One of the most famous security breaches in recent memory, the hack of the US Democratic National Convention email server, was conducted via fileless attack. The hack was comprised of targeted emails from seemingly legitimate sources that contained links to infected web pages, which subsequently allowed hackers to...
Perhaps the most important measure that an organization can take is to shift its perspective on cybersecurity from one that focuses simply on perimeter defenses to one that also limits the dwell time of an attacker
who manages to penetrate its environment. This shift limits the potential damage the attacker can...
As the volume and speed of network data increases, security
tools are unable to keep up, resulting in security tool sprawl,
performance degradation, inefficiencies and unnecessary
expenditures. All of this leads to increased time to threat
detection and response and a higher risk of a breach - despite
In this seminal report on the state of cybersecurity in the healthcare industry, 20 of the industry's leading CISOs share how attackers have evolved over the past year, the biggest concern these security leaders have (HINT: it's not cybersecurity for most) and how confident they are in their cybersecurity...
Are your threat prevention tools struggling to keep up with the
increasing speed of your organization's network? Is the number
and variety of security tools you think you need starting to tax
your budget and overcomplicate your security infrastructure?
This paper outlines how the GigaSECURE® Security...
It's time to face a hard truth: Modern enterprise networks can be extremely sometimes
painfully complex to manage and defend. Even worse, these behemoths may be
constructed of legacy hardware that can barely keep up with the demands of a modern
workforce. Network speeds to 100Gbps, unfettered access to cloud...
Network performance and security are vital
elements of any business. Organisations are
increasingly adopting virtualisation and cloud
technologies to boost productivity, cost savings
and market reach.
With the added complexity of distributed
network architectures, full visibility is necessary
A security researcher has found a significant flaw all versions of Docker, an open source container platform, that can give attackers read and write access to all the files within the host system, allowing them to execute arbitrary code. As of now, there's no patch available.
For attackers, "credential stuffing" - using stolen usernames and passwords to log into any site for which a user reused their credentials - is the gift that keeps on giving, says security researcher Troy Hunt. Here's how organizations can mitigate the threat.
Reports that the city of Baltimore was attacked using a vulnerability in Windows originally stockpiled by the National Security Agency have triggered a blame game. Cybersecurity watchers are debating attacker culpability, patch management prowess and zero-day stockpiling.
A security researcher warns that nearly 1 million devices running older versions of Microsoft Windows remain vulnerable to a recently discovered flaw in Microsoft's Remote Desktop Protocol service that could enable attackers to use a worm-like exploit to take over unpatched machines.
Unified endpoint management (UEM) exists because devices have grown in number, variety and complexity of how they're being used in the workplace. So how should IT & Security leaders approach UEM?
Download this exclusive eBook on UEM ROI and learn about:
The emergence of the UEM market;
Top questions security...
The U.S. Commerce Department will offer a 90-day reprieve to a handful of companies that conduct business with Huawei before the Trump administration's ban on the use of the Chinese company's technologies fully kicks in, the Wall Street Journal reports. Meanwhile, Google announces it will continue to work with Huawei.
The Department of Homeland Security is warning that Chinese-made drones could be sending sensitive data back to their manufacturers, where it can be accessed by the government, according to news reports.