The Patching Problem: Best Practices for Maintaining Up-to-Date Systems

“Update ready to be installed.” IT teams and business stakeholders are probably familiar with this notification, or something like it. After all, software updates are nothing new: Whenever a vendor makes improvements or includes new capabilities on a previously-released platform, it comes with a software update. But boosting existing features aren’t the only reason that patching…
The post The Patching Problem: Best Practices for Maintaining Up-to-Date Systems appeared first on . Read More HERE…

Read more

Best Practices for Endpoint Detection and Response

There are many elements that can complicate enterprise security efforts. From the increasing sophistication of cybercriminal strategies and activities to the wide range of components connected to the network, data protection and infrastructure security has become an uphill battle. Another key factor to consider here is the array of different endpoints connected to and communicating through…
The post Best Practices for Endpoint Detection and Response appeared first on . Read More HERE…

Read more

This Week in Security News: Apex One™ Release and Java Usage Tracker Flaws

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Apex One™ enters as the evolution of Trend Micro’s endpoint security solution for enterprise. Also, learn about Java Usage Tracker’s new weakness and the conditions that enabled…
The post This Week in Security News: Apex One™ Release and Java Usage Tracker Flaws appeared first on . Read More HERE…

Read more

The BEC List: Helping Thwart Business Email Compromise through Collaboration

Today, the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) gave the JD Falk Award to the Business Email Compromise (BEC) List. The BEC List comprises cybersecurity firms, researchers and internet infrastructure companies that help deal with cybercriminal activities and schemes. The JD Falk Award is given to individuals or groups whose meritorious work has…
The post The BEC List: Helping Thwart Business Email Compromise through Collaboration appeared first on . Read More HERE…

Read more

Sound, Fury, And Nothing One Year After Equifax

One year ago today, Equifax suffered what remains one of the largest and most impactful data breaches in U.S. history. Last September, it was revealed that the personal information of 145 million Americans, almost 700,000 UK citizens, and 19,000 Canadians was stolen by cybercriminals. This information included names, addresses, birthdays, Social Security numbers, and—in some…
The post Sound, Fury, And Nothing One Year After Equifax appeared first on . Read More HERE…

Read more

This Week in Security News: Tracking and Hacking

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.  This week, Google revealed a secret deal with Mastercard that allows it to track what users buy offline. Also, Senate and House representatives warn that regulation may be coming for…
The post This Week in Security News: Tracking and Hacking appeared first on . Read More HERE…

Read more

BEC is Big Business for Hackers: What makes these attacks so hard to prevent?

For years, one of the most lucrative ways for hackers to generate profits was through ransomware attacks. These instances involve the use of strong encryption to lock victims out of their files and data – attackers then sell the decryption key in exchange for an untraceable Bitcoin ransom payment. Now, however, another highly profitable attack…
The post BEC is Big Business for Hackers: What makes these attacks so hard to prevent? appeared first on . Read More HERE…

Read more

This Week in Security News: Air Canada and Cryptojacking

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Air Canada reported a data breach that exposed passport details for more than 20,000 customers on their mobile app. Also, Trend Micro’s Midyear Security Roundup reported an…
The post This Week in Security News: Air Canada and Cryptojacking appeared first on . Read More HERE…

Read more

This Week in Security News: Banks and Botnets

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, the FBI warned U.S. banks of a wide-scale cybercrime campaign called “ATM cash-out,” in which hackers use cloned ATM cards for fraudulent withdrawals. Also, a botnet called…
The post This Week in Security News: Banks and Botnets appeared first on . Read More HERE…

Read more

This Week in Security News: Hijacks and Healthcare

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Singapore looks into the effectiveness of virtual browsers in an attempt to reduce cyberattacks on healthcare systems. Also, cybercriminals have hijacked the computer servers of the Professional…
The post This Week in Security News: Hijacks and Healthcare appeared first on . Read More HERE…

Read more