Insights from 700M thwarted cyberattacks show how the fight against cybercrime has intensified

2017 was a record-setting year in the fight against cybercrime. Based on analysis of real world cybercrime attacks, ThreatMetrix confirmed a 100 percent increase in volume of attacks over the last two years. The good news is that record numbers of these attacks are thwarted by organizations investing in innovative, digital-first strategies to protect consumers facing downstream attacks…

Internet of Things security issues bleed into 2018

In 2017 Internet of Things (IoT) devices rose to prominence as attackers have continued to target and use them to support various cyberattacks. IoT devices are almost the perfect target for cyberthieves. They sit on internal networks, have their own IP address, and allow communication with other internet connected devices and systems. Their ubiquity and large numbers…

CISOs are feeling less confident than ever about cyber risk and data security

Chief Information Security Officers are feeling less confident than ever about cyber-risk and data security this year, according to a survey conducted by Ponemon Institute in late 2017. As today’s climate of high-profile data breaches continues, 67% of respondents believe their companies are more likely to fall victim to a cyberattack or data breach in 2018….

The role of trust in security: Building relationships with management and employees

Massive data breaches have become the new reality, and they confirm that one of the biggest challenges companies face when it comes to security: a company’s biggest shortcomings are often not apparent until data breaches or other emergencies occur. As a result, adequately preparing for the worst and getting employees at every level of the company to give security…

Identifying Named Pipe Impersonation and Other Malicious Privilege Escalation Techniques

Privilege escalation is one of the key components of any attack that involves penetrating a system. If threat actors have limited access due to a current user’s privilege levels, they will naturally aim to escalate their privileges before expanding the scope of the attack. How can security professionals detect malicious escalation techniques before adversaries get…

The 6 best password managers

One of the smartest moves we can make to protect ourselves online is to use a password manager. It’s one of the easiest too. We’ll help you find the best password manager for you. A password manager is an excellent first step in securing your online identity, helping you increase the strength of the passwords…