Join the Conversation
Blog

As you set your RSA schedule, you won’t have trouble blocking off time for work-related commitments. There will be keynotes and panel discussions to attend, vendors to visit, and meetings disguised as breakfast, lunch and dinner parties. The challenge will be finding time for yourself to take a breath and relax. We’ve got your covered […]

By Ira Winkler, CISSP There’s an insidious connotation to the term “insider threat”. It sounds like a spy novel villain who infiltrates a business or government agency under the guise of a faithful employee, steals sensitive data, and escapes unnoticed. But more often than not, the person responsible for a data breach is an innocent […]

Sophos has officially halted all support, maintenance and updates for all of its Invincea products, including the browser isolation (container) designed to protect you from unknown malware. Don’t panic if your organization is an Invincea customer – your product license remains active until the end of its current term, albeit without any support or updates […]

We’re co-hosting a webinar today (Wed. 1/29 at 3 pm EST) with Michael Osterman, President of Osterman Research, that will focus on the public sector threat landscape.  Webinar: Cybersecurity Challenges and Solutions for State & Local Governments Wednesday, January 29th | Noon PDT (3:00 PM EDT) Register to attend on BrightTALK Osterman Research is preparing […]

Source: tech.co By Rene Kolga Microsoft’s End of Extended Support date for Windows 7 and Windows Server 2008/R2 was January 14, and that seems to be creating a global panic. But don’t let the alarmist news headlines or Microsoft’s apparent attempt to discourage you from participating in its own Extended Security Updates (ESU) program scare […]

By Rene Kolga Nyotron founder and CTO Nir Gaist and I recently led a webinar on the Nyotron Research team’s discovery of the RIPlace evasion technique that malicious actors can use to bypass anti-ransomware technologies and other security solutions. The recording is now available for free here.  Nir explained how the technique leverages a legacy […]

By Ira Winkler, CISSP I am frequently asked to write predictions for the coming year. To summarize my expectations for 2020: the same as 2019, but worse. It’s not possible for the industry to make sweeping changes in a mere 12 months.  Security is an iterative and an evolutionary problem, not revolutionary. When you look at […]

By Ira Winkler, CISSP Traditional anti-malware software looks for files with known signatures to detect those that contain malicious software. When a server or email client receives a file, the security software scans for malware. However, if malware can somehow avoid being scanned, it has a chance to cause harm. Steganography is one proven way attackers […]

Source: (ISC)² Cybersecurity Workforce Study There are few career paths that hold as many exciting job opportunities for new and experienced candidates as cybersecurity. Companies and government agencies large and small are increasing their cybersecurity investments, and expanding their security departments. But an air of desperation hangs over the industry because the gap between the […]

We recently announced our discovery of a new Windows evasion technique we’ve named “RIPlace” that renders most ransomware protection technologies ineffective. All businesses and the public sector are potentially vulnerable, so our efforts to inform security professionals continue. This week Nyotron Founder and CTO Nir Gaist will lead a webinar that will feature a live […]

Subscribe to our blog

Follow us on Social Media