Review: vArmour flips security on its head

Credit to Author: John Breeden II| Date: Mon, 06 Mar 2017 04:45:00 -0800

Almost every cybersecurity program these days does some sort of scanning, sandboxing or traffic examination to look for anomalies that might indicate the presence of malware. We’ve even reviewed dedicated threat-hunting tools that ferret out malware that’s already active inside a network.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read more

Would killing Bitcoin end ransomware?

Credit to Author: Ryan Francis| Date: Fri, 03 Mar 2017 12:51:00 -0800

Ransomware is running rampant. The SonicWall GRID Threat Network detected an increase from 3.8 million ransomware attacks in 2015 to 638 million in 2016. According to a Radware report, 49 percent of businesses were hit by a ransomware attack in 2016. Quite often the attacker asks for some amount of cybercurrency – usually Bitcoin – in exchange for providing a decryption key.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read more

7 Wi-Fi vulnerabilities beyond weak passwords

Credit to Author: Eric Geier| Date: Wed, 22 Feb 2017 03:00:00 -0800

To keep private Wi-Fi networks secure, encryption is a must-have — and using strong passwords or passphrases is necessary to prevent the encryption from being cracked. But don’t stop there! Many other settings, features and situations can make your Wi-Fi network as much or even more insecure as when you use a weak password. Make sure you’re not leaving your network vulnerable by doing any of the following.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read more

Why you need a bug bounty program

Credit to Author: Mary Branscombe| Date: Tue, 21 Feb 2017 12:50:00 -0800

Every business needs to have a process in place for handling security vulnerability reports, but some organizations take a much more proactive approach to dealing with security researchers.

To read this article in full or to leave a comment, please click here

Read more

Tips for negotiating with cyber extortionists

Credit to Author: Jaikumar Vijayan| Date: Fri, 17 Feb 2017 04:51:00 -0800

Paying ransom to a cyber extortionist holding enterprise data hostage might seem like a poor idea in principle but sometimes it might the best, or even only, option for extricating your organization from a crisis.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read more

Should security pros get special H-1B visa consideration?

Credit to Author: Stacy Collett| Date: Thu, 16 Feb 2017 04:29:00 -0800

New U.S. Attorney General Jeff Sessions may disagree about whether there is a shortage of skilled IT workers in America, as he has asserted at hearings over the past two years, but talk to most CISOs and they will confirm that when it comes to cybersecurity talent in particular, the skills shortage is very real.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read more

SonicWall CEO talks of life after Dell spinout

SonicWall has been through it all. The San Jose, CA-based security company began as a hot start up, went public, then private, was acquired by Dell and then spun off to a private equity firm as part of the massive Dell/EMC merger in 2016. In the wake of that change, SonicWall also got a new CEO, Bill Conner, a long-time security and tech industry leader, who took the helm in November.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read more

Study: 62% of security pros don’t know where their sensitive data is

Ask organizations today about the value of data and you’re likely to hear it measured in terms of competitive advantage, customer experience and revenue generation. As Dante Disparte and Daniel Wagner put it in a December 2016 HBR article, data is “becoming a centerpiece of corporate value creation.”

To read this article in full or to leave a comment, please click here

(Insider Story)

Read more