Join the Conversation
Blog

Sophos has officially halted all support, maintenance and updates for all of its Invincea products, including the browser isolation (container) designed to protect you from unknown malware. Don’t panic if your organization is an Invincea customer – your product license remains active until the end of its current term, albeit without any support or updates […]

We’re co-hosting a webinar today (Wed. 1/29 at 3 pm EST) with Michael Osterman, President of Osterman Research, that will focus on the public sector threat landscape.  Webinar: Cybersecurity Challenges and Solutions for State & Local Governments Wednesday, January 29th | Noon PDT (3:00 PM EDT) Register to attend on BrightTALK Osterman Research is preparing […]

Source: tech.co By Rene Kolga Microsoft’s End of Extended Support date for Windows 7 and Windows Server 2008/R2 was January 14, and that seems to be creating a global panic. But don’t let the alarmist news headlines or Microsoft’s apparent attempt to discourage you from participating in its own Extended Security Updates (ESU) program scare […]

By Rene Kolga Nyotron founder and CTO Nir Gaist and I recently led a webinar on the Nyotron Research team’s discovery of the RIPlace evasion technique that malicious actors can use to bypass anti-ransomware technologies and other security solutions. The recording is now available for free here.  Nir explained how the technique leverages a legacy […]

By Ira Winkler, CISSP I am frequently asked to write predictions for the coming year. To summarize my expectations for 2020: the same as 2019, but worse. It’s not possible for the industry to make sweeping changes in a mere 12 months.  Security is an iterative and an evolutionary problem, not revolutionary. When you look at […]

By Ira Winkler, CISSP Traditional anti-malware software looks for files with known signatures to detect those that contain malicious software. When a server or email client receives a file, the security software scans for malware. However, if malware can somehow avoid being scanned, it has a chance to cause harm. Steganography is one proven way attackers […]

Source: (ISC)² Cybersecurity Workforce Study There are few career paths that hold as many exciting job opportunities for new and experienced candidates as cybersecurity. Companies and government agencies large and small are increasing their cybersecurity investments, and expanding their security departments. But an air of desperation hangs over the industry because the gap between the […]

We recently announced our discovery of a new Windows evasion technique we’ve named “RIPlace” that renders most ransomware protection technologies ineffective. All businesses and the public sector are potentially vulnerable, so our efforts to inform security professionals continue. This week Nyotron Founder and CTO Nir Gaist will lead a webinar that will feature a live […]

Source: Microsoft Microsoft has long bundled its Windows Defender AV (recently renamed to Microsoft Defender AV) software for free with machines running the Windows OS. However, its ineffectiveness drove organizations to spend a significant portion of their security budget on alternatives.  While these software suites provide better protection than Windows Defender, they still were, and […]

Courtesy: Getty Images by Robert Zamani, Nyotron Exaggeration is a way of over-emphasizing something, either making it better or worse than it really is. Exaggeration can be used to communicate the importance of something, to create a lasting impression, or to evoke stronger feelings than otherwise. Marketing professionals love referring to the latest versions of their […]

Subscribe to our blog

Follow us on Social Media