Unfortunately, cyber-attacks have become part of the landscape of modern times. Not limited to geography, industry or technology used, they do their damage and elevate stress levels around the world. One of the latest examples is the recent WannaCry ransomware cyber-attacks that affected thousands ...
Next week marks the start of ISC West 2017 under the neon lights of the Vegas Strip. Verint will join approximately 1,000 exhibitors and over 20,000 attendees—gathered to talk about the latest innovations and trends in the security industry.  The message of convergence continues to dominate the ...
Despite our best efforts, cyber attacks are getting more aggressive and sophisticated. The threat of targeted attacks is real, and the cyber security landscape must change with the need for greater vigilance. Today leading analysts are encouraging organizations to deploy solutions that go beyond ...
By now, the concept of the cyber attack chain—or kill chain—is widely accepted as a way to understand and deal with threats. The first thing that malware does once it’s established on the network is call home—reach out to a Command and Control (C&C) server. C&Cs are famous for controlling botnets, ...
Aware of the dangers and probability of suffering a data breach, organizations are rethinking their security posture. They realize that the traditional prevention-based security model, based on signature-based perimeter tools, is no longer effective against advanced cyber threats. To avoid being ...
There has been a lot of discussion lately about the cyber skills shortage. No question our industry must do more to provide education about cyber security and to encourage more students to launch down this path. But in the meantime, there is much that can be done to help improve efficiency and ...
Despite the fact that companies invest $92 billion annually on cyber security, 80% of organizations are still breached. Just recently, highly publicized breaches at Acer, Cisco’s GotoMyPC, and Calgary University suggest that on the whole, our approach to cyber defense is fundamentally flawed. And ...
What does this alert mean? Why is it important? What should I do? Our main takeaway from Infosec London 2016: Cyber security professionals are overloaded with information. And what they really want and need is answers. In the panel discussions, leading CISOs explained the difficulty they experience ...
Catching and investigating cyber attacks feels a bit like detective work. And whenever I think of detectives, one of my favorites comes to mind: Sherlock Holmes. The Sherlock Holmes stories are always a fun read as well as a great mental workout.  I’m always fascinated by the way Sherlock Holmes ...
Terms such as ATM skimming, identity theft, data breaches, scams, kiting, and phishing are becoming all too prevalent in today’s society. In just the last five years we’ve seen large, well-known retail and financial services organizations attacked by hackers and other nefarious individuals looking ...
As major data breaches to leading enterprises continue to make headline news, there is a rising awareness of the need to protect sensitive business assets from cyber attacks. Once considered a technical issue to be handled by the IT team, cyber threats are now considered a clear and present ...

Subscribe to Email Updates

Posts by Topic