Month: <span>August 2018</span>

Home / 2018 / August
Post

How To Invest Your CyberSecurity Budget

Great article for all of us that make difficult decisions on how to invest limited resources available for cybersecurity.  To summarize, tech author Giulio D’Agostino writes that the top three priorities should be: 1. Visibility – being able to visualize your entire network quickly and easily can highlight areas of vulnerability and allow you to focus resources strategically....

Post

Top Security Mistakes Putting Your Company at Risk

Cybersecurity is more painful to manage as technology architectures become more complex. Simplify your approach by avoiding these major security mistakes. In the online version of InformationWeek, Lisa Morgan discusses the top 8 cybersecurity mistakes that MANY organizations make that put them at risk of cyber attack. She asserts, and we agree, that companies need...

Post

FBI issues specific warning of pending attack

“ATM Cash Out” operations hinges of massive phishing operation Fortune Magazine and KrebsOnSecurity detail warnings issued by the FBI of a pending “ATM Cash Out” attack. Highly organized crime operations are poised to execute a worldwide attack across small to medium sized banking operations. Generally, these operations have limited security controls to detect intrusions and...

Post

World-Class Breach Detection

Powerfully simple threat hunting software. Easily identify and investigate hidden threats within your network. Infocyte HUNT® automates and simplifies threat hunting — traditionally, a specialized knowledge and services-heavy process — making it easier for security teams to investigate threats capable of evading your cybersecurity defenses and helping you mitigate the breach detection gap. Most vulnerabilities...

Post

ALERT: Fax Machines Targeted By Hackers

Hackers are targeting your old fax machines, Israeli cybersecurity firm warns Check Point: Security flaws in 45 million business fax machines worldwide could be used as a backdoor into otherwise protected networks LONDON (AP) — What could be less threatening than the old office fax machine? Nothing. That’s precisely why it’s used as a backdoor...