At its most fundamental level, the objective of network security is a simple one. Organizations need to protect their people, assets, and the data that travels across and resides within their networks. They do this by setting security policies that detail parameters like who or what is allowed to access which resources.
Ransomware like CryptoLocker and WannaCry has become more sophisticated over the years. No wonder that more ransomware attacks are expected this year. To fend off these threats, turn to virtualized disaster recovery (DR) solutions. They’re your best defense against ransomware.
The firewall remains the front line of cyber-defense for most organizations. The firewall protects an organization’s network, and that function isn’t going away anytime soon. Remember when people used to say, “the firewall is dead”? The numbers tell a different story.
Let’s be honest: administering email is a pain. Routing issues, disk quotas, bouncebacks, the times when users can send but not receive emails, receive but not send, or they flat out cannot send or receive—the list goes on.
It’s no wonder that email-hosting services like Office 365 have become so popular.
I recently had the pleasure of participating in a panel discussion at the Cyber Security Summit USA in Denver, CO, on the topic of cloud INsecurity. The panel needed to cover the common pitfalls that organizations make when moving to the cloud and how to avoid them.
In my previous post, I discussed one of my favorite topics: The Heisenberg Principle of Security vs. Privacy. There is another law of physics I typically use that has an analogue in security: lightspeed. The closer you get to lightspeed, the more energy you need to go faster, and conversely any object with mass cannot actually achieve lightspeed.
Often spoken in a single breath—security and privacy—they are nonetheless orthogonal quantities in many aspects. Enforcing security often means compromising on privacy, and vice versa: a perfectly private conversation cannot be monitored for security.
Do you remember the movie “Die Hard”? Arguably the best Christmas movie ever. All kidding aside, this movie has a great correlation into security best practices. Before we go into that, let’s recap. The bad guys in the movie were going to steal $640M in bearer bonds.
To avoid detection by antimalware programs, cybercriminals are increasingly abusing legitimate software tools and legitimate programs in systems to steal data or ruin its integrity. They use fileless malware to infiltrate trusted applications and issue executables that blend in with normal network traffic or IT/system administration tasks while leaving fewer footprints.
The word “hacker” conjures up an image of a hoodie-wearing basement dweller that programs all sorts of malicious attacks to infiltrate their target’s computer. But hackers are so much more than that. There are also hackers that use their skills to do good.