Category: Cyber Security

Shadow IT is Alive and Well: One-Third of Employees Deploy Their Own Software

Employees see IT as an “inconvenience” and look for ways to get around security measures, putting the organization at risk, according to SailPoint’s 2018 Market Pulse Survey. IT can’t make the organization secure if the user is working in the exact opposite direction. IT puts security controls on file sharing, and users open a personal […]

Reduce the Risk of Data Breach by Focusing on Compromised Credentials

The bad guys can’t do anything on your network without access. That’s why they focus their efforts on gathering as many sets of credentials as possible. You should focus there too. The cybercriminals don’t just want to get onto a user’s endpoint and simply stop there; their goal is most commonly to monetize the attack […]

Next Generation Firewalls May Not Stop Malware

Best Defense Against Malicious Encrypted Traffic Bad actors and malicious insiders are concealing threats in encrypted traffic in an attempt to steal sensitive data. In fact, it is predicted that as much as 70% of cyberattacks will use encryption as part of their delivery mechanism by 2019. Meanwhile, the use of encryption is growing rapidly. […]

How to Choose a Cloud Load Balancer

Load balancing of application traffic has been around for a long time. But, as more organizations move to the private and public cloud, it’s undergoing significant changes. Let’s look at some of the important considerations of this evolving technology. Three major requirements underlie IT operations and DevOps today: agile, efficiency and, multi-cloud operations. – Agile: […]

Dutch audit finds Microsoft Office leaks confidential data

The diagnostics Microsoft Office collects from users should be a source of concern for any government CISO, according to a DPIA audit ComputerWeekly reported: “A report commissioned by the Dutch government has recommended disabling any settings in Microsoft Office 2016 that sends data to Microsoft servers. Dutch government users have also been advised to consider […]

Phishing Accounts for 50% of All Fraud Attacks [InfoGraphic]

According to the latest research from RSA, attacks intent on committing financial fraud most frequently begin with tried and true phishing. Financial fraud is a lucrative business for cybercriminals. Running the gambit from targeting banks directly to social engineering used to giving up online credentials or a credit card, there are a myriad of ways […]

Malware Targets 67 Online Brands Ahead of Black Friday

14 malware families have been discovered as part of an elaborate scam aimed at users shoppers of major e-commerce sites looking for pre-Black Friday deals. We’re all gearing up for some level of online purchasing for the holidays. The lure of great deals is enough to get any shopper paying attention to promotions of sales […]

Are you wasting money on this common cybersecurity investment?

A wasted investment is the last thing any organization needs, yet the cost of a cybersecurity solution doesn’t necessarily equate to value. Consider Security Information and Event Management, or SIEM tools for example. Dark Reading points out that the tool itself is not the key factor in the effectiveness – it must be properly configured […]

Could you have the same vulnerability that led to the Equifax breach?

Regardless of the size of your organization, it’s very likely that you could. Vulnerabilities including the bug reportedly responsible for Equifax’s data breach are still common elements of open-source systems used by developers for creation of business applications and web portals. While this saves time and money on the development side, unless they perform regular […]

Three Misconceptions of Breaking and Inspecting SSL Traffic [Video]

There are a lot of misconceptions about breaking and inspecting SSL traffic. So much so that some companies elect to go without the ability altogether. In this video, A10 Senior Federal Lead SE James Schweitzer separates fact from fiction when it comes breaking and inspecting encrypted traffic and highlights the benefits of a dedicated decryption […]