Threat
Manufacturers of Medical Devices wake up to Cyber Security Threats
Companies which manufacture medical devices like pace makers, insulin pumps and glucose monitoring machines are sending their staff to cyber security conferences in order to learn from the researchers the latest in the world of cyber security. At the recently held Black hat Conference held in Las Vegas and the Def Con, representatives from big […]
Predictive Analytics could help counter Ransomware Cyber Threats
Ransomware has become a dreaded menace to both businesses and users of personal computers. Reason- the said malware not only helps hackers in holding technology as a hostage but also helps the cyber crooks in stealing valuable info which could trigger instant privacy concerns. Experts say that Predictive Analytics(PA) may prove as the best answer […]
Mitigate your Maritime Cyber Threats with ShipSecure
World Link Communications has made it official that its latest solution suite named ‘ShipSecure’ has the potential to thwart cyber threats of any range targeting the shipping community. Thus, by offering a ShipSecure suite, World Link Communications happens to be the world’s first company to provide services that help mitigate cyber threats targeting vessels by […]
Users using Rental Websites like Airbnb are vulnerable to Cyber Attacks
Briton’s holidaymakers are being warned by law enforcement agencies about scammers posing as homeowners renting their flats & villas and duping innocent people for thousands of pounds. And as per an estimate prepared by Daily Mail more than 100 people a week are being cheated out of thousands of pounds by fraudsters, leaving them with […]
Macbook users are being targeted by malware and backdoors in 1Q 2017
A recent survey conducted by security firm Malwarebytes suggests that cyber criminals are constantly targeting Macbook users by malware and backdoors in 1Q 2017. Moreover, the study analyzed that FindZip Mac Ransomware for which even the developers don’t have a decryption key yet has emerged as a major MacOS threat in this year. The survey […]
bringing advanced threat protection to the cloud
This post was originally published here by Salim Hafid. Threats to corporate data are growing at a rapid pace, particularly with malware and ransomware becoming more sophisticated. The potential for a zero-day attack to compromise your endpoints, cloud apps, and more is very high. In fact, more endpoints are at risk now with the popularity […]
What is Threat Hunting in Cybersecurity Defense
This post was originally published here by Håkon Olsen. WHAT IS HUNTING AND WHY DO IT? A term that is often used in the cybersecurity community is threat hunting. This is the activity of hunting for intruders in your computer systems, and then locking them out. In the more extreme cases it can also involve […]
Enterprise Information Networks and the Threat Environment
This post was originally published here by OLIVER LAVERY. Securing an enterprise information system is no trivial task. That is because today’s systems are complex and need to be viewed holistically. No longer can IT security only think of a network as a combination of components that can be protected by compartmentalizing them. Today’s networks are […]