Archive

Archive

2018 Cybersecurity Predictions

Looking back, 2017 had all the twists and turns of a good disaster movie. Hackers steal and leak the NSA’s powerful exploit kit that’s then unleashed on the world through a Dr. Evilish ransomware-worm hybrid.  Later, a top U.S. credit reporting agency ... »

How do SME’s Fight off Cyber Attacks?

(Carbon Black) Does the fact that well-known brands are successfully attacked and breached mean that SMEs are even more at risk of cyber attacks? If SMEs can defend themselves against cyber attacks, how should they go about doing so? We ... »

Can employees learn not to make cyber security mistakes?

We’ve long maintained that technical means are not enough to protect a business from cyber threats. It’s possible for a single person to negate the effect of an entire information cyber security team. In many cases, it may be unintentional, the ... »

Brute Force: Anatomy of a Cyber Attack, Varonis

The media coverage of NotPetya has hidden what might have been a more significant cyber attack: a brute force attack on the UK Parliament. While for many it was simply fertile ground for Twitter Brexit jokes, a cyber attack like this that ... »

Network Access Control: Is it Dead? The History of NAC and How the Evolving Cybersecurity Industry Changed It via Bradford Networks

As enterprise organizations continue to add BYOD, IoT devices, virtual servers/cloud services, switches, routers and offices that are connected and sharing information throughout the globe, the task of identifying and securing these endpoints can seem overwhelming. To manage these trends, ... »