5 Reasons to Give Malware Analysis a Try
Staying ahead of potential threats and understanding your unique risk and exposure are paramount today. That’s why next-generation sandbox tools, like ThreatAnalyzer (formerly CWSandbox), are so...
View ArticleParis Airport’s Windows 3.1 System Failure Got Us Thinking
Remember the early ‘90s? Pearl Jam, Jerry Springer, Wolfenstein 3D – and Windows 3.1? Paris Orly International Airport, the second-busiest French airport in passenger traffic, made headlines last week...
View ArticleThreatTrack Empowers Big Data Security with Splunk Integration
If we were all Sherlock Holmes—or his cyber-sleuth equivalent—detecting and stopping cybercrimes would be a whole lot easier. But most of us are not, and sorting through potential threats, and making...
View ArticleCybersecurity Optimism Faded as Breaches Continued
The past year has seen some fascinating cybersecurity moments – just look at the Office of Personnel Management cyberattack, Army National Guard and Harvard University data breaches, or the Ashley...
View ArticlePutting a Price Tag on Your Data
The year began with grand visions for combating every cybercriminal who came our way, but as we close 2015 we’ve discovered that many cybersecurity professionals still feel they have a long way to go...
View Article5 Factors You Should Consider for Threat Intelligence
Few people can solve every problem and answer every question about the cybersecurity world in a day. And all too often that’s for one reason: A lack of the right information to answer the question....
View ArticleCybersecurity Snapshot for 2016
The Information Systems Audit and Control Association (ISACA) surveyed nearly 3,000 IT and cybersecurity professionals from 121 countries about their opinions on several issues, with topics varying...
View ArticleThe Worst Passwords of 2015 Show People Are Still Putting Themselves at Risk
SplashData, a provider of security applications and services, released their fifth annual “Worst Passwords List” for 2015. Since 2011, SplashData has reported that “123456” and “password” are the most...
View ArticleA New Way to Maximize Network Visibility
Businesses everywhere need more threat detection insight than they realize. A shocking 84% of Information Systems Audit and Control Association respondents in a recent survey said the likelihood was...
View ArticleTop 10 Ways to Keep Taxpayer Data Safe
Tax season is officially upon us (unfortunately), and the IRS is taking extra steps this year to make sure taxpayer data is protected. In the United States alone, businesses lose an estimated $15...
View ArticleThree Steps to Leverage Data Science for Yourself
We’ve talked about how crucial cyber-situational awareness is to predicting and stopping cyberattacks, but doing that yourself is a whole different story. Whether the task is too tedious, there aren’t...
View Article2016 Verizon DBIR – The Best Insights Yet
This year is the ninth year Verizon has published its annual Data Breach Investigations Report (DBIR). Once again, organizations sent their data on thousands of security incidents and data breaches to...
View ArticleAnother Win for ThreatTrack’s Advanced Malware Protection
ThreatTrack was recently named the winner of a Silver Stevie® in the New Product of the Year, Best Software Security Solution category for its advanced malware protection platform, ThreatSecure®...
View ArticleThreatTrack Announces Cisco pxGrid Integration
ThreatTrack is making it easier for enterprises to defend themselves from advanced malware threats. Today ThreatTrack announced that ThreatSecure Network integrates with Cisco Identity Services Engine...
View ArticleCRN Women of the Channel Honors Two ThreatTrack Leaders
ThreatTrack’s Tami Sarjeant and Meredith Bankenstein were recently named to CRN’s prestigious Women of the Channel list. The annual list identifies leaders and rising stars whose initiative and...
View ArticleTop Takeaways From Black Hat 2016
Black Hat 2016 is behind us and it did not disappoint. The cybersecurity conference in Las Vegas yielded three fascinating takeaways for companies, governments, security professionals, and end-users....
View ArticleAdvanced Attacks and How to Stop Them
The massive influx of alerts the average organization gets in a day is insurmountable – and the rate that attackers are able to sneak malware into your systems is evidence enough that combatting...
View ArticleHow SMBs can Deal with Ransomware Threats
Ransomware Incidents are Surging — How Small and Medium Sized Businesses can Deal with These Threats. If the surge in ransomware attacks is not on your radar, it should be. Since the start of the year,...
View ArticleHow to Detect Malware and Other Anomalous Behavior
Experts agree that the cost of cybercrime to organizations of all sizes is increasing annually, and as global commerce inevitably continues its virtual transition, the costs will certainly rise. In the...
View Article55% of SMBs Experienced a Cyberattack in Last 12 Months
Small and midsized businesses (SMBs) are just as susceptible to cyberattacks as enterprises. The big difference is that smaller companies lack the budget and in-house expertise to strengthen their...
View Article
More Pages to Explore .....