Advertise

Advertise

Unlocking the ransomware criminal business model

Cryptographic ransomware has quickly become one of the greatest cyberthreats facing organizations around the world. This criminal business model has proven to be highly effective in generating revenue for cyber adversaries in addition to causing significant operational impact to affected organizations. It is largely victim agnostic, spanning the globe and affecting all major industry verticals.…

Defending against ransomware

Q&A with Scott Simkin, Sr., threat intelligence manager, Palo Alto Networks  Question: One of the challenges companies face today with ransomware versus traditional malware is that ransomware uses advanced cryptography to make user systems inaccessible.  What can companies do to ensure that the attackers’ encryption is stopped before it reaches critical data on corporate servers?…

Understanding advanced evasion techniques

There are a lot of insidious players on the loose, burrowing their way into corporate networks. Some bang on the front door and demand a ransom for the data they kidnap. Others, however, use advanced evasion techniques (AETs) to bypass traditional common network security solutions. They can transport any attack or exploit through network security…

Three quick tips for preventing ransomware

The most effective strategy for stopping ransomware attacks relies on preventing them from entering your organization. As the number of applications and services used by businesses continue to increase, the result can be an increase in attack surface. Organizations must consider how to secure these new services across the network, SaaS-based applications and endpoints from the start.…

Improving network operational efficiency

When determining the operational costs of running an enterprise network, the noted research firm Gartner says that 80 percent of the total IT costs occur after the initial purchase. The significance of recurring operational costs is not always realized by organizations that are mainly focused on short-term investments. Correct configuration is fundamental for network security.…

Don’t dump your perimeter security

While perimeter security has certainly changed over the years, it would be negligent to suggest that companies not protect the edge of their network as best as they can. Want proof? Published reports of a recent hack at an Asian bank netted the criminals more than $80 million due to an underpowered router that was…

It’s 2 a.m. Do you Know Where Your Data is?

An essential part of protecting your data is knowing where it is all the time. Changes in privacy laws around the globe impact how you and your service providers manage your data. Stephen Lawton reports.

Identifying data security vulnerabilities

Data security hygiene does not just mean protecting your network from highly sophisticated attacks. It means making sure all the basics are covered. Could your network pass a Data Security 101 test?  Stephen Lawton reports. This editorial product was produced by the SC editorial team and underwritten by Informatica. It is part two of a four-part…

Supporting BYOD without reservation

 When Spiceworks asked survey participants who restricted BYOD access why they did so,  the top answer by a substantial margin was concern about security, followed by concern about keeping personal and corporate data separate. This is consistent with other reports about BYOD concerns over the last several years.   When asked about the greatest challenge…

Next post in Advertise