Network Security Blog

Home / Network / Network Security Blog
Admittedly, most IT professionals would not characterize the threat and consequences of cyberattack as a ‘game’. To most, it is best characterized as a ‘war’. But “that’s not exactly right” writes Martin Barrett in a recent article on the SecurityIntelligence website. He makes a good case – though many of us IN the game aren’t always having a good time playing it! He discusses a free resource that you might find helpful. The free e-book
Security Blog
, , , , , , , ,
Great article for all of us that make difficult decisions on how to invest limited resources available for cybersecurity.  To summarize, tech author Giulio D’Agostino writes that the top three priorities should be: 1. Visibility – being able to visualize your entire network quickly and easily can highlight areas of vulnerability and allow you to focus resources strategically. 2. Upgrading – Can any portion of your network be upgraded? Then it probably SHOULD be! Legacy enterprise solutions just won’t stand
Security Blog
Cybersecurity is more painful to manage as technology architectures become more complex. Simplify your approach by avoiding these major security mistakes. In the online version of InformationWeek, Lisa Morgan discusses the top 8 cybersecurity mistakes that MANY organizations make that put them at risk of cyber attack. She asserts, and we agree, that companies need to figure out what is the acceptable level of risk they are willing to live with concerning their data security.
Security Blog
“ATM Cash Out” operations hinges of massive phishing operation Fortune Magazine and KrebsOnSecurity detail warnings issued by the FBI of a pending “ATM Cash Out” attack. Highly organized crime operations are poised to execute a worldwide attack across small to medium sized banking operations. Generally, these operations have limited security controls to detect intrusions and unauthorized movement inside a network. http://fortune.com/2018/08/14/fbi-atm-cash-out-heist/ The attackers are targeting banking systems through the use of phishing emails in order
Security Blog
Powerfully simple threat hunting software. Easily identify and investigate hidden threats within your network. Infocyte HUNT® automates and simplifies threat hunting — traditionally, a specialized knowledge and services-heavy process — making it easier for security teams to investigate threats capable of evading your cybersecurity defenses and helping you mitigate the breach detection gap. Most vulnerabilities remain undiscovered — within your network, systems, and devices — for months, sometimes years. In fact, the average global dwell
Security Blog
Hackers are targeting your old fax machines, Israeli cybersecurity firm warns Check Point: Security flaws in 45 million business fax machines worldwide could be used as a backdoor into otherwise protected networks LONDON (AP) — What could be less threatening than the old office fax machine? Nothing. That’s precisely why it’s used as a backdoor for hackers to get into an organization’s network. Check Point, a cybersecurity firm in Israel, said Sunday that its research
Security Blog
Since the massive March 22nd SamSam ransomware attack against the City of Atlanta, nearly $17 million has been spent on cleanup, new devices, and better security. Read more about the Atlanta SamSam infection here – http://bit.ly/NSG_20180806 While this is certainly one approach to mitigating the severe damage, data loss and shutdown of systems, it is a very expensive one. Most security experts recommend more aggressive preventative measures that can detect the threats that are already
Security Blog
I often see promotional emails offering penetration testing for a ridiculously low price. This should be a red flag to anyone that receives something like this. What they are actually selling is usually a vulnerability assessment and that is quite a different thing than a true penetration test! It is not uncommon for someone in my position to review a 300-page “penetration test” report that consists of nothing but a listing of vulnerabilities discovered by
Security Blog