Guru's Picks

Corelight logo

Corelight was founded by Dr. Vern Paxson (a Professor of Computer Science at UC Berkeley and Chief Scientist at Corelight), Robin Sommer (CTO) and Seth Hall (Chief Evangelist) to deliver network visibility solutions for cybersecurity built on an open source framework called Zeek (formerly Bro). Paxson began developing Zeek in 1995 when he was working at Lawrence Berkeley National Laboratory (LBNL). The software is now widely regarded as the gold standard for both NSM and...

Read more
OneLogin Award

  OneLogin has announced the winners of several awards at its annual user conference, Connect19 London. Winners were selected from OneLogin’s customer base of over 2,500 businesses, that were evaluated based on quantitative metrics, individual usage and companywide adoption of a “security-first” mindset. Businesses were nominated across four categories: Most Collaborative, Best Cloud Growth, Most Creative Use, and the prestigious System Integrator of the Year. Dennis Reno, vice president of global customer success and technical...

Read more
Kapersky IoT malware

Kaspersky honeypots – networks of virtual copies of various internet connected devices and applications – have detected 105 million attacks on IoT devices coming from 276,000 unique IP addresses in the first six months of the year. This figure is seven times more than the number found in H1 2018, when only around 12 million attacks were spotted originating from 69,000 IP addresses. Capitalising on weak security of IoT products, cybercriminals are intensifying their attempts...

Read more
Ransomeware

Since October 1,  Armor, a global cloud security solutions provider, has identified 15 new organizations which have been hit by ransomware in the U.S. including 5 healthcare networks and/or organizations, 2 municipalities (one of which has suffered 3 ransomware attacks this year), 3 school districts, a police department, the North Carolina State Bar,  2 Florida employment agency offices, and 1 radio station (the 10th radio station to be hit this year). Hackers Hit 5 Healthcare Networks and/or Organizations...

Read more
Risk Management

One Identity, the identity-centered security specialist, has released new global research, conducted by Dimensional Research, revealing the significant prevalence and impact of cyberattacks that use stolen hashed administrator credentials, also referred to as Pass the Hash (PtH) attacks. Among the survey’s most noteworthy findings is that 95% of respondents say that PtH attacks have a direct business impact on their organisations. The study of more than 1,000 global IT professionals reinforces the crucial need for...

Read more
Route to collaboration

Market-leading technology solution provider, World Wide Technology and Cybereason, the creators of leading Cyber Defence Platform, have recently announced a promising partnership. This collaboration will allow the customers of both companies to bring autonomy to their cybersecurity settings by combining multiple data sources, businesses context, machine learning and big data analytics to better protect their organizations, and proactively reduce the potential of a cybersecurity breach.   Both companies have displayed enthusiasm at the partnership that...

Read more
Sesame Street characters

Hackers have breached the infrastructure of Volusion, a leading e-commerce solution for small businesses, allowing them to collect customer card details from between 6,500-20,000 sites. The attack occurred via the implementation of a modified JavaScript file that included malicious code that logs card details entered in online forms code. Here's what cybersecurity experts had to say. Saryu Nayyar, CEO of Gurucul: "This incident is a reminder that data no longer resides solely in a single, on-premise data...

Read more
Organisations worldwide failing to adequately protect sensitive data in the cloud

A new global study from Thales, with research from the Ponemon Institute, has exposed an increasing disparity between the rapid growth of data stored in the cloud and an organisation's approach to cloud security. Although nearly half (48%) of corporate data is stored in the cloud, only a third (32%) of organisations admit they employ a security-first approach to data storage in the cloud. Surveying over 3,000 IT and IT security practitioners in Australia, Brazil, France, Germany, India...

Read more
Password Security

LastPass by LogMeIn today released the results of their 3rd Annual Global Password Security Report, a study that offers insights into employee password behaviors as well as emerging trends around identity and access management at businesses worldwide. Among the key findings from this year's report is that while more businesses are investing in security measures like multifactor authentication (MFA), employees still have poor password habits that weaken companies' overall security posture. Given that stolen and reused credentials are...

Read more
Onapsis smart city

Onapsis, the leader in business application protection, today announced the findings of a new IDC survey titled ‘ERP Security: The Reality of Business Application Protection’ sponsored by Onapsis. According to the survey of 430 IT decision makers, ERP applications are ‘critical’ to business operations. Sixty-four percent of the 191 decision makers surveyed whose organizations rely on SAP or Oracle E-Business Suite confirmed that their deployments have had an ERP-related breach in the last 24 months....

Read more
Page 3 of 7 1 2 3 4 7