Advertise

Advertise

Federated Privileged Access for Outsourced IT

The need to govern and secure privileged access has grown dramatically as more of today’s businesses outsource functions such as IT administration and rely on vendors to troubleshoot systems and applications. Gartner predicts enterprise IT outsourcing will be a $335 billion industry by 2019. With massive data breaches making headlines seemingly every day and many…

9 steps to defend against CEO fraud

The “business email compromise” (BEC) scam, sometimes called CEO Fraud, is an effective corporate attack where crooks use social engineering to get corporate executives to wire funds to the attackers by pretending to be a corporate executive, such as the CEO. One tech company was recently swindled out of $47 million. Another company was scammed…

Unlocking the ransomware criminal business model

Cryptographic ransomware has quickly become one of the greatest cyberthreats facing organizations around the world. This criminal business model has proven to be highly effective in generating revenue for cyber adversaries in addition to causing significant operational impact to affected organizations. It is largely victim agnostic, spanning the globe and affecting all major industry verticals.…

Defending against ransomware

Q&A with Scott Simkin, Sr., threat intelligence manager, Palo Alto Networks  Question: One of the challenges companies face today with ransomware versus traditional malware is that ransomware uses advanced cryptography to make user systems inaccessible.  What can companies do to ensure that the attackers’ encryption is stopped before it reaches critical data on corporate servers?…

Understanding advanced evasion techniques

There are a lot of insidious players on the loose, burrowing their way into corporate networks. Some bang on the front door and demand a ransom for the data they kidnap. Others, however, use advanced evasion techniques (AETs) to bypass traditional common network security solutions. They can transport any attack or exploit through network security…

Three quick tips for preventing ransomware

The most effective strategy for stopping ransomware attacks relies on preventing them from entering your organization. As the number of applications and services used by businesses continue to increase, the result can be an increase in attack surface. Organizations must consider how to secure these new services across the network, SaaS-based applications and endpoints from the start.…

Improving network operational efficiency

When determining the operational costs of running an enterprise network, the noted research firm Gartner says that 80 percent of the total IT costs occur after the initial purchase. The significance of recurring operational costs is not always realized by organizations that are mainly focused on short-term investments. Correct configuration is fundamental for network security.…

Don’t dump your perimeter security

While perimeter security has certainly changed over the years, it would be negligent to suggest that companies not protect the edge of their network as best as they can. Want proof? Published reports of a recent hack at an Asian bank netted the criminals more than $80 million due to an underpowered router that was…