Tag "Zero Day"

Back to homepage
Industry Insights

The 3 Most Powerful Types of Threat Information Sharing – and How to Stay Compliant

When it comes to IT security, the unknowns impose the greatest threat. Luckily, many types of threats are very much on the cybersecurity radar. Institutions and organizations who pay attention

Software

Email Still Poses a Cyber-Threat, but There is Hope

The total number of emails sent and received daily worldwide exceeds 281 billion and is forecast to grow to over 333 billion by 2022. Cyber-criminals have taken advantage of this

Hardware/Network

Endpoint security solutions challenged by zero-day and fileless attacks

There is an endpoint protection gap against modern threats, the result of a recent survey by the Ponemon Institute and Barkly have shown. The organizations polled 660 IT and security

Industry Insights

The 3 Most Powerful Types of Threat Information Sharing – and How to Stay Compliant

 When it comes to IT security, the unknowns impose the greatest threat. Luckily, many types of threats are very much on the cybersecurity radar. Institutions and organizations who pay attention

Hardware/Network

The Threat Of Online Attacks On National Security Has Soared

News broke earlier today that Ciaran Martin from the National Cyber Security Centre warned the threat of cyberattacks on Britain’s critical national security infrastructure from hostile states like Russia and

Software

How to Prepare for ‘WannaCry 2.0′

More than a year after it first struck, WannaCry is still one of the most damaging cyberattacks to date. It cost the global economy billions of dollars, although the impact

Software

Zero Trust: Method or Madness?

First coined as a concept by Forrester Research in 2010, Zero Trust security commands intense interest from IT and security executives everywhere. While there are many piecemeal Zero Trust implementations in enterprises

Hardware/Network

Tips for Hardening Networks Against IoT-based DDoS Attacks

The Internet of Things (IoT) has been a boon for the cybercriminal industry. IoT devices number in the billions worldwide and most are unsecured or undersecured, making them appealing targets

IT Compliance

Compliance is Not Synonymous With Security

While the upcoming GDPR compliance deadline will mark an unprecedented milestone in security, it should also serve as a crucial reminder that compliance does not equal security. Along with the

Software

Common IT Tools are the Hacker’s Favorites

Malware, along with targeted attacks that can move laterally and evade traditional detection methods, are a huge and growing concern. Popular hacker tools like Mimikatz are being combined with stolen NSA