Top

Tag: security


Monitoring, Monitoring&Analysis, Security

Future cyber security threats and challenges: Are you ready for what’s coming?

September 19, 2017

Via: CSO

The world is changing, and with it so is the internet. Or perhaps it’s the other way around. The internet continues to create new business and social opportunities that massively scale and widely interconnect. The increasing depth and volume of […]


Monitoring&Analysis, Security

Achieving long-term resilience with NIST’s Cybersecurity Framework

September 19, 2017

Via: CSO

The laudable aim of the National Institute of Standards and Technology (NIST) is to build a common language through a set of best practices and security principles that any organization can apply to combat cybercrime. We’ve looked at what NIST’s […]


Monitoring&Analysis, Security

Volunteer your services, not your personal information

September 19, 2017

Via: CSO

After seeing the devastation from hurricanes Harvey and Irma, many people wanted to help the victims. Some donated money, while others donated their time and traveled to neighborhoods and helped homeowners clean up. Having helped during super-storm Sandy, I know […]


Analysis, Monitoring&Analysis

What is the biggest threat from the Equifax breach? Account takeovers

September 18, 2017

Via: CSO

Yes, there will be some tax and banking fraud as a result of the gargantuan data breach at Equifax. The biggest impact, however, will be felt by enterprises that rely on credit reporting bureaus to verify the identity of people […]


Monitoring&Analysis, Security

AI, ML – is it all just BS?

September 18, 2017

Via: CSO

Read a security related press release or been to an event recently? You’ve no doubt been wondering how you managed to do your job all this time without Artificial Intelligence (AI) or Machine Learning (ML). Do these technologies really live […]


Monitoring&Analysis, Security

Build it right with NIST’s Cybersecurity Framework

September 18, 2017

Via: CSO

Thomson Reuters will also offer access to Visible Alpha’s Oneaccess Broker Vote application within Eikon, which allows users to populate recommended benchmarks based on weighted interactions data to understand the value resulting from all research relationships, and to Visible Alpha’s […]


Software

Intel makes Core software available to open source community

September 15, 2017

Via: RCR Wireless News

The Open Networking Foundation (ONF), a nonprofit that serves projects creating solutions using open source software and software defined standards, recently unveiled that Intel Labs’ has made its Xeon Processor based virtualized Evolved Packet Core (vEPC) reference software available to […]


Monitoring, Monitoring&Analysis

Your security scars are the key to innovation

September 15, 2017

Via: CSO

Scars are an interesting aspect of life. Visible scars — like the one I have over my lip from a dog bite — are a reminder and the opening for a story. Ask me about it sometime. Other scars are harder to […]


Monitoring&Analysis, Security

DDoS protection, mitigation and defense: 7 essential tips

September 15, 2017

Via: CSO

DDoS attacks are bigger and more ferocious than ever and can strike anyone at any time. With that in mind we’ve assembled some essential advice for protecting against DDoS attacks.1. Have your ddos mitigation plan ready Organizations must try to anticipate […]


Analysis, Monitoring&Analysis

PowerShell Tools Have Become an Attackers Weapons

September 14, 2017

Via: Toms IT Pro

PowerShell is rapidly becoming a weapon of choice for post-breach (infiltration) steps, used in many recent high profile breaches. PowerShell, according to Dave Kennedy, is “BASH for Windows” – it’s a scripting language and framework that in Windows is used […]