Do you remember the movie “Die Hard”? Arguably the best Christmas movie ever. All kidding aside, this movie has a great correlation into security best practices. Before we go into that, let’s recap. The bad guys in the movie were going to steal $640M in bearer bonds.
To avoid detection by antimalware programs, cybercriminals are increasingly abusing legitimate software tools and legitimate programs in systems to steal data or ruin its integrity. They use fileless malware to infiltrate trusted applications and issue executables that blend in with normal network traffic or IT/system administration tasks while leaving fewer footprints.
The word “hacker” conjures up an image of a hoodie-wearing basement dweller that programs all sorts of malicious attacks to infiltrate their target’s computer. But hackers are so much more than that. There are also hackers that use their skills to do good.
Has your organization been hit with a data breach or ransomware recently? This happens more often than you might think to businesses of all sizes. Given the frequency, complexity, and increasing number of threats, a multi-level, agile, and cutting-edge cybersecurity strategy is the only response that will protect businesses from massive losses.
The advent of scalable enterprise search based on (among other things) Lucene-based storage clusters has brought about a renaissance in analytics techniques. Knowledge discovery across the enterprise has become a possibility and many have capitalized on this.
Multi-factor authentication (MFA) is a proven method through which to ensure you’re verifying the identity of users who are accessing applications. It uses strong two-factor authentication to ensure your users are who they say they are.
But trusting users is only one component of the trusted access equation.
A few months back, my colleagues made several predictions for technologies in 2019—everything from artificial intelligence (AI) and machine learning (ML) to hybrid cloud, blockchain and the Internet of Things (IoT). Through those discussions, as well as insight from our own internal experts, they compiled predictions for the new year across a range of topics.
In my last cyber threat hunting blog, I defined cyber threat hunting and outlined when and why you should use it. Just to reiterate, cyber threat hunting is the process of proactively and iteratively searching through your network to detect and isolate advanced threats that evade existing security solutions.
In my first blog on distributed denial-of-service (DDoS) detection, “DDoS: It’s Not a Matter of If, But When,” I provide a brief understanding why someone might initiate a DDoS attack and outlined the three variations of attacks.
In part two of this series, I refute five commonly held misconceptions about DDoS. I don’t mean to scare you, but DDoS attacks have been documented to cause “beaucoup” damage to organizations around the globe.
In the tech sector, pundits are always hyping the next, disruptive technology on the verge of changing, well, everything. “Embrace this transformative new force or ignore it at your peril,” they warn. Sometimes, they even get it right. Quantum computing may very likely be one of those times.