Stopping Threats in Their Tracks With Proactive Monitoring

With household names such as Renault ceasing manufacturing and the National Health Service of the U.K. actively redirecting patients from hospitals that are incapable of providing critical health care, ransomware has moved well beyond an annoyance that impacts your grandmother’s laptop and directly into the global spotlight. Over the past few days, however, the behavior…

APT3 hackers linked to Chinese intelligence

The APT3 hacker group, which has been attacking government and defense industry targets since 2010, has been linked to the Chinese Ministry of State Security, according to a report by Recorded Future. Other attackers have been linked to the Chinese military, but this is the first time a group has been connected to Chinese intelligence,…

Breaking TLS: Good or bad for security?

As the use of TLS by malware and phishing increases, some security practitioners are seeking solutions to break TLS so they can monitor all traffic in and out of their network. Breaking TLS is typically accomplished by loading an inspection CA certificate that dynamically generates certificates by your TLS inspection device. The public key from…

3 in 5 companies expect to be breached in 2017

New research found that of the 50 percent who reported being breached in 2016, the average material impact to the business was $4 million. Vanson Bourne interviewed 600 senior IT decision-makers at organisations with at least 1,000 employees across Australia, France, Germany, Italy, the United Kingdom and the United States.

World Password Day: Make the Internet a more secure place

Identity theft is one of the world’s fastest growing crimes, but adding strong authentication to your password can prevent it. Today is World Password Day, and here are some of the comments Help Net Security received from the infosec community. This year’s World Password Day is particularly pertinent as it marks almost a year to…

Safe online shopping and banking on your Mac

Macs are commonly believed to be safe from malware, but — setting aside the fact that they aren’t — what about other risks? When it comes to shopping online, phishing is the main problem. Phishing websites look just like real ones, but instead of selling goods or services, they steal your bank or credit card…

Security and the human factor: Creating a positive user experience

Despite the myriad of security solutions deployed, breaches are still happening. Even with the most robust security solutions it seems that we’re failing with the fundamentals, with ever more sophisticated hacks infiltrating and bringing down networks or resulting in compromised data. For all the security solutions we can create, it’s people who are the first…

Cyber risk issues resonating in boardrooms

The Cyentia Institute used in-depth surveys and interviews with corporate board members and CISOs to identify specific cyber risk issues resonating in boardrooms. CISOs report they spend most of their boardroom time “giving security guidance” on business enablement and loss avoidance. Surprisingly, CISO respondents reported they spend far less time discussing “data protection” and “brand…