Today, encryption has become ubiquitous — Google reports that as of June 1, 2019, 94 percent of traffic across all its products and services is encrypted. Google is not the only company reporting a rise in the use of encryption though; all the commonly used browsers, including Safari and Mozilla, are witnessing the same trend. […]
Five worthy reads: Fend off cyberattacks using dark web intelligence
One of the greatest advantages of the dark web is the anonymity and encryption it offers while allowing users to access everything on the world wide web. This also makes it the hotbed of some of the most notorious cyberattacks. Much of the dark net’s activities are focused around marketplaces that offer ammunition, pornography, drugs, […]
Special Directive on Domain Name System (DNS) Compromise
Last week the USA’s Department of Homeland Security (DHS) sent out a directive for all agencies to upgrade their Domain Name System (DNS) security in light of a wave of Iranian hack attempts specifically targeted at compromising DNS. The compromise The Iranian cyber-criminals attempted (it’s unknown if they succeeded), to figure out through DNS records […]
Security tips by Dave Malarky, CEO: Encryption
https://www.youtube.com/watch?v=7mFgKrcc8Qo You don’t need to resort to a corporate Pig Latin policy. It’s okay to use encryption. Let Sophos protect you instead Click HERE to learn more about Sophos’ security solutions!
Next Generation Firewalls May Not Stop Malware
Best Defense Against Malicious Encrypted Traffic Bad actors and malicious insiders are concealing threats in encrypted traffic in an attempt to steal sensitive data. In fact, it is predicted that as much as 70% of cyberattacks will use encryption as part of their delivery mechanism by 2019. Meanwhile, the use of encryption is growing rapidly. […]
Three Misconceptions of Breaking and Inspecting SSL Traffic [Video]
There are a lot of misconceptions about breaking and inspecting SSL traffic. So much so that some companies elect to go without the ability altogether. In this video, A10 Senior Federal Lead SE James Schweitzer separates fact from fiction when it comes breaking and inspecting encrypted traffic and highlights the benefits of a dedicated decryption […]
What Are You Doing to Inspect Encrypted Traffic? [Video]
Adversaries are using sophisticated tactics to bypass security defenses and infiltrate networks. Along with employing HTTPS, they’ve begun using SSH and other advanced protocols for data exfiltration. SSH, for example, is often used for remote management access because it performs well. Adversaries now use remote desktop protocol (RDP) and data exfiltration over SSH. And when […]
How do you end up with a $4.3M HIPAA fine?
A Judge ruled in favor of the Office of Civil Rights and upheld a fine of $4,348,000 against MD Anderson, a cancer treatment and research center in Texas. This was the 4th largest fine in history for HIPAA violations. What led to this judgement, and what can we learn from it? Lesson #1 – Repeat […]
Anonym und sicher Surfen mit F-Secure Freedome
F-Secure Freedome ist ein mobiler Tunnel, der Ihre Privatsphäre schützt indem alle Verbindungen verschlüsselt werden und somit Ihre Kommunikation sicher und …
Taking Stock of Tor: Top 5 Tips for Using The Onion Router
The Silk Road and NSA spying may be old news, but The Onion Router (Tor) continues to generate interest among Internet users seeking online anonymity. Tor isn’t all upside, though. As I found out, you pay a price for privacy