Threat

Mitigate your Maritime Cyber Threats with ShipSecure

World Link Communications has made it official that its latest solution suite named ‘ShipSecure’ has the potential to thwart cyber threats of any range targeting the shipping community. Thus, by offering a ShipSecure suite, World Link Communications happens to be the world’s first company to provide services that help mitigate cyber threats targeting vessels by […]

Users using Rental Websites like Airbnb are vulnerable to Cyber Attacks

Briton’s holidaymakers are being warned by law enforcement agencies about scammers posing as homeowners renting their flats & villas and duping innocent people for thousands of pounds. And as per an estimate prepared by Daily Mail more than 100 people a week are being cheated out of thousands of pounds by fraudsters, leaving them with […]

Macbook users are being targeted by malware and backdoors in 1Q 2017

A recent survey conducted by security firm Malwarebytes suggests that cyber criminals are constantly targeting Macbook users by malware and backdoors in 1Q 2017. Moreover, the study analyzed that FindZip Mac Ransomware for which even the developers don’t have a decryption key yet has emerged as a major MacOS threat in this year. The survey […]

bringing advanced threat protection to the cloud

This post was originally published here by  Salim Hafid. Threats to corporate data are growing at a rapid pace, particularly with malware and ransomware becoming more sophisticated. The potential for a zero-day attack to compromise your endpoints, cloud apps, and more is very high. In fact, more endpoints are at risk now with the popularity […]

What is Threat Hunting in Cybersecurity Defense

This post was originally published here by Håkon Olsen. WHAT IS HUNTING AND WHY DO IT? A term that is often used in the cybersecurity community is threat hunting. This is the activity of hunting for intruders in your computer systems, and then locking them out. In the more extreme cases it can also involve […]

Enterprise Information Networks and the Threat Environment

This post was originally published here by OLIVER LAVERY. Securing an enterprise information system is no trivial task. That is because today’s systems are complex and need to be viewed holistically. No longer can IT security only think of a network as a combination of components that can be protected by compartmentalizing them. Today’s networks are […]

Share this page