.All this and more, in this week’s action-packed edition of things I hearted this week.Assaulting ResearchersThe short version is that…

February 6, 2019 | Javvad Malik

Security Have and Have-Nots

Security Have and Have-NotsWay back in around the 2010 / 2011 timeframe Wendy Nather coined the phrase "The Security Poverty Line" in which she hypothesised that organisations, for one reason or another (usually lack of funds), can't afford to reach an effective level of information security.Nearly a decade on, and while the term has sunk into frequent usage within the…

February 5, 2019 | Devin Morrissey

6 Security Tips When Trading Online

Image Source: PixabayOnline trading is on the rise as many consumers take control of their own investments or work with brokers virtually rather than in person or over the phone. At the same time, cybersecurity attacks are on the rise as hackers also try to take advantage of gaps in the system, stealing identities and even money.How do…

February 4, 2019 | Daniel Kobialka

SIEM: What Is It, and Why Does Your Business Need It?

Security information and event management (SIEM) technology is transforming the way IT teams identify cyber threats, collect and analyze threat data and respond to security incidents. But what does that all mean? To better understand SIEM, let's take a look at SIEM technology, how it works and its benefits.What Is SIEM?SIEM technology is a combination of security…

February 1, 2019 | Javvad Malik

Things I Hearted This Week, 1st Feb 2019

Hello February! I was doing some research last night and was surprised to discover that the Target breach is over five years old! Five years! I was sure it only happened a couple of years ago - but such is the fast-paced nature of the industry, and also I guess a testament to how certain major breaches become part of…

January 31, 2019 | Tawnya Lancaster

APT10 Group Targets Multiple Sectors, But Seems to Really Love MSSPs

Threat Actors That Don’t Discriminate When it comes to threat actors and the malware variants they use, let’s talk dating — or rather, the way people date — because one could argue there are marked similarities between the two. You see, there are criminal groups who have a “type,” i.e. using malware…

January 30, 2019 | Bindu Sundaresan

Top 7 Tips for Improving Cyber Risk Management in 2019

With the constant barrage of headlines regarding breaches in the last few years, it seems that society in general has become numb to losing personal data. This year’s overarching cybersecurity theme is clear: We’re all in this together because we simply can’t do it alone. Effective defense demands a team effort where employees, enterprises,…

January 29, 2019 | Javvad Malik

Ways to Respond to a Breach

Breaches aren’t easy to deal with, especially if you are of the opinion that companies are people too. Having seen, been part of, and lent a shoulder to many a breach, here are nine of the common ways companies respond to breaches.Delayed responseA delayed response is when a breach has occurred and the company is informed…

Watch a Demo ›
GET PRICE FREE TRIAL