Blog Posts Tagged with " cyber-attack"

Ef60abdc6f6ac2b963758bd4520b4c18

Non-Malware Attacks: What They Are and How to Protect Against Them?

April 26, 2018 Added by:Marcell Gogan

What are non-malware attacks, how do they differ from traditional threats, why are they so dangerous, and what can you do to prevent them?

Comments  (0)

2976a6e4f9f094965adb965397c96dcf

The Night the Lights Went out in Georgia (Almost)

March 29, 2018 Added by:Ben Carr

The ransomware attack on the City of Atlanta shows that the time is passed for not taking security seriously, although, unfortunately, too many companies still don’t understand that.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Centering Your Security Strategy on Leadership, Resilience and Fundamentals

March 16, 2018 Added by:Steve Durbin

Companies that prioritize well-equipped security programs and widespread security awareness are more prepared to grow, innovate and compete.

Comments  (0)

Cddf97a969951d5d4db2728c7894524b

Beat Them at Their Own Game: Understanding and Neutralizing Evasive Malware Tactics in the Face of Rising Attacks

March 16, 2018 Added by:Eddy Bobritsky

If there is any hope of disarming modern and well-equipped attackers, we have to beat them at their game.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Back to Basics: How Simple Techniques Can Thwart Complex APT Attacks

August 11, 2016 Added by:Avishai Wool

Professor Avishai Wool, CTO and Co-Founder of AlgoSec, discusses how organizations’ basic network structure can help or hinder APT attacks.

Comments  (0)

69fd9498e442aafd4eb04dfdfdf245c6

The Age of Advanced Threats Has Arrived

January 15, 2016 Added by:Luis Corrons

The most capable defense solutions must not only be centralized, but also be able to automatically block, identify, forensically profile and purge malware, even when it is veiled by legitimate programs and processes. The software needs to be smarter than the malware itself.

Comments  (0)

42fb3cf91c317323e67053c29ed52fbd

Cybersecurity Predictions for 2016

December 16, 2015 Added by:Tim Liu

2015 was another fascinating year for cybersecurity. From the OPM to Anthem, Ashley Madison and countless other data breaches, there was no shortage of stories capturing national attention. So what does 2016 have in store?

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Treasury Imposes Sanctions Against the Government of The Democratic People’s Republic Of Korea

January 02, 2015 Added by:InfosecIsland News

In response to the Government of the Democratic People’s Republic of Korea’s numerous provocations, particularly the recent cyber-attack targeting Sony Pictures Entertainment and the threats against movie theaters and moviegoers, President Obama today signed an Executive Order (E.O.) authorizing the imposition of sanctions against the Government of North Korea and the Workers’ Party of Korea...

Comments  (1)