Data Loss Prevention

Data Loss Prevention (DLP)

virus detection

Quick Take-Aways From the RSA Security Conference

Good discussions and industry focus, too much hype, lots of work ahead


RSA conference 2017

RSA roundup: 5 security vendors CISOs need to be aware of

Here are five companies that security professionals should consider in their quest to keep their organizations secure.

frustrated computer user

Tech support scams are on the rise, up 24%, warns Microsoft

Social engineering attacks like the Microsoft tech support scams still work. Fake cold calls, fake messages on websites, and malicious emails continue to trick victims.

Dana Deasy

The Top 3 cyber priorities for DOD’s incoming CIO

The DOD’s new top IT executive Dana Deasy will be an important cog in DOD’s big push toward universal defense cloud adoption, facilitating organizational changes that will make the military’s cyber defense more streamlined and...

cloud computing - data center

Review: Protecting clouds with Cloud Defender from Alert Logic

Cloud Defender is a user-friendly tool that lets local IT staff inspect their cloud deployments to look for evidence of hidden threats or breaches. But it can also be used in a SaaS model, with the cybersecurity team at Alert Logic...

4 shock stunned fear

Negative motivation is not positive engagement

The barrage of fearmongering and FOMO over social media and advertising leads to a vicious cycle of negative engagement that builds anger and frustration that can’t be addressed by buying new products. We can break the cycle through...

healthcare security

Is your organization a HITRUST org?

For good reason, there's now more focus on regulatory compliance for healthcare—which also includes a multitude of vendors and business associates to manage risk for and meet or exceed the Health & Human Services (HHS) compliance...

Israel Barak
video

Honeypots and the evolution of botnets | Salted Hash Ep 23

Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm's recent honeypot research, which gathered information showing how the bot landscape is evolving.

cyber crime cybersecurity

Implementing the NIST cybersecurity framework could be worth at least $1.4m to your business

While there are many other frameworks available, the NIST CSF provides a nationally recognized guideline as you scale your business and cybersecurity program.

cyberwarfare defense illustration

Nation state attacks – the cyber cold war gets down to business

Cyber weaponry is moving to new frontiers: yours. Businesses are the next target on the nation state menu. Are you protected or vulnerable?

security risk - phishing / malware / social engineering

What is cross-site scripting (XSS)? Low-hanging fruit for both attackers and defenders

With XSS, attackers enter malicious code into a web form or web app URL to trick the application into doing something it's not supposed to do.

virtual transactions - digital money - cryptocurrency - blockchain

Cryptomining, not ransomware, the top malware threat so far this year

Cryptominer-based attacks increased, while ransomware-based attacks decreased in Q1 2018, according to Comodo Cybersecurity Threat Research Labs.

Facebook Data Debacle - Android

Breaking down Facebook’s communications playbook

Lessons learned from Facebook’s response to its data privacy crisis, and how you can use them to protect your own reputation – even if you aren’t a tech giant.

security

Left-shifting enterprise appsec: what we can learn from mobile app developers

Multiple, concurrent innovations in enterprise application development present the opportunity to improve application security by “left-shifting” it to the beginning (and throughout) the dev cycle. Mobile app developers have to a...

ransomware breach hackers dark web

SamSam explained: Everything you need to know about this opportunistic group of threat actors

The group behind the SamSam family of ransomware is known for recent attacks on healthcare organizations, but that's not its only target.

adrian sanabria
video

Is it time to kill the pen test? | Salted Hash Ep 22

Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Adrian Sanabria, director of research at Savage Security, about de-emphasizing network penetration tests to put more focus on attack simulations and helping...

cloud security ts

Driving cybersecurity and digital transformation with cloud technologies

Enterprises – especially in regulated industries – need to demonstrate compliance with NIST, HIPAA and GDPR to address an increasing set of privacy and cybersecurity threats. Cloud computing platforms provided a ready-made solution,...

russian military

Russia is hacking routers in global cyber attacks, US and UK warn

In a first-of-its-kind advisory, the U.S. and U.K. warned of malicious cyber activity by state-sponsored Russian hackers who are targeting network infrastructure devices.

01 hot products at rsa 2018

Hottest cybersecurity products at RSA 2018

Here's a quick run-down of some of the new products announced at the conference, or shown there for the first time.

Load More