Join the Conversation
Blog

In November 2019 Nyotron announced the discovery of an evasion technique that could enable cyberattackers to maliciously encrypt files in a way that the majority of anti-ransomware products cannot detect. We called it RIPlace.  You can find full details about the technique, along with videos, an FAQ, a link to the webinar, and other information […]

Businesses around the world are re-opening their offices and welcoming back employees who have been forced to work from home for nearly three months while the world battled the coronavirus pandemic. But research shows the majority of people want to continue working remotely, at least part-time. The fact is, your organization’s security perimeter has permanently […]

When a cyberattacker tricks a user into clicking on a malicious link, the lionshare of the blame for the resulting data breach usually falls on that user’s shoulders. But that’s unfair. The reality is that no matter how well prepared your users are, one will inevitably make a mistake. That’s why Nyotron has invited me […]

Source: Getty Images The spread of the coronavirus is disrupting businesses and government agencies worldwide. But for cyber attackers, it’s business as usual. They see the global pandemic as just another opportunity to take advantage of people’s fears to distribute spam, spread disinformation and steal sensitive corporate data. And the fact that your organization’s security […]

The introduction to Osterman Research’s new report on cybersecurity threats to the healthcare industry strikes an ominous tone: “Hospitals account for one-third of data breaches in the United States… without significant improvements in cybersecurity readiness, healthcare providers will continue to suffer at the hands of cybercriminals.” Fortunately, the report also lays out the game plan […]

Source: iStockPhoto By Rene Kolga How difficult is the CISO’s job (and, for that matter, the jobs of all IT security pros)? The headline of this recent article by ZDNet’s Catalin Cimpanu says it all: “Average tenure of a CISO is just 26 months due to high stress and burnout”.  That’s the key finding of […]

By Rene Kolga The headline of this recent article in Sophos’ excellent Naked Security blog, “Nearly half of hospital Windows systems still vulnerable to RDP bugs”, is both alarming and run-of-the-mill. Alarming because about half of connected hospital devices remain vulnerable to the BlueKeep Windows flaw nearly a year after it was reported. But it’s […]

Source: TV.com By Ira Winkler, CISSP The long forgotten show CSI: Cyber deserves to be long forgotten – it was one of the worst shows on TV. It portrayed ridiculous scenarios where highly skilled criminals could turn computers into death traps. The plot of one of the absurd episodes (a very low bar) was that a […]

As you set your RSA schedule, you won’t have trouble blocking off time for work-related commitments. There will be keynotes and panel discussions to attend, vendors to visit, and meetings disguised as breakfast, lunch and dinner parties. The challenge will be finding time for yourself to take a breath and relax. We’ve got your covered […]

By Ira Winkler, CISSP There’s an insidious connotation to the term “insider threat”. It sounds like a spy novel villain who infiltrates a business or government agency under the guise of a faithful employee, steals sensitive data, and escapes unnoticed. But more often than not, the person responsible for a data breach is an innocent […]

Subscribe to our blog

Follow us on Social Media