How to avoid the network-as-a-service shell game

How to avoid the network-as-a-service shell game

I can’t tell you how many times one of my clients or contacts has complained about the difficulties associated with getting network-budget approval. If I’d never met a CFO in person, the description these people gave me would have led me to expect something like a troll or a zombie, bent on eating projects and maybe people, too. Do we wear garlic when we visit the CFO, or maybe do a chant before the meeting,…

Read More

Preventing security breaches with human intelligence and software automation – Cisco Blogs

Preventing security breaches with human intelligence and software automation – Cisco Blogs

In today’s dynamic threat landscape, IT teams are inundated with security alerts, making security operations difficult to manage without the use of automation. After all, the amount of malware and ransomware being injected into enterprise infrastructure is exponentially higher than the threat detection and response measures most organizations have in place. At the same time, machines can struggle with gray areas and generate false positives. As such, organizations cannot rely solely on automation tools to…

Read More

Gartner Endpoint Protection Platforms (EPP) Magic Quadrant 2020: Our Key Takeaways

Gartner Endpoint Protection Platforms (EPP) Magic Quadrant 2020: Our Key Takeaways

Key Takeaways Going back to my days as one of the co-founders of Immunet Corporation more than a decade ago, the goal was always to deliver the most efficient and dynamic endpoint protection. Long before there was “EDR”, we were already going beyond traditional AV and well into delivering cloud-native detection and response capabilities to defend the endpoint. But we were quick to realize that for us to unleash the true power of endpoint security,…

Read More

Four Confess to ‘Bulletproof Hosting’

Four Confess to ‘Bulletproof Hosting’

Four men from Eastern Europe have pleaded guilty to supporting cyber-criminals attacking the United States by providing them with ‘bulletproof hosting’ services (BPHS). BPHS are run with a ‘don’t ask, don’t tell’ approach and ensure the anonymity of users while allowing them to host malicious activity and content such as malware. According to court documents, 34-year-old Russian nationals Aleksandr Grichishkin and Andrei Skvortsov, 33-year-old Aleksandr Skorodumov of Lithuania, and Estonian 30-year-old Pavel Stassi were the founders…

Read More

Rise of the Chief Intelligence Officer (CINO)

Rise of the Chief Intelligence Officer (CINO)

Anomali Sr. Director of Cyber Intelligence Strategy A.J. Nash recently penned a column for United States Cybersecurity Magazine about how changing security challenges call for new skillsets and leadership professionals, who can help to develop ad run new programs that keep pace with modern adversaries. In “Rise of the Chief Intelligence Officer (CINO),” A.J. makes a case for why this position is needed and what such a leader’s skill set and experience should include. It…

Read More

Colonial Pipeline attack ratchets up ransomware game

Colonial Pipeline attack ratchets up ransomware game

The latest security incident shows how ransomware is increasingly threatening critical infrastructure and systems. Image: vchal, iStockphoto On Friday, Colonial Pipeline Company discovered that it had been hit by a ransomware attack. Responsible for delivering gas, heating oil and other forms of petroleum to homes and organizations, the company accounts for 45% of the East Coast’s fuel. The attack forced Colonial Pipeline to shut down certain systems, temporarily stopping all pipeline operations. In a statement…

Read More

Gartner names McAfee a Leader in 2021 Magic Quadrant for Endpoint Protection Platforms | McAfee Blogs

Gartner names McAfee a Leader in 2021 Magic Quadrant for Endpoint Protection Platforms | McAfee Blogs

At McAfee, we believe no one person, product or organization can combat cybercrime alone. That is why we continue to build our device-to-cloud security platform on the premise of working together – together with customers, partners and even other cybersecurity vendors. We continue this fight against the greatest challenges of our digital age: cybercrime. As part of our ongoing effort to protect what matters, we have developed breakthrough technologies over the past several years that enable customers…

Read More

Staff Bonus was “Crass” Phishing Simulation

Staff Bonus was “Crass” Phishing Simulation

A British train company has been criticized for running a cybersecurity test that made employees think they would receive a bonus for working hard during the pandemic. West Midlands Trains sent an email purporting to be from the company’s managing director, Julian Edwards, out to its approximately 2,500 employees. The missive thanked staff for toiling through 2020 and told them that they would receive a one-off payment as a reward for their efforts.  But what appeared…

Read More

A cyberattack shutdown US Colonial Pipeline

A cyberattack shutdown US Colonial Pipeline

A cyberattack forced the shutdown of one of the largest pipelines in the United States, the Colonial Pipeline facility in Pelham, Alabama. The Colonial Pipeline facility in Pelham, Alabama was hit by a cybersecurity attack, its operators were forced to shut down its systems. The pipeline allows carrying 2.5 million barrels of refined gasoline and jet fuel each day up the East Coast from Texas to New York, it covers 45 percent of the East…

Read More
1 3,467 3,468 3,469 3,470 3,471 3,911