SIEM Capabilities: Monitoring and Detecting Potential Risks

Published: June 19, 2019   |   No Comments  |  Read more

If you’ve spent any time paying attention to security technology, you will undoubtedly have heard the term “SIEM,” or Security Information and Event Management. For a time, this term was used to refer to simple centralized log aggregation and monitoring, but SIEM products have matured alongside technology advances. SIEM now includes detailed log analysis and […]

Phishing and Spear-Phishing – If it didn’t work, they wouldn’t keep doing it …

Published: February 26, 2019   |   No Comments  |  Read more

Phishing isn’t really a new threat – it’s something that has existed in many forms since the very beginnings of commercial availability of e-mail. By all rights, it’s truly just an extension of social engineering – pretending to be someone or something that you’re not in order to gain unauthorized access to information or credentials […]

Meet PortSmash, everyone’s favorite new side-channel execution attack.

Published: November 13, 2018   |   No Comments  |  Read more

In February 2017, a security researcher and white-hat hacker published information about a set of side-channel/speculative execution attacks that impacted approximately 20 years of Intel and AMD CPUs (among others), allowing for protected memory restrictions to be bypassed by a targeted malicious attack. These vulnerabilities were labeled SPECTRE and MELTDOWN and received a large amount […]

3 things EVERYONE can do to enhance security without ruining productivity

Published: September 28, 2018   |   No Comments  |  Read more

Building a secure environment is a constant balance between usability and protection – additional security controls often add steps to the day-to-day of the very people that the controls are intended to support and protect. That’s why it’s important to recognize and elevate the security controls which provide major benefits at a minimal impact to […]

Security in an IoT World

Published: October 27, 2016   |   2 Comments  |  Read more

Botnet attacks exploit Internet of Things devices. Learn how to improve IoT security for internet-connected devices against botnet attacks that exploit your IoT device security.

The Persistent Threat of Ransomware

Published: October 9, 2015   |   No Comments  |  Read more

The last few months have seen a resurgence of the CryptoLocker/Cryptowall ransomware malware across many IT organizations. This malware is particularly impacting and has cost many companies significant time and money, and in some cases has caused the permanent destruction of business critical information and documents.