Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Attackers are using Windows Management Instrumentation (WMI) and PowerShell to avoid detection and carry out broad commands on compromised systems, according to FireEye-owned Mandiant.
Avast has launched a free, cloud-managed solution dedicated to small and medium businesses (SMBs) with limited budgets and resources.
Check Point Software Technologies has acquired Hyperwise, a privately held, security startup focused on CPU-level threat prevention technology.
Japan's National Institute of Information and Communications Technology (NICT), which has a network of a quarter of a million sensors, said there were 25.66 billion attempts to compromise systems, according to a report.
The developers of the advanced purely-functional programming language Haskell are investigating a data breach identified by the organization’s hosting provider.
FireEye's Global Threat Intelligence Sharing initiative will allow customers to bi-directionally share threat intelligence in near real-time.
Register for this webcast to learn how you can align, automate and enforce controls to security and compliance policies - while providing visualization, workflow and reporting critical to improving operational efficiency and reducing audit costs.
The US Army Research Laboratory (ARL) has released the source code for Dshell, a framework that can be used to analyze cyberattacks.
Information-sharing is one of those phrases that get thrown around a lot, but there isn't a lot of agreement on how organizations should be working together or the methods they should be using.
LightCyber, an Israel-based security breach detection and response solutions provider, today announced an improved version of its LightCyber Magna platform.

FEATURES, INSIGHTS // Network Security

rss icon

Jason Polancich's picture
Most businesses today are not as secure as they could be due to an inaccurate view of their own cyberdefenses.
Rebecca Lawson's picture
As companies deploy new security technologies, understanding the impact on overall network performance should be a very important factor in the decision-making process.
Joshua Goldfarb's picture
Most enterprises collect huge quantities of data that result in shorter retention periods and longer query times. This perfect storm of circumstances creates a very real operational challenge.
Scott Simkin's picture
It doesn’t take the most advanced tools to break into the the largest corporations on the planet. Between user behavior and the types of malicious files attempting to compromise enterprises, there are a few steps you can take to reduce your risk exposure.
Pat Calhoun's picture
As enterprises continue to expand their arsenal of security products in an effort to strengthen protections against advanced threats, they often introduce complexity.
David Holmes's picture
Many of the hardware RNGs within the load balancers can be tapped to provide real, hardware-based entropy for dozens, hundreds, or even thousands of machines within that data center.
Marc Solomon's picture
“Slow and Low” isn’t just a popular song by the Beastie Boys. It’s also the tempo that adversaries are now choosing to launch attacks and evade detection.
Joshua Goldfarb's picture
The past few decades in the information security field have been dominated by passive failure. Clearly, not every new idea has merit, but those ideas that come about scientifically and methodically have tremendous potential to improve the state of security.
Rebecca Lawson's picture
As we enter the New Year, it’s time to reflect on these latest occurrences and consider what they may lead to in the year that lies ahead.
Nate Kube's picture
There are interesting lessons learned from IT IPS experiences that OT can benefit from. The first is to understand how attackers have bypassed traditional IPS IT solutions.