Our entire philosophy revolves around one of the most important assets of any company, DATA. We have chosen the concept CIA (Confidentiality, Integrity and Availability) and built around it a huge portfolio of products and services.

Confidentiality

Your Data is YOUR DATA! We can help you be sure that it stays your data and only the right people have access.

Integrity

Your data evolves, your data grows, keep it intact. For this purpose we can provide you with a great variety of solutions so you can make sure your data is there when you needed and as you needed.

Availability

You may have your data intact and secure, but if you cannot access, it is useless. Ask us about our solutions which can help you, give the right person, the right data at the right time.

Latest News

How Should We Think About Securing Critical Infrastructure?

In the first part of the afternoon panel discussion, General Michael V. Hayden, Former Director of the CIA and the NSA, Dr. Douglas Maughan, Division Director, Cybersecurity Division, DHS/S&T/HSARPA, Tim Conway, Technical Director – ICS & SCADA programs, SANS, Steve Orrin, Federal Chief Technologist, Intel Corp., and Jeremiah Grossman, Professional Hacker and Chief of Security

Read More

Decline in Rig Exploit Kit

Starting in April 2017, we saw a significant decrease in Rig exploit kit (EK) activity after two major campaigns, EITest and pseudo-Darkleech, stopped using EKs. Figure 1 shows the hits for the Rig EK from December 2016 through May 2017, highlighting this trend. This blog reviews recent developments in the EITest and pseudo-Darkleech campaigns that have contributed to the current drop in

Read More

Five Reasons Your Digital Experience Management Strategy Could Fail

You can be sure your CEO has digital experience on his or her radar. According to Gartner’s 2017 CEO Survey, CEOs are more focused this year on how technology and product innovation drive company growth. In the last few years of Gartner’s CEO survey, technology has never ranked so high on the list of CEO priorities. So

Read More

Free appliance upgrades with the Pulse Access Suite

The Pulse Secure Advance Now promotion combines the high performance of the Pulse Secure Appliance with new software intelligence of the Pulse Access Suite. Use it to securely connect mobile users to the cloud and your corporate network. A free PSA300, PSA3000, PSA5000 or PSA7000 when you replace an SA, IC or a MAG appliance

Read More

How a Hacking Group Used Britney Spears’ Instagram to Operate a Command and Control Server

A nasty piece of malware is currently being tested by a Russian hacking group named Turla, and its trial round has been conducted in an unexpected area of the internet — the comments section of Britney Spears’ Instagram. As a matter of fact, they’re using her Instagram as a way to contact the malware’s command and control

Read More

Pushing Incapsula SIEM Logs Directly to an Amazon S3 Bucket

Incapsula allows you to push your account’s SIEM logs directly to a designated bucket in Amazon S3. Pushing your Incapsula SIEM logs to cloud storage lets you examine your log data in new ways. For example, your Incapsula SIEM logs can be combined with SIEM logs from other platforms to give you a single source of security

Read More

Deliver cloud-based enterprise mobility management (EMM) at scale

Empower employees to work faster and smarter with secure mobile productivity apps and content on any device. Reduce the risk of data loss with advanced mobile security protection extended across the entire mobile fleet. Using MobileIron Cloud-based EMM, which includes MDM, MAM, and MCM solutions, you can easily configure and secure all your mobile devices

Read More

FlexPod SF: A Scale-Out Converged System for the Next-Generation Data Center

Welcome to the age of scale-out converged systems—made possible by FlexPod®SF. Together, Cisco and NetApp are delivering this new FlexPod solution built architecturally for the next-generation data center. Architects and engineers are being asked to design converged systems that deliver new capabilities to match the demands of consolidating silos, expanding to web-native apps, and embracing the

Read More

GhostHook – Bypassing PatchGuard with Processor Trace Based Hooking

In this article, we’ll present a new hooking technique that we have found during our research work. Hooking techniques give you the control over the way an operating system or a piece of software behaves. Some of the software that utilizes hooks include: application security solutions, system utilities, tools for programming (e.g. interception, debugging, extending

Read More

Resolve security incidents quickly, efficiently and at scale

Your business is your top priority. At best, attacks are a distraction. At their worst, they can cripple your operations. Mandiant, a FireEye company, has dedicated incident responders in over 30 countries to help you quickly investigate and thoroughly remediate attacks, so you can get back to what matters most: your business. Mandiant helps protect

Read More

Key Message from Palo Alto Networks Ignite 2017: We Need to Work Better Together

Last week, I had a security choice to make: Go to the Gartner Security and Risk Management Summit in National Harbor, MD, or Palo Alto Network’s Ignite 2017 in Vancouver, BC. Of course, Gigamon had a presence at both and I was lucky enough to head north. I wasn’t alone—around 3,500 security professionals were signed

Read More

ICIT Calls for Legislation to Enforce Encryption on Government Agencies

The starting point for a new study from the Institute for Critical Infrastructure Technologyis not new: “There are only two types of networks, those that have been compromised and those that are compromised without the operator’s awareness.” Since it is impossible to defend the network, the solution is surely to defend the data. Here encryption can

Read More

SteelCentral Release Assures Your Digital Transformation Initiative

According to IDC, the percentage of enterprises creating advanced digital transformation initiatives will more than double by 2020.[1]  With increasing frequency companies are undertaking digital business to create differentiation with end users: employees, partners, and of course, customers.  They seek to create value for the applications and services that are, quite literally, the face (and in some

Read More

Check Point Infinity NGFW Earns NSS “Recommended” Yet Again for Security Effectiveness and Value

NSS Labs, Inc. released their results for the 2017 Next Generation Firewall Test, recognizing Check Point Infinity NGFW with “Recommended” rating. This marks our sixth NGFW “Recommended” rating for security effectiveness and value, and the fourteenth NSS “Recommended” rating overall since 2011. This reinforces the Check Point Infinity goal of delivering the most effective and

Read More

How Cisco Engineers Used Machine Learning to Solve an Impossible Problem

In 2015 Rich West, a systems architect with Cisco’s infosec team, approached an engineer on Cisco’s Advanced Security Research team with a novel problem. The infosec team was looking for a way to protect Cisco employees from malware in encrypted traffic without sacrificing their privacy. At the time, there was really only one viable option,

Read More

Tips to Optimize Performance of your Digital Workspace

Who doesn’t like to run a system in tip-top shape? And who doesn’t like to maximize user density and shave 5-10 seconds off a login time? Luckily our Citrix Consulting team specializes in this sort of thing, and we’ve got a few tricks today to optimize performance of your Citrix Workspace. CPU Over-Subscription Ratio. We walk into

Read More

Building Trust in a Cloudy Sky

The state of cloud adoption and security This report, based on responses from nearly 300 IT professionals in financial services from around the globe, looks at cloud adoption, changes in data center environments, and the challenges with visibility and control over these new architectures. Download Full Report Download Financial Services Summary Source: https://www.mcafee.com/us/solutions/lp/cloud-security-report-finserv.html?eid=17SC_CSNAQ1_ML_SM_LN-4#sf90217877

Read More

ONTAP 9.2: More Cloud, Efficiency, Control, and Software-Defined Storage Options for a Data Driven World

On Monday, June 5, NetApp launched the most far-reaching innovation announcement in our 25-year history. At a time when many storage companies are struggling to remain afloat and running out of innovation steam, NetApp at 25 has never been more innovative. We are pivoting to serve the future generation of “data visionaries” with expanded hybrid cloud options, the new NetApp®

Read More

MNOs Want Better Security: Achieving Threat Prevention in a Hyper-Connected 5G Environment

Only a few years ago, the world was buzzing with the term “4G.” While many mobile network operators (MNOs) are still rolling out their 4G infrastructures, the world is already buzzing about “5G.” Year 2020 is the suggested timeline for when MNOs are predicting to be ready for 5G. Development is already in the works

Read More

Setting and Enforcing Policies with Pulse Secure Access Suites

A demonstration of how to control which users are able to access which network and cloud resources. Policy variables include who is connecting, where they are, what device they are using, and the security posture of the device. We will also take a quick look at the new virtual license server, explaining which license it

Read More

Trends in Cloud Apps APIs, Integration, Microservices & DevOps

CLOUD-CON: Integration & APIs features top experts in cloud app architectures to explore how APIs, containers and microservices become even more powerful thanks to modern integration. Topics to include: Cloud Native Apps  Learn how to use innovative integration patterns to make the big leap to mission-critical apps that are 100% born to run in cloud environments.

Read More

Complying with Data Protection Law in a Changing World

Failure to meet legal and political expectations for data security can torpedo your enterprise’s reputation by exposing it to fines, lawsuits, negative publicity and regulatory investigations. These expectations are rapidly evolving across the world. In general, the expectations are calling for greater control over personal information. They are emerging at a time when public attention

Read More

Gartner Security and Risk Management Summit, All Roads Lead to…Visibility!

This week in National Harbor, MD, Gartner held its annual Security and Risk Management Summit—an event that has become a meeting ground for security thought leaders. Gartner kicked off the event with a keynote that introduced its new strategic approach for cybersecurity defenders: CARTA (Continuous Adaptive Risk and Trust Assessment). An evolution of the Gartner

Read More

DDoS Attacks Can Lead to Large Outages

The focus of the news media has been on massive DDoS attacks, with recent headlines proclaiming attacks in excess of 500Gbps. In this webinar, DDoS testing expert and NimbusDDOS founder Andy Shoemaker will demonstrate in a live DDoS attack how even a tiny attack can cause significant outage, including: 1. How a small gap can

Read More

How Patent Quality Influences the U.S. Economy & Tech Industry

Recently the director of the U.S. Patent and Trademark Office (USPTO), Michelle Lee, resigned from her post after being appointed in 2014. When she assumed leadership, the USPTO was still adjusting to new law and procedures put in place by the America Invents Act.  In my experience working with the USPTO, she led that important

Read More

Privileged Account Security Inside Industrial Control Systems(ICS)

Date and time: Tuesday, June 20, 2017 1:00 pm Eastern Daylight Time (New York, GMT-04:00) Program: On The Front Lines – A CyberArk Weekly Webcast Series Panelist(s) Info: Chris Maroun Duration: 30 minutes Description: Learn how to stop a takeover of the world’s most important environments. CyberArk ICS specialists will discuss how the Privileged Account

Read More

IDaaS, Everything but the Directory Sync

Back in 2011, Marc Andreesen famously declared that “Software is eating the world.” We have seen this come to fruition, although today I would update this declaration to be “SaaS is eating the world.” SaaS and the subscription-based delivery of business applications have become the preferred consumption model for most organizations. Market analyst firm IDC predicts

Read More

Five Reasons Your Digital Experience Management Strategy Could Fail

You can be sure your CEO has digital experience on his or her radar. According to Gartner’s 2017 CEO Survey, CEOs are more focused this year on how technology and product innovation drive company growth. In the last few years of Gartner’s CEO survey, technology has never ranked so high on the list of CEO priorities.

Read More

Armory Sandbox – Building a USB analyzer with USB armory

The USB armory is a small computer on a USB stick, providing an ARM A8 800 MHz CPU and 512MB RAM, and it’s versatile enough to implement all kinds of interesting scenarios. One of its most interesting features for this project is secure boot, called High Assurance Boot, that allows better integrity of our USB

Read More

Anatomy of the Jaff Ransomware Campaign

Last month, Check Point researchers were able to spot the distribution of Jaff Ransomware by the Necurs Botnet. The ransomware was spread using malicious PDF files that had an embedded docm file, which in its turn downloaded an encoded executable. After the downloaded file was decoded, the ransomware encrypted the user’s files. In the last

Read More

Malicious Spam Comes Roaring Back and Cisco Email Security is Ready

“Did you get my email? The really urgent one? About funding for your new project?” “Maybe. I can’t tell. My inbox is full of spam and I am busy scrutinizing every email and domain name to make sure the sender is a valid person that I actually know and the attachment is a valid… Oh

Read More

Accelerating Security Innovation: Introducing the Palo Alto Networks Application Framework

At Palo Alto Networks, we strive to provide the most compelling security to our customers, delivered with the utmost consistency across the network, endpoint and cloud. We are trusted by more than 39,500 customers to protect their organizations, prevent cyberattacks, and help maintain trust in the digital age. Our decade-long journey was founded on two

Read More

Secure Access Solutions for Mobile, Cloud, and Internet of Things

[WEBINAR] Tuesday, April 11, 2017 | 8:00-9:00am PST / 11:00-12:00pm EST Embrace the latest cloud, mobile and IoT technologies with Secure Access. Learn how Pulse Secure’s latest features and capabilities make it simple to securely roll out new end-user services to support the latest IT transformation without compromising security compliance or taxing your IT team.

Read More

Pay-As-You-Go Data Management for Your Data Center

The flexibility to pay for only the resources consumed is the key thing that drives many organizations to choose the cloud. Rather than requiring a large up-front capital investment for infrastructure, the cloud gives you the option to start small and pay as you grow. NetApp recently introduced a new on-demand consumption model that offer

Read More

Evolution of the EMM Industry

Gartner just published the 2017 Magic Quadrant for Enterprise Mobility Management Suites. For the 7th consecutive year, MobileIron is in the Leaders Quadrant. You can see the report here.* To our customers and partners: Thank you for your trust. To our employees: It’s an honor to work with such a talented and wonderful group of people! Here is my personal perspective

Read More

Can I Trust My Vendor’s Security Claims? Peer-reviewed vs. self-certification methods

Format-preserving encryption (FPE) is in the news recently, as two researchers demonstrated a cryptanalytic attack on one method that NIST had endorsed—FF3. NIST now expects to revise their endorsement of FF3 (Special Publication 800-38G) after details of the attack are published to either change the FF3 specification or withdraw approval. It’s important to be aware,

Read More

Pervasive Visibility Extended to AWS GovCloud (US)

In April, Gigamon announced our quick progression in achieving Amazon Web Services (AWS) APN Advanced Technology and Public Sector partner status along with our availability in AWS Marketplace. Since, we’ve continued to move rapidly to expand our cloud capabilities and I’m pleased to announce that the Gigamon Visibility Platform for AWS is now available in

Read More

Today’s File Security is So ‘80s, Part 2, Detect Suspicious File Access with Dynamic Peer Groups

In a previous post, we shared three primary reasons why the traditional, static approach to file security no longer works for today’s modern enterprises. Working groups are formed organically and are cross-functional by nature, making a black and white approach to file access control outdated—it can’t keep pace with a constantly changing environment and creates

Read More

Cybersecurity: For Defenders, It’s about Time

In multiple areas of cybersecurity, time works in favor of the attackers—making time the strategic advantage that defenders need to regain. In this report, Aberdeen Group provides four illustrative examples of how recapturing the advantage of time helps you reduce risk in the fundamental categories of data protection, threat detection and incident response, data center

Read More

Behind the CARBANAK Backdoor

In this blog, we will take a closer look at the powerful, versatile backdoor known as CARBANAK (aka Anunak). Specifically, we will focus on the operational details of its use over the past few years, including its configuration, the minor variations observed from sample to sample, and its evolution. With these details, we will then

Read More

Shadow Admins – The Stealthy Accounts That You Should Fear The Mos

Shadow Admin accounts are accounts in your network that have sensitive privileges and are typically overlooked because they are not members of a privileged Active Directory (AD) group. Instead, Shadow Admin accounts were granted their privileges through the direct assignment of permissions (using ACLs on AD objects). From the attacker’s perspective, these accounts are highly

Read More

Good Enough is only Good Enough Until It Isn’t

Let’s talk turkey. Or crème eggs. Or boxes of candy. What do they have in common? They’re all associated with holidays, of course. And, it turns out, those holidays are the number one generator of both profits and poor performance by websites. Consider recent research from the UK, “which involved more than 100 ecommerce decision

Read More

Forcepoint Achieves Highest Overall Security Effectiveness Out of 10 Vendors in NSS Labs’ NGFW Test

NSS Labs tests prove that Forcepoint NGFW offers the leading combination of enterprise security and low cost, making it particularly effective for SD-WAN and other modern networking initiatives Global cybersecurity leader Forcepoint announced that its Next Generation Firewall (NGFW) blocked 99.95 percent of exploits in NSS Labs’ 2017 NGFW Test. Forcepoint is the only vendor to

Read More

SentinelOne Joins Fortinet Fabric-Ready Program to Integrate Advanced Endpoint Protection with the Fortinet Security Fabric

UNNYVALE, Calif., June 5, 2017 John Maddison, vice president of products and solutions at Fortinet “A rapid and coordinated response is critical to defend against today’s threats. The Fortinet Security Fabric has the breadth to scale across the entire enterprise infrastructure and the Fortinet Fabric-Ready partner program enables customers to apply the benefits of the

Read More

Check Point Defeats Mobile Cyberattacks

Advanced cybercrimes aren’t science fiction; they’re real – and have real consequences. Check Point is at the forefront of mobile security, ensuring that devices and data everywhere remain safe. We don’t just build cutting edge technology: we stand behind it, with the largest team of elite researchers and security engineers in the industry, who have

Read More

Why Firepower Threat Defense

Demo Friday: Why Firepower Threat Defense? (Live Webinar June 16, 2017 at 1:00pm Eastern Time / 10:00am Pacific Time) Get more from your NGFW with the fully integrated capabilities of Firepower Threat Defense (FTD). With integrated analysis from network to endpoint, Firepower Threat Defense helps you improve detection and early warning and more rapidly contain threats with

Read More

Welcome to the Future of Work

We are living in a rapidly changing world. Broad adoption of new technologies is transforming how we work and live. Citrix is excited to play a role in this ongoing digital transformation by empowering people and organizations to seize the opportunities it offers. In May, at Citrix Synergy 2017, we shared how we see the “future

Read More

Networking for the Cloud Era

Simplified Cloud Connectivity with SD-WAN Join Microsoft and Riverbed for a discussion and demonstration of enhancements to SteelConnect. Announced in April 2016, Riverbed SteelConnect is a revolutionary SD-WAN solution that makes deploying and managing network services very simple and intuitive. SteelConnect is built for the cloud and brings enterprise networking to the cloud era. Join

Read More

Introducing NetApp Enterprise-Scale HCI: The Next Generation of Hyper Converged Infrastructure

Today is our annual NetApp Analyst Day in Boulder, and I’m looking forward to spending time with arguably the most knowledgeable and well-connected group of people in our industry. Understandable, then, that we chose today to launch NetApp HCI, the next generation of hyper converged infrastructure, and the very first HCI platform designed for enterprise-scale

Read More

Moving to the cloud…Now what?

A cloud-first strategy begins an elaborate and sometimes difficult series of business and technology decisions – which can be more work than it should be. Plus, cloud adoption creates potential security, legal, and financial risks, and changes the roles and responsibilities of the stakeholders who manage those risks. Get on the right start to your

Read More

Affiliate of Pulse Secure, LLC to Acquire the Virtual Application Delivery Controller (vADC) Business from Brocade Communications Systems, Inc.

Transaction will further strengthen Pulse Secure’s leadership position in Secure Access Solutions by adding a virtual ADC portfolio with software and virtualization capabilities supporting hybrid IT and Cloud deployments Will enable delivery of an enhanced and expanded set of offerings to the 20,000+ Pulse Secure customer installed base Existing and new vADC customers will enjoy

Read More

Market Guide for Data Masking

Published: 6 February 2017 Analyst(s): Marc-Antoine Meunier, Ayal Tirosh Security and risk management leaders should use data masking to desensitize or protect sensitive data and address the changing threat and compliance landscape. In 2016, data breaches have, once again, demonstrated the growing importance of this technology market. Key Findings The evolution of threat and compliance

Read More

Why the Traditional Approach to File Security is Broken

In today’s knowledge-driven economy, modern enterprises have a fluid organizational structure in which most employees have access to most data to do their jobs. Working groups are formed organically and are cross-functional by nature. The amount of unstructured data organizations create is growing exponentially. Traditional, black and white file access control can’t keep pace with the

Read More

Cybersecurity: For Defenders, It’s about Time

In multiple areas of cybersecurity, time works in favor of the attackers—making time the strategic advantage that defenders need to regain. In this report, Aberdeen Group provides four illustrative examples of how recapturing the advantage of time helps you reduce risk in the fundamental categories of data protection, threat detection and incident response, data center

Read More

Securing Mobile Access for the Government with the MobileIron PIV-D Entrust App

Presented by: Sean Frazier, Chief Technical Evangelist – Federal, MobileIron | Dan Miller, US Federal Sales Manager, Entrust Datacard MobileIron recently announced a technology alliance partnership to deliver Derived Credentials (PIV-D) for next-generation multi-factor authentication with Entrust IdentityGuard Mobile Smart Credential. Derived Credentials will allow the Government Agenciesas well as other regulated industries (i.e. Finance,

Read More

Cloud Month on DevCentral

The term ‘Cloud’ as in Cloud Computing has been around for a while. Some insist Western Union invented the phrase in the 1960s; others point to a 1994 AT&T ad for the PersonaLink Services; and still others argue it was Amazon in 2006 or Google a few years later. And Gartner had cloud computing at

Read More

Forcepoint Achieves Highest Overall Security Effectiveness Out of 10 Vendors in NSS Labs’ NGFW Test

NSS Labs tests prove that Forcepoint NGFW offers the leading combination of enterprise security and low cost, making it particularly effective for SD-WAN and other modern networking initiatives Global cybersecurity leader Forcepoint announced that its Next Generation Firewall (NGFW) blocked 99.95 percent of exploits in NSS Labs’ 2017 NGFW Test. Forcepoint is the only vendor to

Read More

SMB Exploited: WannaCry Use of “EternalBlue”

Server Message Block (SMB) is the transport protocol used by Windows machines for a wide variety of purposes such as file sharing, printer sharing, and access to remote Windows services. SMB operates over TCP ports 139 and 445. In April 2017, Shadow Brokers released an SMB vulnerability named “EternalBlue,” which was part of the Microsoft

Read More

The Visibility Platform: See What Matters

Webinar Title: The Visibility Platform: See What Matters™ Date: Tuesday, June 06, 2017 Time: 11:00 AM Pacific Daylight Time Duration: 30 Min Mid-level managers and practitioners in security operations and network operations teams should attend this webinar to discover how visibility is more than just basic “TAP Aggregation” and can be used as a strategic

Read More

The Case for Comprehensive Access Management

The insider threat does not necessarily cease when an employee leaves the organization. There are plenty of recent articles in the news with cautionary tales of ex-employees compromising company networks. A former employee at a private security patrol company was ordered by court to pay more than $300,000 to fix computer systems he damaged after

Read More

What the General Data Protection Regulation (GDPR) Means for You

The GDPR is upon us! Well, almost… If your organization serves customers or individuals in the European Union, you’re likely already aware of the General Data Protection Regulation (GDPR). Introduced in response to concerns about data privacy, the GDPR will go into effect on May 25, 2018, requiring responsibility and accountability for every organization that

Read More

Cisco Accelerates Digital Transformation with Enterprise Agreement Launch

This is exciting. It has been just over a year since my first blog in which I stated, “To win in today’s market where disruptive startups and agile competitors are advancing on all sides, digitizing the enterprise to infuse greater agility and innovation is critical. This means transforming your operating model, which includes reimagining products

Read More

FIREBALL – The Chinese Malware of 250 Million Computers Infected

Check Point Threat Intelligence and research teams recently discovered a high volume Chinese threat operation which has infected over 250 million computers worldwide. The installed malware,  Fireball, takes over target browsers and turns them into zombies. Fireball has two main functionalities:  the ability of running any code on victim computers–downloading any file or malware, and

Read More

Evaluating Security Solutions Across the Kill Cyber Chain

The Cyber Kill Chain is an intelligence-led, trademarked framework developed by Lockheed Martin in 2011, following intrusion activity against their organization by threat actors of a persistent and sophisticated nature. The kill chain measures the effectiveness of security assets across all types of threats, including Advanced Persistent Threats (APTs). Not all threats are APTs, but advanced

Read More

The End of “Pure-Play” SD-WAN. Market Consolidation Begins.

Cisco has announced its intent to acquire Viptela, Inc. for $610 million. Viptela was one of the earliest entrants in the SD-WAN space. But despite early traction with a few marque brands, they saw their business decelerate in recent months. Almost certainly, we will look back at this announcement and recognize it as the moment

Read More

Affiliate of Pulse Secure, LLC to Acquire the Virtual Application Delivery Controller (vADC) Business from Brocade Communications Systems, Inc.

Transaction will further strengthen Pulse Secure’s leadership position in Secure Access Solutions by adding a virtual ADC portfolio with software and virtualization capabilities supporting hybrid IT and Cloud deployments Will enable delivery of an enhanced and expanded set of offerings to the 20,000+ Pulse Secure customer installed base Existing and new vADC customers will enjoy

Read More

Traps Advanced Endpoint Protection Technology Overview

Most organizations deploy a number of security products to protect their endpoints, including one or more traditional antivirus solutions. Nevertheless, cyber breaches continue to increase in frequency, variety and sophistication. Faced with the rapidly changing threat landscape, current endpoint security solutions and antivirus can no longer prevent security breaches on the endpoint. Palo Alto Networks®

Read More

NetApp acquires two companies to boost cloud storage

NetApp has unveiled two acquisitions it expects to help grow its already-growing converged infrastructure and cloud storage business. The first acquisition is Immersive Partner Solutions, a developer of software to validate multiple converged infrastructures through their lifecycles. The second is PlexiStor, provider of software that turns off-the-shelf servers into high-performance converged infrastructure offerings with persistent

Read More

Join HPE Security at the Gartner Security & Risk Management Summit

June is right around the corner, which means it is time for the Gartner Security & Risk Management Summit in National Harbor, MD.  This annual gathering of security and risk management leaders helps organizations prepare for and head off increasingly dangerous cyber threats. The Summit takes place from June 12-15 and this year’s theme is:

Read More

Expanding Automated Threat Hunting and Response with Open DXL

Today everyone is talking about security automation. However, what are the right processes and actions to automate safely? What are the right processes and actions to automate that will actually achieve some security outcome, such as improving sec ops efficiency or reducing attacker dwell time? Just look in the latest industry report and you will

Read More

Introducing MobileIron Bridge, Harnessing the Power of EMM to Secure and Manage PCs and Cut PC TCO by Up to 80%

Presenter: Abby Guha, Director of Product Marketing | Mark Cavins, Senior Product Manager Session Date/Time: Wednesday, November 2 at 10am PDT/6pm BST Mobile and PC security are converging. PC management has evolved significantly over the years in an effort to support rapidly changing enterprise needs and evolving security models. In the modern enterprise, with a

Read More

Forget uptime. A low MTTR is the new ‘5 9s’ for IT

Outages are expensive. Whether they’re ultimately the result of an attack or a failure in software or hardware isn’t that relevant. The costs per minute of downtime are increasing, thanks to the growing reliance on APIs and web apps of the modern, digital economy. For some, those costs are staggering. It’s estimated that Amazon’s 40

Read More

Watch FireEye Endpoint Security Detect and Prevent a WannaCry Attack

Since May 12, 2017, a highly prolific WannaCry ransomware campaign has been observed impacting organizations globally. WannaCry (aka WCry or WanaCryptor) malware is self-propagating (worm-like) ransomware that spreads through internal networks and over the public internet by exploiting a vulnerability in Microsoft Server Message Block (SMB) protocol. The malware appends encrypted data files with the

Read More

Safely Embracing the Cloud – Forcepoint CASB Overview

In order to understand your organization’s risks and protect your users, your security teams need visibility into how users interact with data in the Cloud. The ability to monitor and control how your users engage with sanctioned cloud applications is key. Learn about Forcepoint CASB (Cloud Access Security Broker) while we review your options for

Read More

Who Owns Cybersecurity Risk Management?

In light of the countless cyber incidents reported daily—including the high-profile Yahoo database breaches that impacted hundreds of millions of customers—the question of risk responsibility is more front and center than ever before. To date, there’s remained a troubling tendency to view cybersecurity as fundamentally different and separate from other organizational risks. Or, it’s simply

Read More

Securing the Connected Car Steps Up a Gear

“Here in my car, I feel safest of all …” That line from Gary Numan’s hit single, ‘Cars’ sums up the way many of us feel when we’re driving: safe and protected in the privacy of our vehicles. But cars are increasingly connected to the outside world. Features that were once only available on premium

Read More

Cybersecurity Threat Landscape Has Grown Exponentially

Cyber crooks are now casting a wider net, attacking not just PCs and mobile phones but also Internet-connected devices like security cameras or routers, which has “exponentially” increased the risk landscape, Cisco CEO Chuck Robbins said today. The $49 billion firm has a $2 billion security business and is helping customers across the globe devise

Read More

What Makes an Expert in the Age of AI

Author and journalist Malcolm Gladwell fields audience questions posed by Citrix CMO Tim Minahan on stage at the inaugural Synergy Innovation Super Session series presentation. I’ll be featuring my favorite images here each day of the conference. Watch for them! It’s not a puzzle world anymore. It’s a mystery world. The nature of the problem

Read More

A Balanced Approach to Securing Unix Environments

Unix environments present unique challenges to IT security teams because of their inherently privileged nature. Any security steps taken within these environments must offer proactive protection and detection, but they must do so without interfering with the day-to-day responsibilities of authorized administrators. Privileged account security solutions offer a balanced approach to help organization better secure,

Read More

The Cost and Consequences of Security Complexity: New Ponemon Institute Research Identifies 8 Best Practices

Presented by: Dr. Larry Ponemon, Chairman and Founder, Ponemon Institute | Ojas Rege, Chief Strategy Officer, MobileIron Please register to view the on-demand webinar. Complexity seems unstoppable. The Ponemon Institute surveyed almost 600 security professionals to study, for the first time, the impact of complexity on enterprise security posture. How can you identify the warning

Read More

Practice Makes Perfect: Nemucod Evolves Delivery and Obfuscation Techniques to Harvest Credentials

Recently the Unit 42 research team have been investigating a wave of Nemucod downloader malware that uses weaponized documents to deploy encoded, and heavily obfuscated JavaScript, ultimately leading to further payloads being delivered to the victim. From a single instance of the encoded JavaScript discovered in one version of this malware, we pivoted on the

Read More

Optimized for Next Generations’ Secure Access – Pulse Connect Secure 8.3

Pulse Secure introduced the Secure Access Suite and we are happy to announce  Pulse Connect Secure 8.3R1 release, a key product of Pulse ’s Secure Access solution. With this release, we have focused on building exciting new capabilities, around three key themes. ·       Integration across the Secure Access product portfolio ·       Usability and Simplicity of operation and deployment, for

Read More

SteelHead SD is the full HD WAN optimisation platform

There was a time when you went to buy a new TV you would have to face the dilemma of “should I buy HD ready or Full HD?”. Where a HD ready set allowed your new TV to accept 1080p HDMI input, it relied on an external HD TV receiver. But Full HD allowed you

Read More

WannaCry: Whodunit?

That’s the, er, $61,614.02 question! The worldwide WannaCry ransomware attack has been making headlines since Friday afternoon when it began running rampant at hospitals in the UK, causing manufacturing plant shut downs across Europe, and propagating and encrypting everything it could get its hands on, from ATMs to marketing display panels. WannaCry infects unpatched Windows-based

Read More

The Great Divide: Bridging the Cloud with On-Prem Systems

The information landscape now spreads to the farthest corners of earth, and sky. On-prem systems are increasingly tethered to cloud-based platforms. In between all these touchpoints, a tremendous chasm must be traversed efficiently and safely. With a mountain of sensitive data flowing back and forth daily, a new era of durable, secure data delivery systems

Read More

Meeting SOC 2 Type II Compliance with Incapsula

We are pleased to announce that Imperva has released an audited SOC 2 Type II report for the Incapsula service. A SOC 2 Type II report establishes trust, and not all companies in the space are endorsed by AICPA, the governing standards body. SOC 2 Type II Compliance and What It Means for You The AICPA (American

Read More

Become a Modern Endpoint Security Master

A new wave of advanced, targeted malware is seeking out the gaps in conventional endpoint defenses and finding novel ways to exploit them. These attacks use packing, encryption, and polymorphism to mask their true intent, hammering away at your organization with previously unseen “zero-day” attacks that signature-based mechanisms are too slow to catch. They use

Read More

Forcepoint Cloud Security Delivers Value and Protection Against Today’s Cyber Attacks

Forcepoint announced the availability of a host of new features to help businesses safely adopt cloud applications and provide human centric security to users everywhere they work. These updates can be downloaded now from the Forcepoint Support Portal. Among the 15 features and updates we launched today, I’d like to highlight four in this post:

Read More

CyberArk Discovery & Audit

In this 30 second video, learn why you should scan your network with CyberArk Discover and Audit™. This free assessment tool will help you to discover privileged accounts, privileged passwords, SSH keys and Pass-the-Hash vulnerabilities on your network.

Read More

Now that HTTPS is almost everywhere, what about IPv6?

Let’s Encrypt launched April 12, 2016 with the intent to support and encourage sites to enable HTTPS everywhere (sometimes referred to as SSL everywhere even though the web is steadily moving toward TLS as the preferred protocol). As of the end of February 2017, EFF (who launched the effort) estimates that half the web is

Read More

How to Avoid Being the Next Victim of Ransomware

Ransomware is one of the most prevalent and feared forms of security attack these days. Organisations worry about ransomware because it is extremely difficult to detect in advance, hard to stop spreading once it strikes, and potentially disastrous in terms of data destruction. Add to this the ignominy of having to pay the ransom to

Read More

Citrix and Microsoft: A Year of Achievement … and We’re Just Getting Started

One year ago at Citrix Synergy, Citrix and Microsoft kicked off a powerful expansion of our partnership to help our customers securely embrace the cloud and mobility, extending and deepening our long-time partnership which spans 25 years. We announced Azure as our preferred cloud. Our vision energized our customers, and generated praise from industry analysts

Read More

AMPlify your Security

See how our customers are enhancing their security posture with AMP for Endpoints At Cisco we know that security teams are a critical piece of what’s possible in any organization and simplifying their job is of utmost importance to us. We believe that by allowing customers to see more, protect better and respond faster we

Read More

Hacked in Translation – from Subtitles to Complete Takeover

Check Point researchers revealed a new attack vector which threatens millions of users worldwide – attack by subtitles. By crafting malicious subtitle files, which are then downloaded by a victim’s media player, attackers can take complete control over any type of device via vulnerabilities found in many popular streaming platforms, including VLC, Kodi (XBMC), Popcorn-Time

Read More

NSS Labs Webinar: Is your endpoint security worth it?

Date and time: June 8, 2017 at 11am GMT Speakers:  Mike Spanbauer, NSS VP Research Strategy Robert Zamani, SentinelOne Executive Director, WW Solutions Engineers Description: WannaCry Ransomware (WanaCrypt0r) is the biggest ransomware outbreak in history affecting over 200,000 systems in more than 150 countries. It is because of threats like WannaCry that SentinelOne was created. This

Read More

WannaCrypt just killed your weekend…

We have grown accustomed to computer viruses but the latest WannaCrypt worm attack was a Friday surprise that took the world by storm. It claimed more than 200,000 victims in less than 48 hours, according to one count by Europol, Europe’s policing agency. The Associated Press also reported that the ransomware spread to 150 countries,

Read More

GDPR/NIS Countdown: How Ready Are Organisations to Get Their Cybersecurity in Order for the Next Decade?

This month marks the start of the 12-month countdown for organisations to be ready to comply with either – or in some cases both – the General Data Protection Regulations or the NIS Directive becoming law in Europe on the 25th and 10th of May 2018, respectively. Whether you have started working towards compliance in

Read More

What Is Your Hyperconverged Infrastructure Strategy?

One of the best parts of my job is the constant conversations with customers around architecting great infrastructure solutions. I have always had a passion for talking to customers to assemble the “jigsaw puzzle pieces” into something unique for every customer. One common theme in recent conversations is what’s next? If we aren’t careful, Today’s

Read More

Everything You Always Wanted to Know About SD-WAN Architecture (But Were Afraid to Ask)

Woody Allen directed and starred in a film with a similar name in 1972 that got a lot of attention and was a commercial success.1 Like SD-WAN (software-defined wide area networking), the benefits of this topic (e.g. agility, performance) were well marketed. And many of the functional aspects were generally understood: single-click setup and simple

Read More

WNCRY ransomware demonstrates dangers of homogeneous, unpatched networks

Whenever history seemed to repeat itself, my Granny used to quip, “same song, different verse.” As the WannaCry (WNCRY) ransomware spread like wildfire in a dry forest, I heard the familiar refrain and discordant notes of previous worms: Blaster (2003), Welchia “Nachi” (2003), and Conflicker (2008). Each of these worms spread via well known flaws

Read More

New Ransomware Adjusts Its Price Based Off Where You Live

Discovered on Exploit, a Russian hacking forum, a new kind of RaaS (ransomware-as-a-service) portal named Fatboy Ransomware has emerged. The service, which is currently available for cybercriminals on the forum to leverage for their own benefit, is unique because it’s programmed to change its ransom amount based on the victim’s location, raising the amount in countries with

Read More

Top 5 GDPR Myths: Get the Facts

The General Data Protection Regulation (GDPR) has been garnering much attention since its formal adoption in April 2016.  With the effective date of May 25, 2018 fast approaching, some popular myths have emerged surrounding the regulation. In this blog post, we’ll examine and debunk a few of the most notable ones. Myth #1: “We’re a

Read More

Data Masking Addresses the Changing Threat and Compliance Landscape

HPE Security – Data Security is pleased to be recognized in Gartner’s Market Guide for Data Masking, Published: 6 February 2017, Analyst(s): Marc-Antoine Meunier, Ayal Tirosh. As a leading visionary in the prior Magic Quadrant for Data Masking Technology, Worldwide, published: Dec 2015, underpinned by of our 10 year leadership in Format-Preserving Encryption technology that

Read More

F5 Application Connector, Connecting and Controlling Cloud Apps

Applications are moving to public clouds. Maybe not as fast as the market predicted (hoped?) in its early years, but they are moving nonetheless. Our own State of Application Delivery surveys tell us that 1 in 5 respondents planned to have over 50% of their application portfolio in “the cloud.” And while we’re still seeing

Read More

How Intelligence Enriches Security Consulting Services

Join Jeff Berg, Sr. Manager of Cyber Threat Intelligence, and Brad Bell, Mandiant Principal Consultant, as they share the role of cyber threat intelligence in strategic security consulting services and why services based on compliance-based best practices and industry standards may not be an effective way to protect your organization against a rapidly evolving threat

Read More

WannaCry Post-Outbreak Analysis

Many of the technical aspects of the WannaCry ransomworm outbreak on Friday 12 May 2017 are well documented by this point: the primary means by which the malware spread appears to have been the use of the DoublePulsar and EternalBlue code released by the Shadow Brokers earlier this year and patched as part of Microsoft’s MS17-010

Read More

What is normal? Organizations use machine learning to ferret out data anomalies

Over time, technology can automatically raise red flag about suspicious activity. Machine learning has been a staple of our consumer-driven economy for some time now. When you buy something on Amazon or watch something on Netflix or even pick up groceries at your local supermarket, the data generated by that transaction is invariably collected, stored,

Read More

WanaCrypt0r aka WannaCry ransomware wreaks havoc worldwide

The WanaCrypt0r ransomware hit with a vengeance on Friday, with the outbreak beginning in Europe, striking hospitals and other organizations, then quickly spreading across the globe. As of 1:00pm Pacific Time, it is believed more than 57,000 systems in more than 74 countries had been affected. Researchers at SentinelOne have determined that the Endpoint Protection Platform does successfully

Read More

Global Ransomware Attack “WannaCry” Still Infecting Organizations in 150+ countries

Ransomware cyber attacks are quickly becoming the preferred method of attack by cybercriminals. WannaCry, the latest global incident, is particularly damaging because it is also a worm—not just a ransomware program. As a result, it looks for other computers to spread to. When it infects a new computer, it encrypts the data and locks out

Read More

Now What? Moving Forward After the WannaCry Attack

Deep Breath. WannaCry surged into headlines fast – grabbing attention as it spread throughout networks and the world. And it shows how crafty attackers are – as they continuously evolve ransomware (and other types of malware) to keep us on our toes. We know that ransomware has used email to infect computers. Web pages too.

Read More

Securing Assets and Applications in the Cloud

In our recent blog, Cloud Security: Who is Responsible for What?, we focused on the idea of shared responsibility in cloud environments; with IaaS/PaaS, the customer is responsible for everything above the hypervisor, while the cloud vendor takes responsibility for the infrastructure itself. We also addressed how the public cloud vendors’ management consoles are a

Read More

NetApp Showcases Cloud-Connected Data Management Solutions at VeeamON 2017

NetApp, a VeeamON 2017 premier sponsor, will showcase a variety of data management solutions designed to help customers unleash the full potential of their data, whether on-premises, or in the public or hybrid cloud. VeeamON 2017 will take place May 16 – 18, 2017 at the Ernest N. Morial Convention Center. in New Orleans. Attendees

Read More

Palo Alto Networks Protections Against WanaCrypt0r Ransomware Attacks

What Happened On Friday, May 12, 2017, a series of broad attacks began that spread the latest version of the WanaCrypt0r ransomware. These attacks, also referred to as WannaCrypt or WannaCry, reportedly impacted systems of public and private organizations worldwide. Our Next-Generation Security Platform automatically created, delivered and enforced protections from this attack. How the Attack

Read More

SyferLock joins Pulse Secure’s Technology Partner Program

SyferLock Technology announced that it has joined Pulse Secure’s Technology Partner Program and has proven interoperability of SyferLock’s GridGuard two-factor and multi-factor authentication solutions with Pulse Connect Secure and Pulse Workspace. SyferLock’s software-based authentication solutions now provide stronger access controls for Pulse Secure’s secure access and mobile security solutions, without the need for hardware tokens

Read More

Riverbed SD-WAN Solution Connects OpenEye to Its Pharmaceutical-Design Cloud Platform in Minutes

Riverbed SteelConnect is delivering cloud-grade agility and scalability to support OpenEye Scientific expanded SaaS offerings. OpenEye Scientific, a developer of large-scale molecular modeling applications and toolkits, is using Riverbed SteelConnect to quickly connect its team members and global biopharmaceutical community to its Orion cloud-based drug discovery platform. SteelConnect, Riverbed’s software-defined wide area network (SD-WAN) and

Read More

Dynamic Application Profiling: What It Is and Why You Want Your WAF to Have It

Because web applications are unique, they have distinct structures and dynamics, and – unfortunately – different vulnerabilities. A web application security device, therefore, must understand the structure and usage of the protected applications. Depending on the complexity of the protected application, this task can entail managing thousands or even hundreds of thousands of constantly changing

Read More

Beyond the Red and Blue Pill – Maintaining Data Usability while Protected

Many of us remember, or have at least have seen the meme, presented by the movie The Matrix, where Morpheus offers Neo a choice between a red pill and a blue pill. The decision is to either live in a harsh reality or choose blissful ignorance. Neo takes the red pill, preferring to explore the

Read More

Further Analysis of WannaCry Ransomware

McAfee Labs has closely monitored the activity around the ransomware WannaCry. Many sources have reported on this attack and its behavior, including this post by McAfee’s Raj Samani and Christiaan Beek and this post by Steve Grobman. In the last 24 hours, we have learned more about this malware. These findings mainly concern the malware’s

Read More

Mobile for work is the next Industrial Revolution

Tech and mainstream news is full of headlines about how mobile is disruptive to business processes, IT departments, and even entire categories of jobs. The real story, the big overarching theme that gets lost in the barrage of headlines about the disruptive potential of mobile devices, is that mobile technology isn’t just changing how we

Read More

The Hunt for IoT

How in the world do Death Star-sized botnets come about? Attackers don’t possess such immense power on their own; they must commandeer it. That means they’re perpetually on the hunt for vulnerable IoT devices that they can compromise. F5 Labs and our data partner, Loryka1, have been monitoring this hunt for over a year now.

Read More

Make Your Cyber Risk Escalation Framework a Stairway to (Security) Heaven

Security is a board-level issue. While the high media focus on data breaches in recent years has played a role in dragging security up the agenda, there are some far more pragmatic and impactful drivers behind this trend: failing to deal with security in the manner that is appropriate to the enterprise’s operational context and

Read More

WannaCry Ransomware-Worm Targets Unpatched Systems

Yesterday, the world saw one of the most significant malware outbreaks for quite some time: our news feeds are full of the news of this cyber attack with institutions in many countries being impacted and reports of whole computer networks being shut down. The malware’s ability to self-propagate was a significant change from what we

Read More

WannaCry: What We Know So Far . . .

An unprecedented cyber-attack by a ransomware variant known as WannaCry—which encrypts a computer’s files and demands payment to unlock them—has propagated at a speed never before seen by cybersecurity researchers. To date, more than 75,000 systems across 100+ countries have been reported infected, with a major toll taken on operational services at targets such as Telefonica in

Read More

CyberArk acquires Conjur

Built for Security. Designed for Agility. Now available for you: An enterprise-grade secrets management solution, tailored specifically to the unique infrastructure and agility requirement of native cloud and DevOps environments, aimed at helping organizations secure and manage secrets used by machines and privileged users throughout the DevOps pipeline. REQUEST A DEMO Resources READ THE PRESS

Read More

It’s not if. It’s when.

How do you best defend against attacks that get stronger and smarter by the day? Make sure your security gets stronger and smarter too. Cisco Security can help. Finally, a security approach that takes the burden off of teams and detects and remediates threats faster. Move to more effective security with an integrated architectural approach

Read More

Get Ready to Rumble!

Citrix enjoys giving back to communities through our SimplyServe programs. At last year’s Citrix Synergy conference, I helped organize a SimplyServe IoT event for a Las Vegas grade school class. We taught 30 fifth-graders how to build a push-to-talk video walkie-talkie in 90 minutes using the Citrix Octoblu IoT platform. We are stepping things up at

Read More

DiamondFox modular malware – a one-stop shop

Check Point researchers have conducted a thorough investigation of the DiamondFox malware-as-a-service in collaboration with Terbium Labs, a Dark Web Data Intelligence company. The report includes a review of the malware’s sales procedure and customer reviews, as well as a full technical analysis of its multiple plugins. For the full DiamondFox report click here. Check

Read More

Active IQ: monitoring / reporting

Real-time system visibility The SolidFire Active IQ SaaS platform, a key element of Active Support, provides real-time health diagnostics, historical performance, and trending from the system level all the way down to each individual volume. This holistic approach to infrastructure monitoring, combined with SolidFire’s unique abilities to upgrade, tune, and scale on-demand without disruption, redefines

Read More

Practice Makes Perfect: Nemucod Evolves Delivery and Obfuscation Techniques to Harvest Credentials

Recently the Unit 42 research team have been investigating a wave of Nemucod downloader malware that uses weaponized documents to deploy encoded, and heavily obfuscated JavaScript, ultimately leading to further payloads being delivered to the victim. From a single instance of the encoded JavaScript discovered in one version of this malware, we pivoted on the

Read More

Announcing ‘Built for Mobility’ release from Pulse Secure

Pulse Secure just released updates to its Pulse Workspace service and Mobility Clients on iOS & Android platforms. This is a ‘Built for Mobility’ release, and makes strides in enabling Mobility for the Enterprises, as part of our ‘Secure Access’ portfolio. Pulse Workspace is our Mobile Device Management offering, and allows enterprises to seamlessly enable

Read More

Salsa is to Chips as Riverbed is to AWS

One of my favorite sayings with some of my favorite people is, “You are the salsa to my chips!” I am sure there are many who would beg to differ with a “You are the guac to my chips!” Really just depends on what you prefer (I definitely go back and forth). But the saying

Read More

Journey to customers: HPE SECURE DATA’S INNOVATION, APPLICATION & SOLUTION

When discussing the focus for data security at Hewlett Packard Enterprise (‘HPE’), it becomes apparent that the worldwide news and headlines of cyber-attacks over recent years, remains a prime motivator for treating the risk of a data breach. Based in Silicon Valley, Tammy Schuring, Vice President of Sales for HPE Security – Data Security, came into the

Read More

Database Activity Monitoring: A Do’s and Don’ts Checklist for DBAs

In a previous post, we looked at the limitations of native audit, the free tool often used by database administrators (DBAs) for logging database activity. While it has its appeal—it’s already part of the database server and does not require additional cost for third-party appliances or software—native audit has issues when it comes to performance

Read More

Mastering Endpoint Security

DATE: Wednesday, May 10, 2017 TIME: 11:00AM PDT | 1:00PM CDT | 2:00PM EDT In the face of constantly evolving threat vectors, IT security decision makers struggle to manage endpoint security effectively. More than two-thirds of enterprises have had their organization’s sensitive data compromised in the past year, and incidents require that significant time and

Read More

How the World Bank is mobilizing their workforce with Android

Since formally launching enterprise support in Android two years ago, we’ve seen an explosion in the way companies are using mobile devices to evolve their businesses. The World Bank Group, which provides financial and technical assistance to developing countries, was one of the first to mobilize their workforce with Android’s built-in enterprise features. With about

Read More

The role of AI in cyber security

Hyper-connected workplaces and the growth of cloud and mobile technologies have sparked a chain reaction when it comes to security risks. The vast volume of connected devices feeding into networks provide a dream scenario for cyber criminals — new and plentiful access points to target. Further, security on these access points is often deficient. For

Read More

Forcepoint Extends Commitment to Securing Global Governments, Names New Executive and Sales Leadership

Global cybersecurity leader Forcepoint™ today announced two leadership appointments that further extend the company’s commitment to delivering the most robust, hardened cyber capabilities to government customers worldwide. Top security talent is increasingly attracted to Forcepoint’s human-focused approach. The company looks beyond technology to understanding the behaviors and intent of people as they interact with critical

Read More

Dridex and Locky Return Via PDF Attachments in Latest Campaigns

Dridex and Locky, two prolific malware families that made waves in 2016 after being distributed in several high-volume spam campaigns, have returned after a brief hiatus. FireEye observed a decline in the volume of Dridex and Locky in the latter half of 2016, but we recently observed two new large campaigns. While the PDF downloader

Read More

Why Networks Matter to App Architecture

A lot of articles have been written on the topic of the sometimes tumultuous relationship between app architectures and the network. For the most part, these have focused on how changes in the app architecture impact the network and the app services used to provide speed, scale, and security. Today, however, we’re going to turn that

Read More

CyberArk Secures Digital Transformation in the Cloud

New Cloud Automation Capabilities Enable Organizations to Begin Securing Privileged Accounts in Amazon Web Services (AWS) in 15 Minutes CyberArk, the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced cloud automation capabilities that enable customers to protect against advanced security threats in dynamic cloud environments.

Read More

Securing the Future with Artificial Intelligence

Artificial intelligence and the Internet of Things are already transforming modern life, from voice-activated personal assistants, to self-parking cars, to self-configuring conference rooms, to systems that help doctors diagnose disease. As more things become interconnected and AI-enabled, our world becomes smarter, more convenient and more productive. Last October, the Mirai botnet took advantage of hacked

Read More

Cisco Security Integrated Solutions

Check out the new Security Operations Center in Cisco Experience Center Singapore and understand how an integrated security posture can protect customers against cyberattacks 24/7.

Read More

Ransomware– Not Only File Encryption

Ransomware is an ever-increasing threat worldwide, claiming new victims on a regular basis with no end in sight. While most ransomware families prevent the victims from accessing their documents, pictures, databases and other files by encrypting them and offering a decryption key in return for a ransom payment, others use different, but no less creative

Read More

Redefine the Future of Networking

Riverbed has announced a definitive agreement to acquire Xirrus, a leading provider of next-gen, cloud-enabled Wi-Fi networks. While this will surely expand the power of Riverbed’s own SD-WAN solution SteelConnect with an industry-leading Wi-Fi solution for Enterprises and Service Providers, I believe the bigger impact will be in setting a new bar for how distributed networks should be deployed and managed overall. Networking is clearly moving away from configuring boxes and moving toward policy,

Read More

Limitations of Artificial Intelligence

At SentinelOne, we often tout machine learning and behavioral detection as the epitome of malware prevention, mitigation, and remediation. This is true—but only because we do it the right way. Our systems are trained correctly and support by a host of interlocking features such as cloud intelligence. This is the second of a two-part series

Read More

Data Categorization or Data Classification?

In the last few years there has been a dramatic shift from data classification being “nice to have” to becoming a “need to have”. Behind this momentum, private companies and organizations are implementing data classification using “traditional” taxonomies and schemas that worked for governments and militaries, but don’t necessarily translate well into the workflow or

Read More

Chico State Speeds Student Access to Resources with NetApp

IT staff improves operational efficiency so students get real-time data on mobile devices, administrators benefit from paperless systems, and campus becomes greener “With students demanding faster, real-time access to campus resources from mobile devices, we needed a data management solution that would keep pace, speed university operations, and stay within the state budget,” said Ray

Read More

Q&A: James Plouffe, lead solutions architect at MobileIron

Just how much do security breaches really cost? Nick Booth puts the question to MobileIron Calculating the cost of a breach can be incredibly difficult. The most easily quantifiable measures are regulatory fines and settlements, but it’s harder to decipher the financial implications of business downtime or the marketing strategies needed to mitigate customer concerns.

Read More

Introducing the New Traps v4.0: Advancing Endpoint Security – Again!

Today, we’re pleased to announce the release of Traps advanced endpoint protection version 4.0. With this release, Traps expands its multi-method prevention capabilities to secure macOS endpoints and Android devices as well as to cover several additional attack techniques. In this post, I’ll go over some of the enhancements we’ve made to Traps and discuss

Read More

HOLY GUACAMOLE! – Chipotle Hit With Data Breach

Chipotle Mexican Grill Inc. has had a rough couple of years, however, it looked to be rebounding from an E.coli outbreak and other food safety issues that started in 2015. But, the burrito barons, the largest fast casual restaurant in the world with a $13.84 billion market capitalization according to Bloomberg data,can’t seem to stay

Read More

This Tricky Phishing Scam Manages to Impersonate Legitimate URLS

This past week, a new web-based phishing scam has emerged that manages to sneakily impersonate legitimate URLs. You heard correctly – this cyberthreat manages to appear to as a secure, trusted website, one such example being apple.com. The deceiving type of attack can be classified as a homograph attack, and it’s extremely challenging to detect.

Read More

Why Care About Data-Centric Security?

It’s no surprise that data breaches are evolving and becoming increasingly more complex. According to the Verizon 2017 Data Breach Investigation Report, data breaches are “complex affairs often involving some combination of human factors, hardware devices, exploited configurations or malicious software.” In today’s interconnected world, a breach can involve one or more paths to your

Read More

End-to-end Protection for Payment Data

In today’s environment of heightened regulatory requirements and increasing risk of cardholder data breach, it is critical for merchants, payment processors, and acquirers to protect payment data anywhere it moves, anywhere it resides, and however it is used. In payment acceptance systems, including EMV (Europay, Mastercard and Visa) terminals, payment data is commonly left unprotected

Read More

Visibility as Foundation for a New Security Model

Defining a “Security 1.0” model is not difficult: It includes the familiar safeguards found in every modern enterprise including firewalls, anti-virus software, perimeter networks, data leakage protection, and so on. The goals of this 1.0 approach have been ambitious, focusing on prevention of attacks. The corresponding implementation, however, has not worked: The offense is far

Read More

Where We’re Headed Now. Charting the Path for a Faster, Smarter, and Safer IoT

The main theme of this year’s Mobile World Congress (MWC) in Barcelona was the ongoing digital transformation toward a “connected society.” 5G will be instrumental in the adoption of Internet of Things (IoT) technologies such as smart homes, smart cities, industry applications, high-speed media delivery, traffic control, autonomous driving, and big data analytics. At the

Read More

Smarter Endpoint Security: How to go Beyond Prevention

Today’s endpoint security products do what they were designed to do, but they still leave gaps in protection. Comprehensive endpoint protection requires prevention, AV, endpoint detection and response (EDR) and other capabilities. Even when organizations adopt multiple point products, there are still gaps in their endpoint protection. Some companies tout “next-generation endpoint security,” but what

Read More

Safely Embracing the Cloud – Forcepoint CASB Overview

Thu, May 18, 2017 11:00 AM – 11:30 AM EDT In order to understand your organization’s risks and protect your users, your security teams need visibility into how users interact with data in the Cloud. The ability to monitor and control how your users engage with sanctioned cloud applications is key. Learn about Forcepoint CASB

Read More

Linux Security: Securing SSH Keys and other Privileged Credentials in the Cloud

According to AWS over 70% of the VMs provisioned are some flavor of Linux. How is your organization securing credentials – especially SSH Keys – that allow access to cloud instances? How are you allowing administrators to logon to AWS instances for management. Join us to discuss the role of Privileged Account Security and Linux

Read More

OSX Malware is Catching Up, and it wants to Read Your HTTPS Traffic

People often assume that if you’re running OSX, you’re relatively safe from malware. But this is becoming less and less true, as evidenced by a new strain of malware encountered by the Check Point malware research team. This new malware – dubbed OSX/Dok — affects all versions of OSX, has 0 detections on VirusTotal (as

Read More

SentinelOne Enterprise Risk Index

SentinelOne’s new Enterprise Risk Index (ERI) provides new evidence of the proportion of attacks that simply cannot be stopped by traditional, static, file inspection security solutions. It’s further proof that attack methods have rendered AV redundant. The ERI is intended as a resource on the commonly encountered threat vectors seen in production environments, as well

Read More

Respecting Customer Privacy is Not an Option

There was recent news of a multi-billion dollar start-up that utilized an actual customer’s network environment for sales demonstrations.  To make matters worse, the practice went on for years, without the customer’s (which happened to be a medical facility) permission or knowledge (which had the potential of violating The Health Insurance Portability and Accountability Act

Read More

Apps are On the Move, What’s a CIO to Do?

People have been on the move for a while — workspaces, applications, and data are increasingly accessed from mobile devices. This has had a big impact on application delivery. For any business these days, its all about apps and its all about the customer experience delivered by these apps. Now applications are on the move

Read More

The Next Generation Data Center Demands a Next Generation Storage Architectur

In today’s digital economy, markets and customer purchasing behaviors are changing. Today’s customers expect everything to be available online, anytime, anywhere, and from any type of device. In order to satisfy these expectations, enterprise IT departments have to react quickly to changing business needs while continuing to manage the mission-critical legacy workloads that “keep the

Read More

8 Ways Governments Can Improve Their Cybersecurity

It’s hard to find a major cyberattack over the last five years where identity — generally a compromised password — did not provide the vector of attack. Target, Sony Pictures, the Democratic National Committee (DNC) and the U.S. Office of Personnel Management (OPM) each were breached because they relied on passwords alone for authentication. We

Read More

Mole Ransomware: How One Malicious Spam Campaign Quickly Increased Complexity and Changed Tactics

On April 11th 2017, we saw a new malicious spam campaign using United States Postal Service (USPS)-themed emails with links that redirected to fake Microsoft Word online sites. These fake Word sites asked victims to install malware disguised as a Microsoft Office plugin. This campaign introduced a new ransomware called Mole, because names for any

Read More

Cloud Networks Made Simple with Riverbed on AWS

AWS makes it simple to set up cloud-based resources. But do you have secure, high-capacity, high-performance connectivity to and between AWS cloud instances? That’s where Riverbed comes in. Riverbed’s SD-WAN solution enables cloud migration and performance, all managed via quick and simple workflows. Register for the upcoming webinar to experience a fundamentally new approach to

Read More

Solving Bigger Problems for Government: Q&A with Carahsoft

Gigamon prides itself on partnering with the best—and this includes Carahsoft, an IT solutions provider known and trusted for delivering best-of-breed hardware, software, and support to federal, state, and local government agencies. Wanting to learn more about trends in the sector, we knew exactly who to call: Carahsoft VP Brian O’Donnell. We met with Brian

Read More

Protecting Sensitive Data In and Beyond the Data Lake

The need to secure sensitive data in Hadoop and IoT ecosystems Hadoop is a unique architecture designed to enable organizations to gain new analytic insights and operational efficiencies through the use of multiple standard, low-cost, high-speed, parallel processing nodes operating on very large sets of data. The resulting flexibility, performance, and scalability are unprecedented. But

Read More

Are You Getting Buried by the Endpoint Security Snowball Effect?

It starts out innocently enough: there’s a dangerous emerging threat to endpoints that can sneak past current defenses. A new startup has just the solution to stop it. Sure, you’re not thrilled about adding another agent and interface to your already overtaxed security team’s portfolio, but it’s just this one small addition, and it really

Read More

MobileIron and Microsoft Strategy

This three-part blog series is my perspective on Microsoft’s strategy, the evolution of Microsoft Intune, and the critical role MobileIron plays in a Microsoft shop. My opinions are based on publicly available and third-party data plus my analysis of Microsoft’s actions. Part II of this series provides a high-level comparison between MobileIron and Microsoft Intune,

Read More

7 Practices that Make Your Organization Vulnerable to Cyber Attacks

Today I read “How you can be the smartest cybersecurity expert in the room” on CIO.com. The author notes, “many CIOs and senior IT leaders are almost clueless about where to focus and how to start building next-gen security functions.” He references 20 CIS Critical Security Controls presented by the SANS Institute that organizations can

Read More

6 steps to prepare your architecture for the cloud

Face it: most IT architectures are complicated. And if you’re considering moving to cloud, you’re right to be concerned about the vast changes that will be required of your architecture—and your organization—as you make your transition. The good news is that if you’re like most companies, you’ve done this before. Many times. About every three

Read More

Securing Finance: Lessons Learnt So Far

In 2016 FireEye observed an increase in the number of advanced targeted attacks leveraged against financial institutions in Europe and the Middle East. Much of the activity involved sophisticated financially motivated attackers targeting poorly defended institutions, and centred on the interbanking messaging system. Join Mandiant’s live webinar and hear real world experts as they discuss

Read More

Gartner: Critical Capabilities for Enterprise Data Loss Prevention 2017

Forcepoint Received Highest Product Score For Regulatory Compliance Use Case in Gartner’s Critical Capabilities Report According to Gartner: “Security and risk management leaders deploy enterprise DLP for three major use cases: regulatory compliance, intellectual property protection and visibility into how users handle sensitive data. This research evaluates DLP products for the three use cases, derived

Read More

The Successful CISO: Tips for Paving the Way to Job Security

Seasoned CISOs know that failure to plan past a two-year window is dangerous—to both their company and their job security. But it’s all too common for many security strategies to look only two years out. Imperva CISO Shahar Ben-Hador has been with Imperva for eight-and-a-half years—the last two-and-a-half in the role of CISO, just past

Read More

CHECK POINT INFINITY

Check Point Infinity is the first consolidated security across networks, cloud and mobile, providing the highest level of threat prevention against both known and unknown targeted attacks to keep you protected now and in the future. Check Point Infinity leverages unified threat intelligence and open interfaces, enabling all environments to stay protected against targeted attacks.

Read More

The Cisco 2017 Annual Cybersecurity Report

This report identifies the major trends impacting cybersecurity across regions and industries. Leveraging Cisco’s wealth of resources and expertise, the Annual Cybersecurity Report (ACR) will help you design an integrated, automated security environment that detects and remediates attacks much faster. Learn security industry insights and key findings taken from threat intelligence and cybersecurity trends. Download

Read More

Redefining the ADC: Managing hybrid/multi-cloud application delivery

Learn how Citrix is redefining the ADC to manage application delivery in hybrid and multi-cloud environments with Citrix NetScaler. Learn more at https://www.citrix.com/why-netscaler.

Read More

Cybersecurity Attacks Hit 87% of Organizations in 2016

A recent report found the majority of IT professionals said their entity was affected by a cybersecurity attack in 2016, with half expecting to raise their security budgets. A majority of organizations reported that they were affected by a cybersecurity attack last year, with one in three saying that they had been hacked more than five

Read More

3 Ways to Speed Office 365 Adoption – Webinar

Thursday, May 4th, 2017 | 11am PT | 2pm ET Get on track for high ROI and user productivity There are many routes you can choose on the journey to Office 365. Some are smooth and well-traveled. Others are backroads fraught with detours and hazards. Whether you are in the planning stage of your journey

Read More

Endpoint Protection for SCADA and ICS Environments? Traps Has Your Back

Information technology (IT) administrators have been quick to adopt new security solutions, but operational technology (OT) administrators are forced to proceed cautiously, in order to prevent compromising process performance or unwanted downtime. These concerns can result in deliberately leaving software unpatched, antivirus (AV) signatures outdated, technologies disjointed, or security solutions left out entirely. Even organizations

Read More

Preventing Ransomware Attacks Becomes Vital in Healthcare

The deluge of ransomware attacks in 2016 on hospitals and other healthcare facilities plastered headlines. It even seemed that healthcare could be the most susceptible industry to face such attacks. Facilities providing critical care rely on access to up-to-date information from patient records or face delays that could cause malpractice or even death. With a

Read More

Shortening Your DCAP Short List: Five Critical Things to Consider for a Data-Centric Audit and Protection Solution

Exponential data growth. You’ve heard it many times before, but it’s still the most accurate way to describe the enormous (and growing) amount of data that businesses generate and collect today. It’s this growth that is driving today’s enterprises to revisit their strategies for data security and governance and shift their focus to data-centric audit

Read More

Why I Advocate for NetApp

Last year, I was invited to join the EMEA Chapter of the NetApp A-Team. Having never heard about it before, my first thought was that this was some gang of renegades that drove around in a black van with a red stripe on the side, saving the world. As it turns out, this is only

Read More

McAfee Goes Back to the Future

I want to address a change that began six months ago and is now official– we’re now back to the future, to McAfee. I’ve talked to many partners, and your comments have been in line with how our internal teams feel – the new McAfee brand is very exciting and timely. If you’re a long-time

Read More

Think Beyond 365 Office

Securing Office 365 on mobile devices is essential to the success of any mobile enterprise strategy, but there’s more to it than that. It’s time for organizations to think beyond Office 365 and ensure their mobile security model can seamlessly extend to other enterprise apps and cloud services such as Salesforce, Google Drive, Box, and

Read More

GDPR Compliance and Its Impact on Security and Data Protection Programs

It’s almost impossible to ignore the buzz around the upcoming General Data Protection Regulation (GDPR), which will require EU organizations to significantly address how they process and protect personal data. The GDPR is estimated however, to save businesses around €2.3 billion annually*. Join Mike Osterman (Osterman Research) as he discusses how working towards GDPR compliance

Read More

FireEye Helix

Today’s security operations are frequently disjointed and plagued by limited visibility and false alerts. As a result, organizations are unable to quickly and cost-effectively prioritize and respond to threats. The Solution? FireEye Helix. FireEye Helix is a revolutionary intelligence-led platform that simplifies, integrates and automates security operations. It offers FireEye network security and endpoint protection,

Read More

Growing Momentum on the Public Cloud with AWS

Gigamon launched the Visibility Platform for AWS a few months ago to strong interest from our customers and partners who need pervasive visibility to data-in-motion across on-premise and public cloud deployments. It’s been a busy few months (very busy) as we’ve continued to grow our offering on AWS and elevate our partner statuses. The AWS

Read More

HPE Secures FIPS Validation for Format-Preserving Encryption

Hewlett Packard Enterprise reached a major milestone this week, announcing on April 13 that its Format-Preserving Encryption (FPE) technology is now Federal Information Processing Standards validated. Terence Spies, chief technologist at HPE Security, said getting its FPE technology FIPS validated has been a long process. “We invented Format-Preserving Encryption back in 2007,” Spies told eWEEK. FIPS

Read More

New Wave of Ransomware Could Put Utilities at Risk

The stakes for protecting against ransomware are about to get higher as malicious tools evolve to target Industrial Control Systems (ICS) and threaten critical infrastructure. Researchers have demonstrated proof-of-concept ransomware attacks against programmable logic controllers (PLC) used in many operational environments, including utilities. Unlike attacks against corporate networks, which can result in expenses and revenue

Read More

Demanding a Plan for Cyber Resilience in the IoT

Earlier this month, I wrote about the need for a holistic security strategy for the Internet of Things (IoT). It’s more than securing a ‘thing’ within the IoT – it’s about building resilience for the whole system. Cyber resilience is about managing risk; identifying potential risks, evaluating the likelihood of them occurring and their negative

Read More

NetScaler and Kubernetes: An Enabler for Digital and DevOps Teams

In 2016, we sowed the seeds of putting a Citrix NetScaler application delivery proxy in the hands of developers to roll out apps quickly with CPX Express, a NetScaler in a Docker container. At DockerCon 2017, we are completing the equation by arming the DevOps professional and members of the Cloud and Digital teams with

Read More

F5 Private Cloud Solution Package for OpenStack

App Services in Red Hat OSP Cloud Deployed in Days Today’s software-defined economy requires businesses to move faster than their competitors. Speed and agility are critical to keeping up with competitive demands for new applications. IT organizations must respond aggressively to match application and DevOps requirements to server business needs, and the private cloud is

Read More

Unknown Malware Continues to Rise

Last year, unknown malware downloads rose over 900% with more than 970 downloads per hour compared to 106 previously. Known and unknown malware, bots and mobile vulnerabilities – find out where your organization is most exposed in the 2016 Check Point Security Report. YOU WILL LEARN: The latest trends in known and unknown malware To

Read More

Ready, Aim, Protect With Total Endpoint Protection

Tuesday, April 18th, 2017 at 3:00 PM EDT (19:00:00 UTC) Eran Ashkenazi and G. W. Ray Davidson, PhD With cloud and mobile computing, endpoint devices have become the new enterprise security perimeter and the primary entrance for security breaches. Security professionals are feeling more pressure to lock them down, but where to start? When it

Read More

3 Ways to Speed Office 365 Adoption – Webinar

Thursday, May 4th, 2017 | 11am PT | 2pm ET Get on track for high ROI and user productivity There are many routes you can choose on the journey to Office 365. Some are smooth and well-traveled. Others are backroads fraught with detours and hazards. Whether you are in the planning stage of your journey

Read More

Visibility-Enhanced. Deployment-Streamlined.

A key element of the Advanced and Enterprise Edition of Pulse Secure’s Suite, Pulse Policy Secure offers the visibility and enforcement capabilities required for enterprise secure access.   In Release 5.4, Pulse Policy Secure has become more integrated with other Pulse offerings for secure access enhancements. With Pulse Connect Secure 8.3, Policy Secure now offers an

Read More

Palo Alto Networks Welcomes LightCyber to the Team

In February 2017, Palo Alto Networks acquired LightCyber, a leader in behavioral analytics technology.

Read More

neteffect Offers Hybrid Cloud Disaster Recovery Solutions with NetApp

NetApp converged infrastructure gives neteffect technologies the flexibility to blend on-premises and cloud services for customers “Previous IT solutions that promised to be dynamic and expandable quickly reached their limitations, which ultimately threatened to affect our sales,” says John Campbell, Chief Technology Officer of neteffect. “By combining NetApp storage with Cisco UCS servers, we have

Read More

What’s In a Name?

In one of the most iconic self-help books of all time, How to Win Friends and Influence People, Dale Carnegie outlines several strategies to earn favor from others. Among them is recognizing that a person’s name is, to that person, the sweetest sound in any language. I’ll posit a reason: Your name is your first

Read More

2017 Cyberthreat Defense Report

Register now to download CyberEdge’s fourth-annual Cyberthreat Defense Report – a comprehensive review of the perceptions of 1,100 IT security professionals representing 15 countries and 19 industries. Some key insights from this report include: 79% of networks were breached, compared to 62% three years ago Malware and spear-phishing are causing the most headaches Low security

Read More

IoT Driving the Need for More Secure Big Data Analytics

IoT Summit 2017 Keynote – Reiner Kappenberger, HPE Security Data Security

Read More

SSO for your Hybrid Cloud

In our recently released State of Application Delivery report, 80% of survey respondents said they employ a hybrid cloud strategy, meaning they have applications that reside in a combination of SaaS environments, on-premises, and in IaaS. Oftentimes, the question of lifting and shifting an on-prem legacy app to the cloud gets a quick answer: too

Read More

What About the Plant Floor?

Six Subversive Security Concerns for Industrial Environments Industrial enterprises – like electric utilities, petroleum companies, and manufacturing organizations – invest heavily in industrial control systems (ICS) to operate industrial processes efficiently, reliably, and safely. Without technology operating the plant floor, business halts or worse. Learn about six key plant floor weaknesses that adversaries exploit to

Read More

Off-The-Shelf Ransomware Used to Target the Healthcare Sector

In the past year, the Healthcare sector was one of the biggest industries that were hit by ransomware attacks. Being inclined to paying ransom to recover patient data, the Healthcare sector became a low hanging fruit for seasoned ransomware operators looking to maximize profit, such as those behind the Locky ransomware. However, it appears that amateur cybercriminals have also

Read More

Did You Know That Gigamon Can Help with Online Fraud Detection?

As many of you are aware, online fraud is on the rise, continuing to grow year after year. But did you know, as BBC News reported, that from 2013 to 2014, losses from online banking fraud grew by a whopping 48%?  While numerous online fraud analysis solutions exist to stunt this growth, such stats show

Read More

Citrix NetScaler @Synergy 2017: Bigger & Better Than Ever

Showcasing our latest innovations to help you reliably and securely deliver Apps in Cloud & SaaS. Market drivers shaping the future of Application Delivery Network The way apps are delivered is changing rapidly. We see the following major trends shaping App Delivery and the changing role of networking and infrastructure professionals in IT organizations, in being

Read More

CyberArk Expands C3 Alliance to Drive Greater Cyber Security Innovation and Collaboration

New Integrations with Atos, Phantom, Proofpoint and RSA Enable Customers to Drive More Effective Security and Value from Existing IT Investments  CyberArk, the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced the expansion of the C3 Alliance, CyberArk’s global technology partner program. Extending the power

Read More

Don’t take risks with your network

We’ve got it all covered. Network covered. Branch covered. Every access point covered. Be secure. And digitally transform your business.

Read More

The latest findings on Chrysaor (Pegasus for Android) are even more stealthy

Earlier this week Google published a research about a new sophisticated spyware tool for Android, believed to be related to the Pegasus malware for iOS, which was discovered in August 2016. As Google wrote in their blog, the malware was most likely created by the authors of Pegasus – the NSO group, and shares many

Read More

NY Cybersecurity Regulation Targets Financial Services, but Implications are Much Wide

The web of security and privacy regulations continues to grow this month as the New York Department of Financial Services (DFS) became the latest regulator to impose cybersecurity requirements on organizations it oversees. While this regulation primarily targets Financial Services organizations in New York, the implications are much wider. By March 2019, third party service

Read More

Ewind – Adware in Applications’ Clothing

Since mid-2016 we have observed multiple new samples of the Android Adware family “Ewind”. The actors behind this adware utilize a simple yet effective approach – they download a popular, legitimate Android application, decompile it, add their malicious routines, then repackage the Android application package (APK). They then distribute the trojanized application using their own,

Read More

Securing the organisation against the fines of the GDPR

In just over a year, the new European General Data Protection Regulation will come into effect yet much of the recent research suggests that organisations remain unprepared. If this unpreparedness results in a data breach that could have been avoided, those organisations could be in line for a huge fine. So now is the time

Read More

SentinelOne Endpoint Protection Platform Overview

Watch this short introduction to learn the mechanics of SentinelOne’s Endpoint Protection Platform.  

Read More

The Radicati Market Quadrant for Advanced Persistent Threat (APT) Protection 2017

INDUSTRY ANALYST REPORT THE RADICATI GROUP: FORCEPOINT IS A LEADER IN ADVANCED PERSISTENT THREAT (APT) PROTECTION The Radicati Market Quadrant for Advanced Persistent Threat (APT) protection identifies vendors by the development of their strategy and technology in regard to the detection, prevention and possible remediation of zero-day threats and persistent malicious attacks. The results of Radicati’s

Read More

Defense in Shallow: Four Reasons Attackers Slip Past Conventional Security Deployments

Many security vendors offer what they call “defense-in-depth solutions”, with multiple layers of protection. Unfortunately, most of those solutions provide only a shallow defense against today’s advanced cyber attacks. Read about four of the reasons cyber attacks succeed and what’s needed to combat them, including the ability to: Look across multiple threat vectors and flows

Read More

McAfee is Back – And Ready to Lead

Today we introduce a ‘new’ McAfee to the world. It’s the right move at the right time. Not only for us, but for the global cybersecurity industry. We have a clear roadmap to lead in innovation, and an opportunity to shape the marketplace as never before. The headlines we drive today span many dimensions. We

Read More

WS DDoS Mitigation: Challenges, Best Practices and Tips

With Amazon Web Services accounting for more than one third of the cloud infrastructure market, many websites rely on AWS. While Amazon protects its own platform from attacks, websites that do not use AWS Shield are not protected from DDoS attacks. If your web server gets hit by an application layer DDoS attack, AWS will not mitigate it. If

Read More

Backup to the Cloud For Dummies

Get this easy-to-use guide to learn how to efficiently and securely back up and archive your data to the cloud. Learn how to: • Integrate your existing backup infrastructure with the cloud. • Improve data management, protection and disaster recovery. • Evaluate backup solutions and resolve data storage challenges.   Download the ebook

Read More

The Blockbuster Sequel

Unit 42 has identified malware with recent compilation and distribution timestamps that has code, infrastructure, and themes overlapping with threats described previously in the Operation Blockbuster report, written by researchers at Novetta. This report details the activities from a group they named Lazarus, their tools, and the techniques they use to infiltrate computer networks. The

Read More

GDPR – be prepared, be response-ready

As any business unfortunate enough to have suffered a data breach can attest, in a crisis situation, being organised enough to provide a detailed notification to affected customers (or indeed regulators) is a difficult task on its own. When combined with required incident response processes – identifying the cause, closing the vulnerability, all while determining

Read More

SteelHead SD – A Quick Demonstration

Riverbed SteelHead SD combines the power of industry-leading SteelHead WAN optimization with innovative SD-WAN and Cloud Networking capabilities, powered by SteelConnect, into a streamlined, single appliance. Find out more about Riverbed SteelHead SD here http://rvbd.ly/2nvV21T

Read More

How to Talk Cyber Risk with Executives

On March 7th, 2017, a bipartisan bill was introduced to the U.S. Senate called the Cybersecurity Disclosure Act of 20171. The bill’s purpose is to “promote transparency in the oversight of cybersecurity risks at publicly traded companies.” It adds Securities and Exchange Commission (SEC) requirements for public companies to disclose what cybersecurity expertise is present

Read More

Who is Responsible for What

Today, the benefits of cloud computing are very well established: it is less costly and provides increased flexibility and agility, including the ability to support on-demand computing at scale. The debate surrounding the security of cloud computing, specifically whether data was more secure in the cloud or not, has for the most part been settled.

Read More

Securing Cisco Networks with Sourcefire Intrusion Prevention System (SSFIPS-ATV) – Administration Training Videos

Welcome to the Securing Cisco Networks with Sourcefire Intrusion Prevention System (SSFIPS-ATV) Administration Training Videos page. These videos are intended to serve as prerequisite training for the Securing Cisco Networks with Sourcefire Intrusion Prevention System (SSFIPS) course. For more info on the course visit Security – Training Resources – Cisco Systems Page. If you are

Read More

Introducing XenApp Essentials Citrix

Citrix XenDesktop Essentials Service accelerates Windows 10 Enterprise migration for customers who prefer Microsoft Azure cloud solutions. XenDesktop Essentials enables customers who have licensed Windows 10 Enterprise (Current Branch for Business) on a per-user basis the option to deliver a high-performance Windows 10 Enterprise virtual desktop experience from Azure with the power of XenDesktop. Consult

Read More

Stopping Your Staff from Raining Data from the Cloud

No matter what your company’s official position is on the use of cloud services, your employees absolutely depend on them as part of their day-to-day work. The problem: the services they tend to use usually aren’t the ones you want them to use. A 2015 study of cloud usage found that employees were using 15

Read More

Securing Assets and Applications in the Cloud

In our recent blog, Cloud Security: Who is Responsible for What?, we focused on the idea of shared responsibility in cloud environments; with IaaS/PaaS, the customer is responsible for everything above the hypervisor, while the cloud vendor takes responsibility for the infrastructure itself. We also addressed how the public cloud vendors’ management consoles are a

Read More

Beyond NonStop Encryption

In the world of NonStop, we may take for granted as truth that high availability matters. But so does scalability—and that includes the ability to scale protection of data at-rest beyond NonStop to include the broader enterprise storage ecosystem where data may be in motion and in use. Because if data isn’t protected and trusted,

Read More

Welcome to the New McAfee

  Today is the first day of new McAfee, and the first day of a new future we can share together. Chris Young shares his promise to the industry: Our connected world is under siege by adversaries threatening the digital freedom sacred to us all. An industry with no shortage of problems needs a commensurate

Read More

Example architectures for data security and the GDPR

The European Union (EU) General Data Protection Regulation (GDPR) is the most significant development in data privacy in decades. Its aim is to protect EU citizens from privacy and data breaches. The regulation comes into effect on 25 May 2018 and imposes heavy fines—up to 4% of annual revenue—on organizations for noncompliance. While the GDPR

Read More

SteelHead CX Completes Common Criteria Certification

It’s been close to a year, but we finally did it! Riverbed’s SteelHead CX was awarded Common Criteria certification! Specifically, the SteelHead platform has been certified at Evaluation Assurance Level Two Augmented with Flaw Remediation (EAL2+). What is Common Criteria? Briefly, it’s an international standard designed to build trust in the security of IT systems.

Read More

Reactive Isn’t Working

This video featuring Dr. Stephenson, Technology Editor, SC Magazine, and Chris Cardran, Enterprise Technology Architect, Intel Security, explores how threat intelligence sharing and crowdsourcing can strengthen defenses and minimize impacts from zero day vulnerabilities by applying diversity in analysis, context and situational awareness to detect and correct threats.

Read More

FireEye & Belden: Protecting ICS with Enterprise and Industrial Security

Industrial Control Systems are increasingly open to attacks as the industrial internet of things grows and more systems are exposed to open networks. FireEye and Belden are working together to help mitigate the impact of attacks against critical infrastructures around the globe.

Read More

SWIFT Security Concerns Resurface

The Bangladesh Bank heist has resurfaced as reports around a potential perpetrator make headlines. The recent focus may be on who and why, but lessons should be learned from what happened – it’s important to recognize common attack patterns and understand the role of privileged accounts. As a recap: last year, cyber criminals embezzled money

Read More

Instant Desktop Computing, From the New Samsung Galaxy S8 Smartphone

Today, at Galaxy UNPACKED 2017 at Lincoln Center in New York, Samsung launched the Galaxy S8 smartphone. It’s big news that’s spreading fast across social media. So, you might ask, what’s the big deal in the eyes of Citrix? Citrix runs on any device—desktop, laptop, Chromebook, thin client, tablet, smartphone—so everyone expects the S8 will be another

Read More

Effective Security for Today’s Threats

Security that’s effective, automated and integrated. Intrusion detection and prevention remains a powerful defense strategy – and Cisco is recognized as a Leader by Gartner. Security innovation, integration with our Advanced Malware Protection (AMP) and the Cisco network and strong customer support let Cisco NGIPS deliver the effective, automated, and integrated security customers need against

Read More

From DDoS to Server Ransomware: APACHE STRUTS 2 – CVE-2017-5638 Campaign

A common infection vector used by botnet creators is scanning the Internet for web vulnerabilities to exploit for malware or back doors. The advantage of hitting servers over personal consumer devices is the ability to leverage powerful hardware that is always online and has high bandwidth. Also, many servers do not have anti-virus solutions in

Read More

Demo of WhatsApp Web Account Takeover

A vulnerability has been discovered in WhatsApp Web. This vulnerability, if exploited, would allow attackers to completely take over users’ accounts on any browser, and access victims’ personal and group conversations, photos, videos and other shared files, contact lists, and more. This means that attackers could potentially download photos and or post them online, send

Read More

Secure Access Solutions for Mobile, Cloud, and Internet of Things

Tuesday, April 11, 2017 | 8:00-9:00am PST / 11:00-12:00pm EST Embrace the latest cloud, mobile and IoT technologies with Secure Access. Learn how Pulse Secure’s latest features and capabilities make it simple to securely roll out new end-user services to support the latest IT transformation without compromising security compliance or taxing your IT team. Last

Read More

Wanna be a game changer?—Networking Mantras for the 21st Century

Managing networks can mind-numbingly complex. Does it have to be? Most of us would rather do something more strategic than repetitive CLI. What is the alternative? Riverbed’s software-defined WAN (SD-WAN) solution changes the game. Find out more… Start your free trial of Riverbed SteelConnect here: http://rvbd.ly/2nbFBbD

Read More

Best practices for securing, analyzing, and mitigating threats to your AWS applications

Companies are increasingly moving applications to Amazon Web Services to leverage the scale, elasticity, and innovative services capabilities of the public cloud. According to a recent Intel survey of 2000 IT professionals, 93% are using some type of cloud service with more than 60% moving customer data into cloud infrastructures. As networks expand and perimeters

Read More

Harness the Full Potential of the Hybrid Cloud

Transform your Hybrid Cloud vision into reality. Learn how a Data Fabric powered by NetApp can help you: Evaluate hybrid cloud strategies to meet your needs. Address cloud-based data management challenges. Move, manage, and protect data across the hybrid cloud with a Data Fabric. Move your organization to a hybrid cloud model today. Get the

Read More

6 Things Every CIO Should Know About iOS 10.3

Last year at the end of March, Apple released important new enterprise features in a sub-point release (iOS 9.3), breaking a tradition that harkens back to the release of the very first iOS device in 2007. While in the past, most major iOS enhancements were announced at Apple’s Worldwide Developer Conference (WWDC), and delivered in

Read More

Tilting the Playing Field: How Misaligned Incentives Work Against Cybersecurity

Cybercriminals have long had the advantage, continually finding new ways to steal data, break services, and disrupt the legitimate flow of information. They are not necessarily better. They benefit because of a mismatch between the incentives of attackers and defenders. To better understand this misalignment of incentives, the Center for Strategic and International Studies surveyed

Read More

Payment Compliance Does not Always Equal Security

Payment data breaches still make big headlines. I have lost count of how many times in the last two years I have had to change my credit card because it was marked as being compromised. Why does that keep happening? The answer is how much your payment processor believes that compliance equals data security. Does

Read More

Your Tools Deserve a Solid Foundation

One of the most important steps in designing and deploying a visibility platform is determining where and how to collect packets from across your computing environment. No matter how great your security or performance tools, if you don’t provide them with the right packets, they won’t be able to effectively do their job monitoring and protecting your

Read More

What SaaS teaches us about automating network infrastructure

The success of SaaS is largely due to companies being able to identify and encapsulate in software commoditized business processes. The same holds true for network and infrastructure teams inside the business. SaaS (Software as a Service) is the largest of the “cloud” markets today. In spite of the excitement around IaaS (like AWS and

Read More

Hunting Privileged Account Vulnerabilities with CyberArk Discovery & Audit (DNA)

It’s widely understood that cyber intruders and internal threat actors seek and exploit privileged accounts to help them achieve their goals. Security experts advise organizations to know what’s on their networks and know it better than any potential adversary. But discovering and locking down all of the privileged accounts within your enterprise is easier said

Read More

Securely access business apps and data with BYOD

A bring your own device (BYOD) program can lower costs and improve business productivity. With Citrix, a BYOD program can meet IT security guidelines and allow workers remote access for secure end user computing. Virtual desktops, secure file sharing and mobility integrate for a complete mobile workspace. Learn more about Citrix mobile workspaces at https://www.citrix.com/workspacesuite

Read More

Senate Votes to Allow ISPs to Legally Sell Your Browsing History Without Permission

In what the LA Times called a “norrow vote,” the Senate yesterday overturned privacy rules passed last year by the FCC. The rules are intended to keep individual user’s browsing history and usage data private by requiring that they obtain legal permission first. After a 50-48 vote, the Senate will pass the vote to the

Read More

Online Denial of Service Attacks Are a Growing Concern

Last year, millions of Australians were unable to fill out mandatory Census online data forms because the government website was slammed by a distributed denial of service (DDoS) attack. It now appears that the Australian Bureau of Statistics (ABS) was overconfident in their ability to stop a DDoS, since the online website was brought down

Read More

CyberEdge 2017 Cyberthreat Defense Report

Sponsored in part by HPE Security – Data Security Register now to download CyberEdge’s fourth-annual Cyberthreat Defense Report – a comprehensive review of the perceptions of 1,100 IT security professionals representing 15 countries and 19 industries. Key insights from this year’s report include: 79% of networks were breached, compared to 62% three years ago 61%

Read More

What Are You Sacrificing to Protect Your Endpoints?

Pop quiz: What’s the right balance between user flexibility and endpoint security? It’s a trick question—there is no right answer. Or rather, there are as many answers as there are organizations. The “right” balance is a function of an organization’s culture, its approach to security, its level of in-house security expertise, and many other factors.

Read More

Check Point discusses securing web servers with multi-layered security at Google Next 2017

Check Point security expert Erez Berkner discusses securing web servers in the cloud during the Third-party networking solutions for layer 7 networking on GCP at Google Next 2017.

Read More

Looking Beyond AV: Solving the Endpoint Protection Problem

There has been a noticeable decline in the effectiveness of traditional antivirus since 2012, but now it has become a serious problem. Read this whitepaper to find out why modern malware techniques are simply too advanced for AV and why it’s only going to get worse in the future. Download

Read More

Imperva FlexProtect Simplifies Security for Hybrid Cloud Application Deployments

FlexProtect, SIEM dashboard and scalable WAF deployments help customers dynamically protect their applications in the cloud and on-premises. Imperva, Inc. (NASDAQ:IMPV), committed to protecting business-critical data and applications in the cloud and on-premises, today announced Imperva FlexProtect to give customers access to both Imperva SecureSphere and Imperva Incapsula within a single subscription agreement. By providing

Read More

GHD Customer Testimonial for Riverbed SteelConnect

When global professional services company GHD merged with North American engineering consultancy Conestoga-Rovers & Associates (CRA), it added more than 3,000 employees in 100 offices, including 50 small sites. They needed a simple, cost-effective solution to enable the rapid deployment of those new sites onto the company’s network. Riverbed SteelConnect has helped GHD achieve this,

Read More

What Biosecurity and Cybersecurity Research Have in Common

Biosecurity and cybersecurity research share an unusual predicament: Efforts to predict and defend against emerging threats often expose and create vulnerabilities. For example, scientists must first learn how to isolate and grow a pathogen before they can develop a new vaccine. Similarly, researchers must first learn how to break into a computer system in order

Read More

Is Your Security Team Ready For Cloud?

By now, most of us in IT are well aware of the technical and business advantages that moving to a cloud-based data center provides. But there is still a lingering hesitancy among some organizations considering a move to the cloud. In my experience, most concerns boil down to two factors: a reluctance to put trusted

Read More

Wirestorm Success Story: Automated DevOps and Cost Reduction Across Multiple Clouds

“When I look at a platform that allows me to do an end-to-end solution all the way up to Amazon Web Services (AWS) or Azure, deploying applications in under a minute, that’s a very powerful platform” (Abdul Masri, CEO of Wirestorm) Do you want to reduce your cloud configuration and replication times from hours to

Read More

MobileIron adding IoT management to its arsenal

MobileIron, which went public in 2014, has been known mostly for helping large companies manage mobile devices, especially in a time when people tend to bring their own. Today it announced it was expanding that mission to the Internet of Things. When you think about it, it’s a logical move for a company that is

Read More

Forcepoint Cybersecurity Leadership Forum to Deliver Insights on the Prevailing Threat to Government Agencies: Human Behaviors and Intent

Global cybersecurity leader Forcepoint™ today announced that Chief Executive Officer Matthew P. Moynahan will be joined by retired four-star general Michael Hayden, former White House chief information officer Theresa Payton and author Peter Singer in delivering keynote addresses at the premier Forcepoint Cybersecurity Leadership Forum. The Forcepoint forum, “Future View: The Human Point,” will take

Read More

Where is Data Being Taken From?

Learn about different places data is being stolen from.

Read More

GDPR Compliance and Its Impact on Security and Data Protection Programs

The GDPR Regulation applies to every organization anywhere in the world that controls or processes personal data of EU residents. Discover “GDPR Compliance and Its Impact on Security and Data Protection Programs” in Osterman Research’s new White Paper. Download now.

Read More

Four Elements of Future-Proof Security

Organizations constantly fight to protect their data and reputation from increasingly resourceful attackers in an ever evolving threat landscape. They face a shortage of security experts, inefficient processes, and multiple siloed point products. Engaging in a Security as a Service model will help your security team overcome these issues. It’s more than cloud security –

Read More

Three Things Holding You Back from Embracing DevOps

No, not you. You. Executives aren’t nearly as giddy over DevOps as those in the trenches, and the answer may be found in one of these three key concerns. High-performing organizations have not just adopted, but embraced, DevOps. Puppet Labs’ seminal State of DevOps report has shown us this for the last two years, and

Read More

The Yahoo Breach: Privileged Account Compromise Revealed

According to an article in Ars Technica, in an interview last evening, the FBI implied that the attackers who infiltrated Yahoo – including two alleged Russian FSB agents – followed a common pattern seen in many high profile cyber attacks including SWIFT and the Bangladesh Bank, the Ukraine power outage, the DNC, U.S. Office of

Read More

Client Portals: Meeting Your Ethical Obligations

Email is the most common form of communication in almost every business. Law firms are no exception. Email is fast and convenient. An entire discussion or exchange can occur and conclude over a short period of time and that discussion is memorialized in the emails. Email can be received anywhere the recipient has access to

Read More

Hancitor Makes First Appearance in Top Five ‘Most Wanted’ Malware in Check Point’s February Global Threat Impact Index

Hancitor has surged into the top five of our ‘most wanted’ malware families worldwide for the first time, according to the new February Global Threat Impact Index from our Threat Intelligence Research Team. The downloader, which installs malicious payloads such as Banking Trojans and ransomware on infected machines, climbed 22 places after more than tripling

Read More

TITUS to Provide Solutions to NATO Agencies around the World

TITUS and the NATO Communications and Information Agency (NCIA) recently signed a joint Master Service Agreement (MSA) that enables TITUS to supply our solutions to NCI Agency, NATO Member Nations and other NATO entities. Cybersecurity is a major area of concern for NATO, and is considered the fourth domain of operations after air, land and

Read More

Cyber Threat Alliance Expands: Working Together to Prevent Cyber Breaches

Yesterday, I stepped on a stage in San Francisco with CEOs and leaders from five other cybersecurity companies – Check Point, Cisco, Fortinet, Intel Security and Symantec – to announce the revamped, bigger and now-independent Cyber Threat Alliance. Normally, we are competitors. However, the Cyber Threat Alliance brings us all together in good faith to

Read More

Q&A with NetApp CEO George Kurian

You’re coming up on two years as the CEO of NetApp, leading the team through major industry disruption and internal transformation. What lessons have you learned? Transformation is an ongoing journey for any company. The global economy is changing rapidly, and customer priorities are evolving to keep pace. We’ve already seen that if organizations, especially

Read More

Welcome macOS

I’d like to take a moment to welcome our latest OS platform to MobileIron Cloud, macOS! Apple recently announced their best quarter ever for macOS, shipping over 5 million Macs, so the timing couldn’t be better. While macOS management has been available for some years on our Core platform, macOS is a relative newcomer to

Read More

McAfee – Cybercrime is a firefight! Time for Automation.

Those who have experienced them know how scary their world becomes when a grass fire or forest fire gets out of control. As these fires become more intense, they create their own weather, generating their own winds, making them more difficult to fight and often moving far faster than firefighters can.  The outcome is often

Read More

GDPR Series: The Penalties for Non-Compliance

In the first three parts of this series, we covered the GDPR basics: who is subject to the GDPR requirements, what rules require data protection technology, and how you can start preparing your organization for the regulation. In this final installment, we will cover what happens when you are not in compliance with the GDPR

Read More

M-Trends 2017: Trends Behind Today’s Breaches & Cyber Attacks

Join this important webinar as the Mandiant team explores trends that define today’s threat landscape based on Mandiant’s investigation of the year’s successful cyber attacks. Register today for an intelligence-led look into: New phishing trends breaching today’s companies. Changes in modern attack telemetry and methodology. Intelligence-led insights into emerging global threats. Modern defensive strategies to better protect

Read More

Security—It’s Not Just an IT Problem. It’s a Business Problem.

Over the past few years, multiple studies have shown that information security risk is one of the top two or three concerns of every organization’s board of directors. CSOs are spending more time in front of their boards educating them on information security risks faced by the business, and helping them to understand how they

Read More

4 things to watch for in your cloud blind spots

Just as you need to be aware of blind spots when you drive your car, you also need to check for blind spots as you move your company to the cloud. Dazzled by the agility, capital expenditure reductions, efficiencies, and productivity gains the cloud offers, many chief information officers miss four dangers that are hidden

Read More

The Immutable Truth of Data Breaches: They Will Cost You

Home Depot last week settled with a major card providers that had to issue new debit and credit cards to customers following the retailer’s massive breach back in 2014. Home Depot agreed to pay damages of $25 million. “We’re pleased to have moved through this phase of resolution,” Stephen Holmes, a spokesman for Home Depot,

Read More

Choice, Flexibility and Advanced Security, Now with Google Cloud Platform

As a general rule of thumb, it has been a long accepted strategy in IT to avoid vendor lock in, or trusting too much in a single equipment provider that you get stuck because changing to another vendor would be too costly or inconvenient. This is especially true with public cloud providers, and fear of

Read More

The Power of Selective Decryption

During Gigamon’s recent sales kickoff, I sat down with Global Security Strategist Ian Farquhar to talk about the trend toward stronger encryption and the pros and cons of the pending TLS 1.3 standard. As you’ll see, we also got to share exciting news about Gigamon’s new inline SSL Decryption functionality that addresses a corresponding need

Read More

To Improve Health IT Security, Recognize the Importance of Privilege

The increased use of electronic medical records and rapid advances in healthcare technology have made hospitals target-rich environments for hackers. Unfortunately, the maturity of hospitals’ cyber security programs often are years behind that of other technology-dependent sectors, such as financial services. It’s no surprise that cyber security was a prominent topic at this year’s HIMSS

Read More

The Future of Networking is Here

Let’s take a quick trip down memory lane. Do you remember when “racking & stacking” was a thing? To “deploy” infrastructure meant you had to order some hardware, find space on a rack in a data center, do some crazy color-coded (or not) cabling magic, and then pop open a little laptop on a stand

Read More

School District Defends 125,000 Desktops Against Tomorrow’s Cyberthreats by Migrating to McAfee Endpoint Security

“When you move from a tiny apartment, it doesn’t take long and you can use a Honda Civic,” says Desktop Security Manager Mehdi Harandi, who oversees endpoint security at Fairfax County Public Schools, the 11th largest school district in the U.S. “But when you try to move from a five-bedroom house, it takes a lot

Read More

Check Point 2017 Mobile Security Media Tour

In this video, you’ll hear from Michael Shaulov, Head of Product, Mobile Security, where he discusses the importance of mobile security and common vulnerabilities and threats mobile data of individuals and the enterprise.  

Read More

Tax-themed Threats Continue to Spread during the Tax Season

Since late last year, multiple warnings have been issued to the public regarding tax-related fraud campaigns. Last month, a warning was issued to Northwich residents in the UK regarding a HM Revenue & Customs (HMRC) phishing scam, while the Internal Revenue Service (IRS) issued a similar warning to US tax payers. Forcepoint Security Labs™ have observed a similar trend in

Read More

Early Vulnerability Disclosure Thwarts WordPress Hackers

In late January, WordPress was made aware of a new vulnerability in its code. Taking a proactive stance, the content management system (CMS) vendor immediately shared it with major web application firewall (WAF) vendors—including Imperva—to ensure wide-scale patch availability. Within a week WordPress published a new security release that addressed the vulnerability and other security

Read More

Amid Wave of Hacks, Businesses Need to Identify Top Risks, Says FireEye CEO

Businesses are facing an onslaught of cyberattacks, especially ransomware. If they want to respond they need to change not just their technology but their approach to cybersecurity risks, according to FireEye CEO Kevin Mandia. Mandia, speaking at the CDW Managing Risk Summit in Washington, D.C., says that the cybersecurity firm will soon release its annual “M Trends”

Read More

HPE Enterprise Secure Key Manager Best Practices

Managing encryption keys, monitoring logs, running frequent system backups, and intelligent user supervision are all necessary elements of managing data encryption environments, but can quickly be overwhelming and confusing even for experienced IT teams. Access this white paper now to learn how to use the HPE Enterprise Secure Key Manager. When configured as show in

Read More

The Epicenter for All Things Cloud & IBM

According to Gartner, the data center no longer stands at the epicenter of the IT world. Indeed, software-defined, hybrid cloud IT has opened up a whole new realm of options for delivering and controlling applications and data. The advantages of a hybrid cloud strategy run far and wide, and any organization with more than one location

Read More

Cybersecurity Leadership Forum

Register today to ensure your seat at the annual Forcepoint, powered by Raytheon, Cybersecurity Leadership Forum. The event will host discussions on the current state of cybersecurity and how to best prepare for future threats. This year’s forum is a unique opportunity to engage with thought leaders and hundreds of peers across Industry, Defense, Intelligence,

Read More

Best practices for securing, analyzing, and mitigating threats to your AWS applications

Tuesday, March 28th, 2017 at 1:00 PM EST (17:00:00 UTC) Companies are increasingly moving applications to Amazon Web Services to leverage the scale, elasticity, and innovative services capabilities of the public cloud. According to a recent Intel survey of 2000 IT professionals, 93% are using some type of cloud service with more than 60% moving

Read More

Cloud Ubiquity – it’s coming, but not yet!

Brace yourself, adoption of cloud computing is on its way with 93% of organizations using cloud services today.  Just don’t ask when ubiquity will occur!  One year later, and the question about the number of months until IT budgets are 80% in the cloud is down from 16 months to ‘only’ 15.  Technically speaking, ubiquity

Read More

Pulse Secure certified for U.S. Department of Defense Unified Capabilities Approved Products List

Pulse Connect Secure 8.2 and Pulse Policy Secure 5.3 meets rigorous interoperability (IO) and information assurance (IA) criteria Pulse Secure, the leader in secure access solutions, has announced that Pulse Connect Secure 8.2 and Pulse Policy Secure 5.3 on PSA-Series Appliances have been certified for inclusion on The U.S. Department of Defense DoD Unified Capabilities

Read More

Why Placing All Your Eggs in One Cloud Can Be a Problem

We can all agree that cloud has practically become a part of our everyday lives, whether you’re streaming your favorite Netflix shows, or even engaging in simple communication with friends and co-workers on Slack. This is why when the cloud provider that owns the lion’s share of the market for hosting many popular internet sites and

Read More

An Introduction to Designing a Reliable and Responsive E-commerce Website

Worried about the reliability and responsiveness of your e-commerce website? Being an online business and running a successful e-commerce website can be daunting, especially when users expect top speeds even when website traffic is heavy. When users shop they actively search for items on sites and demand quick results. The performance, reliability and responsiveness of

Read More

Millennials in the Machine

The Growing Cultural Impact of Millennials in the Federal Workforce  How can federal agencies allow millennial workers access to their devices and social media, but also ensure that they have the security in place so that millennials can’t abuse these services? Today, many federal agencies are simply not prepared for the ongoing influx of millennials

Read More

HPE Security Fortify continues to be a leader in Application Security Testing!

The 2017 Gartner Magic Quadrant for Application Security Testing (AST) was just released. As the first AST vendor to provide capabilities in SAST, DAST, IAST and RASP, HPE Security Fortify continues to lead through innovation–taking a leadership position in Application Security Testing for the 7th year in a row! This graphic was published by Gartner, Inc. as part

Read More

Preparing Your Organization for the GDPR

So far, in Parts 1 and 2 of our GDPR series, we’ve covered who is subject to GDPR requirements and what the specific data security requirements are.  In this post, we’ll look at what the GDPR means for organizations and how to prepare. Even though enforcement doesn’t begin until May 2018, there are some key

Read More

Security Leaders Discuss Reality of AI vs. Machine Learning to Fight Cyber Attacks

Last week at the RSA 2017 Conference, Gigamon hosted a CSO Panel Luncheon, where we invited security industry leaders to debate on the emerging security defenses—including what role artificial intelligence (AI) and machine-based learning might play, and in light of the democratization of malware, shortage of security expertise, and fact that adversaries are already using

Read More

Techniques for Dealing with Ransomware, Business Email Compromise and Spearphishing

A New Epidemic of Ransomware, Business Email Compromise (BEC) and Spearphishing is Here See why new, sophisticated ransomware, BEC and spearphishing attacks are outpacing many organizations’ cybersecurity solutions and what you can do about it. Most organizations have been the victim of advanced ransomware, BEC and spearphishing attacks during the last 12 months. Worse still,

Read More

Intel Security Mends Cybersecurity Fragmentation with Unifying Strategy

Offering Integrated and Automated Solutions, Expansive Partner Ecosystem, Advanced Architecture with Cross-Industry Collaboration NEWS HIGHLIGHTS “Together is Power” comes to life with integrated, automated solutions, expansive partner ecosystems and cross-industry collaboration Available now new McAfee® Enterprise Security Manager 10 McAfee® Virtual Network Security Platform delivers comprehensive security for AWS* Intel Security Innovation Alliance announces 15

Read More

FlexPod: Faster & More Agile Converged Infrastructure in 2017

The FlexPod team recently returned from the road at Cisco Live in Berlin, providing us an opportunity to talk with customers and partners about our start for 2017. This year, we are ushering in a dynamic new set of solutions to extend the advantage of all-flash, agile, converged infrastructure. With FlexPod, a single solution architecture

Read More

How the future of application services will impact your business

Because your organization relies on apps to drive customer engagement, employee productivity, and revenue, they need to perform without fail. Today, there are a wide variety of application services designed to enhance security, improve performance, and ensure reliability, but what is the right strategy for your business? Complete the form (we promise not to share

Read More

Peer-To-Peer Guidance From Industry-Leading CISOs

The CISO View is a CyberArk-sponsored industry initiative that explores CISO perspectives on topics related to improving privileged access controls and shares their practical advice on security strategies. Insights and recommendations in the available reports are based upon interviews with Global 1000 CISOs and guest contributors. NOW AVAILABLE | Rapid Risk Reduction: A 30-Day Sprint to Protect Privileged

Read More

Gain Email “Peace of Mind in the Cloud”

Believe it or not, email still leads the way for communications in enterprise companies. Email is where much of our business takes place and is still the collaboration platform of choice. The average user sends a median of 30 emails and receives a median of 100 and spends more than 150 minutes per day doing

Read More

The Originator of Software-Defined Storage (Who Knew?)

The opportunity for NetApp to join the Open Compute Project (OCP) program this year as the only storage and data management systems provider is a real privilege. It also completes a circle for NetApp as a leading voice for the role of software in an open hardware ecosystem.  As founder Dave Hitz has often noted,

Read More

Solve Cloud Network and Branch LAN/WAN Challenges with Riverbed SD-WAN

SteelConnect is a complete SD-WAN system for securely connecting users and business to the applications they need, wherever they reside—on a remote LAN, in a data center, or in the cloud. Net effect: 10.7x ROI over 5 years with a payback period of 3.7 months (For 50 sites with 50 users/site over 5 years). Learn

Read More

Beginner’s Guide: 11 Things to Consider When Choosing a Web Host

Choosing a web hosting company is a big decision having many consequences. The hosting company greatly influences your website’s speed and reliability, causing your visitors to leave with either a good or bad impression. Whether you’re looking to host your very first site or want to move an existing site to a new provider, taking

Read More

Fake Font Update on Google Chrome Uses Social Engineering to Infect Users with Ransomware

We’ve seen social engineering attacks manipulate users time and time again. From phishing emails, to baiting attempts – this breed of cyberthreat has continued to manipulate users for years. And now a new scam has emerged that utilizes a fake update on Google Chrome to trick users into downloading and infecting themselves with the infamous Spora ransomware.

Read More

Test Attack Readiness With Incapsula DDoS Resiliency Score (DRS) Calculator

Aware of the risks and costs associated with DDoS attacks, most enterprises protect their websites and network infrastructure with some sort of mitigation solution. However, as the threat landscape continues to evolve, it’s getting harder to gauge your organization’s DDoS readiness and identify the soft spots in your defenses. Jointly created by Imperva Incapsula and

Read More

Back to the Packet Trenches

Join Hansang Bae, Riverbed CTO and packet analysis guru, and special guests Gerald Combs and Jasper Bongertz as they return to the packet trenches to instruct attendees in Wireshark techniques that will enlighten and inform standard troubleshooting regimens. This webinar will cover: A systematic approach to troubleshooting with Wireshark for swift, efficient resolution of network

Read More

CyberArk Brief: The Challenges of Protecting Assets Running in the Cloud

Overview of key responsibilities and challenges to consider in order to protect privileged accounts and credentials for cloud applications.

Read More

HPE’s new security-at-the-edge solution will protect and empower more IoT innovation

HP Enterprise unveiled a new service at RSA 2017 that can protect data-at-rest, data-in-motion, and data-in-memory. We spoke with HPE about how its greatest value will be in IoT.

Read More

Cloudbleed: What We Know and What You Should Do

If Shakespeare were alive today (and blogging), he might have written about the latest vulnerability to sweep the Internet by pointing out: Hath not the cloud interfaces, code, logic, data? Accessed with the same protocols, exploited with the same weapons, subject to the same vulnerabilities, mitigated by the same solutions, patched by the same methods

Read More

Is Ransomware the Biggest Threat to Your Business this Year?

If ransomware isn’t at the top of your cybersecurity concerns, it should be. Ransomware attacks quadrupled in 2016 and will double again in 2017, according to a report issued by Beazley, a provider of data breach response insurance. It’s now the most profitable type of malware attack in history. That’s because cybercriminals have discovered how

Read More

How to Use Network Visibility to Bolster Security Effectiveness

News on breaches continue to hit the headlines every day. In this Webinar, our guest Forrester Vice President and Principal Analyst John Kindervag discusses key insights on the “Streetlight Effect”, which highlights the central role that visibility plays in modern data security architectures to detect early signs of attacker activity. He will be accompanied by

Read More

Forcepoint Ranks #3 in Cybersecurity Ventures Cybersecurity 500

Forcepoint is proud to be ranked #3 on Cybersecurity Ventures’ Cybersecurity 500, a global compilation of leading companies that represents the hottest and most innovative cybersecurity companies to watch in 2017. Rising from #41 last year, this top ranking is a testament to the company’s momentum on the heels of RSA where our team highlighted

Read More

Implementing an Intelligence-led Cyber Security Program

Through Mandiant’s numerous global consulting engagements, we have had the opportunity to see countless cyber security programs of all shapes and sizes. One consistent takeaway from these engagements is the need and desire to develop or enhance integration of cyber threat intelligence (CTI) – not just into cyber security programs, but also into an organization’s

Read More

Mission Made Possible: The Open Integration Time Machine

A fast-forward button for integration to a unified security architecture. One of the reasons why the Mission Impossible premise has resonated across the generations is that all of us, at one time or another, are handed projects that seem to come with that label. Unfortunately, if you’re like me, you feel more like Wile. E.

Read More

GDPR Series, Part 1: Does the GDPR Apply to You?

Generating much interest (and concern) globally is the European Union General Data Protection Regulation (GDPR), the successor to the Data Protection Directive (95/46/EC). Enforcement is slated to begin in May 2018, and those not in compliance can expect very stiff financial penalties. In the meantime, companies should revisit their security and compliance strategies to ensure

Read More

Riverbed SteelCentral Four-Time Consecutive Leader in 2017 Gartner NPMD Magic Quadrant

We’re feeling pretty good right now. How many times can you say you’ve “won” something four times in a row? That you are best in class? That your products are “pushing the NPMD market forward…with comprehensive portfolios and the ability to handle broad sets of data inputs and analytics techniques.” Well, we can. For the

Read More

Webinar: Securing privilege on the endpoint: Fundamental steps every organization should take 

Organizations have spent years attempting to secure themselves by adding layer after layer of preventative endpoint security controls. None have been 100% effective. But there is a fundamental building block that is missing – adding proactive protection by securing privileged credentials at the endpoint. Join this live webinar featuring guest speaker, Forrester Research, Inc. Vice

Read More

The Payments Challenge – Securely protecting end-to-end payment data streams

In today’s environment of heightened regulatory requirements and increasing risk of cardholder data breach, it is critical for merchants, service providers, payment processors, and acquirers to protect payment data anywhere it moves, anywhere it resides, and however it is used. Common methods for protecting payment data are often inflexible, expensive, and difficult to implement. Join

Read More

10 Steps for Combating DDoS in Real Time

While the nature of DDoS attacks is constantly evolving, two things are clear: the volume of attacks is increasing and every business is at risk. What You’ll Learn The importance of having a plan in place before attacks happen. The four basic types of DDoS attacks and what you can do to protect yourself against

Read More

Top Healthcare Topics from HIMSS Forum

In healthcare, there can often be a disconnect between IT and executive leadership when it comes to prioritization of cybersecurity risk management. Finding ways to bridge this gap has been a prevailing theme at both this week’s HIMSS 2017 Conference and Exhibition and last quarter’s HIMSS Privacy and Security Forum. Between Two Worlds When it

Read More

20 Questions for SecOps Platform Providers

Security operations capabilities for the masses is long overdue. Here’s how to find a solution that meets your budget and resources. The security operations platform is quickly emerging as a favorite talking point for 2017, even for organizations that do not find themselves with an expansive budget to improve their security maturity and posture. Of

Read More

SteelFusion 5.0 Extends Hybrid Cloud Investments to Edge IT

Riverbed has been preaching for years that remote and branch offices (ROBOs) are the engines that drive the business. And with the cloud revolution is firmly upon us, we see even greater importance placed on Edge IT because of the expectation from users for near real-time service delivery regardless of location. This places an extreme

Read More

Building Trust in a Cloudy Sky

The state of cloud adoption and security This report, based on responses from 1,400 IT security professionals from around the globe, looks at cloud adoption, changes in data center environments, and the challenges with visibility and control over these new architectures. Cloud services are now a regular component of IT operations, and are utilized by

Read More

Check Point Prevention at the Movies, Rogue One: Data Loss on a Galactic Scale

The Client: The Galactic Empire The situation: Security researchers at Check Point have attributed an attack on the client to a hacking group calling itself the “Rebel Alliance.” Researchers have identified the motive driving the attack was to exfiltrate the Empire’s intellectual property, specifically a file named “Stardust” containing the plans for a large weapons station

Read More

The Cyber-Intelligence Nexus: Russia’s Use of Proxies

What if network defenders knew that a cyber operation occurred during Moscow business hours, that it involved a Russian IP address, and that the cyber actors used a Cyrillic keyboard? Would those indicators by themselves be enough for attribution?  Given the Russian cyber environment, the answer is clearly “no.” Those indicators could be shared by

Read More

How Incapsula Protects Against Data Leaks

The recent incident at Cloudflare involved some circumstances where edge servers were running past the end of a buffer and returning memory that contained private information such as HTTP cookies, authentication tokens, HTTP POST bodies, and other sensitive data. To read more about the incident, see the articles from Ars Technica, The New York Times and others. In this post,

Read More

Tenable Network Security & CyberArk

C. Thomas (Space Rogue), Strategist for Tenable Network Security, talks about the benefits of conducting a credentialed-protected scan. By integrating with CyberArk Application Identity Manager™, Tenable Nessus® can offload the management of the privileged accounts to CyberArk enabling improved scan accuracy and performance. Tenable Network Security is a member of the C³ Alliance, CyberArk’s Global

Read More

Data Security Key for IoT

In case you haven’t been paying attention, Internet of Things (IoT) devices are everywhere, in our appliances at home, in the cars we drive, and the buildings were we work. Industries that use IoT connected devices are very diverse: manufacturing, energy, telco, healthcare and transportation, to name just a few. And the numbers of devices

Read More

The next booming technology in market is NAC. Pulse Policy Secure the leading NAC and BYOD solution for your enterprise

Network access control (NAC) is no longer just about role based user access control, device authentication, and guest management.  The Pulse Policy Secure (PPS) solution offers pre and post connect features to assess, characterise and correct operating system and software configurations in real time. Organisations can identify unhealthy endpoints, such as systems missing important security

Read More

Forcepoint Closes Deal to Acquire Imperva Skyfence

As of February 23, 2017, we’ve successfully closed on the acquisition of Imperva’s Skyfence product line, now known as Forcepoint CASB (Cloud Access Security Broker). This acquisition plays a pivotal role in our strategy to deliver cybersecurity systems that help our customers understand people’s behaviors and intent as they interact with data and IP wherever

Read More

Big Data Needs Big Security. Here’s Why.

In case you thought that big data was no longer a big deal, think again. IDC predicts continued double-digit growth for big data and business analytics through 2020. Why? Because companies are collecting more information than ever—much of it now coming from an exploding range and number of devices connected via the Internet of Things.

Read More

Intel Security Launches ‘Threat Landscape Dashboard’

Every week, we read in the news of another breach or targeted campaign, as more patches are released to protect against the next strain of sophisticated malware. For the administrators responsible for safeguarding a company’s systems, networks, and digital information, keeping up is an overwhelming task, made doubly difficult because it is often hard to

Read More

Introducing the Riverbed Service Delivery Platform

I meet with a lot of Service Provider organizations worldwide, and it is apparent how each is different in their own way and yet so similar in the challenges they face. Service Providers have been struggling to keep up with their customers. Modern enterprises increasingly seek to align their technology spend with the growth of

Read More

Spear Phishing Techniques Used in Attacks Targeting the Mongolian Government

FireEye recently observed a sophisticated campaign targeting individuals within the Mongolian government. Targeted individuals that enabled macros in a malicious Microsoft Word document may have been infected with Poison Ivy, a popular remote access tool (RAT) that has been used for nearly a decade for key logging, screen and video capture, file transfers, password theft,

Read More

CyberArk Webinar with Guest Speaker Andras Cser to Discuss Protecting Against Advanced Threats by Securing Privileges on the Endpoint

CyberArk, the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced details of its upcoming webinar, “Securing Privilege on the Endpoint: Fundamental Steps Every Organization Should Take,” featuring guest speaker Andras Cser, vice president and principal analyst, Forrester Research. What: Organizations have spent years attempting to

Read More

Peace of Mind in the Cloud: Secure Email Migration to Office 365

In a time of constant hacking attacks and email vulnerabilities exposed, a transition to cloud-based Office 365 is top of the mind for most organizations—large and small—and so are the security concerns. If your company is moving or has already moved to the cloud, our new “Peace of Mind in the Cloud” eBook discusses the

Read More

How Anycast Works: A Five Minute Explainer

When you type www.someplace.com into the address bar of your browser and press enter, the site is displayed in your browser in (hopefully) a few seconds. There are a number of things happening behind the scenes to route your request to that site so you can view the content. Border gateway protocol (BGP) ensures that

Read More

GHD needed a simple, cost-effective solution to enable the rapid deployment of 50 new sites.

When global professional services company GHD merged with North American engineering consultancy Conestoga-Rovers and Associates (CRA), it added more than 3,000 employees in 100 offices, including 50 small sites. They needed a simple, cost-effective solution to enable the rapid deployment of those new sites onto the company’s network. Riverbed SteelConnect has helped GHD achieve this,

Read More

When Innocent Mistakes Turn Into Costly Problems

When most people hear about an “insider threat,” they often assume it’s a malicious employee who is either out to prove a point or trying to selfishly make a buck. Yet, as one startup learned last week, the real “insider threat” is often a well-intentioned person who, in the course of simply trying to do

Read More

Forcepoint™ Research Shows Understanding People’s Behaviors and Intent Critical to Future of Cybersecurity – But Significant Gaps Exist

Nearly 80 percent of cyber professionals say enterprises must understand behaviors and intent as people interact with critical data and IP; today, less than a third are able to do so effectively Global cybersecurity leader Forcepoint™ today released a new study – “The Human Point: An Intersection of Behaviors, Intent & Critical Business Data.” The

Read More

Oversharing: Passwords, but not Toothbrushes!?

Potentially significant security risks from your employees’ significant others What would you be more likely to share with your partner? Your toothbrush? Or your work password? Only about 10% of people polled are willing to share their toothbrush, but twice as many are willing to share their work password! People share a lot with their

Read More

Digital Bridges for Blockchain

Over the last two years the blockchain space has evolved at a fevered pitch.  We have seen new business models emerge, new approaches to old problems, and numerous business pivots. We have also seen a number of announcements of early adopters making fantastic progress in vetting and proving the technology in some really great use

Read More

FireEye Cyber Risk Assessment Tool

The First Step to Simpler, Complete Cyber Security As an IT professional, you work within a dangerous cyber threat landscape every day. In addition to attacks, you also must deal with constrained security budgets, internal and executive communications, increasingly mobile and evolving workforce demands and emerging regulatory requirements. Any one of these issues can complicate

Read More

GHD Customer Testimonial for Riverbed SteelConnect

When global professional services company GHD merged with North American engineering consultancy Conestoga-Rovers & Associates (CRA), it added more than 3,000 employees in 100 offices, including 50 small sites. They needed a simple, cost-effective solution to enable the rapid deployment of those new sites onto the company’s network. Riverbed SteelConnect has helped GHD achieve this,

Read More

Don’t Analyze Everything – Analyze the Right Thing to Detect and Respond to Insider Threats

In 2013, organizations worldwide started to take insider threats seriously, thanks to a man named Edward Snowden. Yet, his is just one of many cases of authorized insiders who have caused damage – both intentionally and accidentally – to the organizations that trusted them.  From the Sage Group incident in the UK to the case

Read More

How are Thieves Getting Data Out?

Learn the statistics of different methods thieves are using to steal data.

Read More

Going to the Edge Doesn’t Mean Going Out on a Limb

Learn more about Managed EdgeCloud from Cisco and NetApp at Cisco Live Berlin February 20-24, 2017 Cisco Live Berlin is just a few short days away. It’s one of the most-anticipated events of the year, with more than 12,000 people expected to attend. Cisco has long been a huge partner for NetApp, and I’m particularly

Read More

The Curious Case of a Reconnaissance Campaign Targeting Ministry and Embassy Sites

Forcepoint Security Labs™ came across a malicious reconnaissance campaign that targets websites. It is unknown what is the intent behind the campaign as of this writing, however, the profile of the targets resembles those that are common targets of Advanced Persistent Threat (APT) actors. As the attack is currently active, it effectively turns compromised sites into

Read More

SSL Encryption: No Longer A Double-Edged Sword

Encryption has been a bit of a double-edged sword. While the SSL/TLS protocol is perfect for protecting privacy, it’s also perfect for hiding threats (e.g., command-and-control attacks, data exfiltration exploits, etc.). A conundrum for sure, but one that’s about to see a significant change—for the better. For various reasons, the topic of SSL decryption has

Read More

GDPR Education

If you are a CISO, or someone who deals with your enterprise’s data, hopefully you have heard of The General Data Protection Regulation (GDPR). GDPR is the biggest shake-up in European data protection legislation for 30 years. If you have just hearing about it now, as about 50 CIOs were when Data Security presented on

Read More

To Converge vs. Hyperconverge Infrastructure?

Earlier today we shared that we are developing the next generation of hyperconverged infrastructure, built on SolidFire innovation. We will do what has not yet been done by the immature first generation of hyperconverged solutions — bring hyperconverged infrastructure to the enterprise by allowing customers the flexibility to run multiple workloads without compromising performance, scale,

Read More

Protecting the Human Point

Greater Security Spend. Improved Security? 427 billion. That is Gartner’s estimate for worldwide enterprise security spending for 2017-2020 – a 43% increase from the $298 billion spent from 2013-2016. Basic math says that more security spending should equal fewer incidents, but that simply hasn’t been the case, as data breaches increased at nearly the same

Read More

Security Delivery Platforms For Dummies

Security tools can’t inspect what they can’t see. To defend against today’s advanced threats, IT organizations require real-time visibility across their entire IT infrastructure—including physical, virtual, and cloud environments. In short, they need a security delivery platform. Download this book to discover how to: Eliminate network blind spots — with a security delivery platform that

Read More

How to Run a Database Vulnerability Scan with Scuba

You’ve downloaded and installed Scuba, Imperva’s free database vulnerability scanner, which provides more than 2,300 assessment tests for detecting database security vulnerabilities and configuration flaws on popular enterprise databases such as Oracle, Microsoft SQL, SAP Sybase, IBM DB2 and MySQL. Now you want to know if there are any security vulnerabilities in your database(s) and,

Read More

What Tactics are Thieves Using to Steal Data?

Find out different ways data thieves are stealing important company data.

Read More

Citrix Demonstrates Technology Innovations Powering the Future of Work at Mobile World Congress 2017

Secure Workspace, Networking, IoT and Mobility Solutions Enable Enterprises, Service Providers and Mobile Operators to Transform the Workplace Environment Citrix will be onsite at Mobile World Congress on February 27 – March 2, 2017 at Fira Gran Via, Hall 5, Stand 5D31 in Barcelona, Spain exhibiting technology innovations for enterprises, service providers and mobile operators.

Read More

Credential Theft: Easy as Shooting Phish in a Barrel

Imagine your best-case scenario: You’ve conducted security awareness training for your users and have educated them on all the threats that apply to them. You’ve cultivated a culture of security where everyone knows the tactics of phishers and how to avoid being compromised by a phishing email. You have anti-virus installed on all your endpoints

Read More

Deception-based Ransomware Detection: What It Is and Why You Need it

The FBI deemed criminal ransomware a $1 billion industry in 2016. And the ransomware trend is expected to continue in 2017 as incentives increase and the hacking software spreads. The problem is it’s getting easier for cybercriminals to execute these shakedowns with new Ransomware-as-a-Service (RaaS) tools, BYOD user vulnerabilities, improved encryption methods and untraceable bitcoin

Read More

New Variant of Ploutus ATM Malware Observed in the Wild in Latin America

Ploutus is one of the most advanced ATM malware families we’ve seen in the last few years. Discovered for the first time in Mexico back in 2013, Ploutus enabled criminals to empty ATMs using either an external keyboard attached to the machine or via SMS message, a technique that had never been seen before. FireEye

Read More

The need to secure sensitive data in Hadoop and IoT ecosystems

Hadoop is a unique architecture designed to enable organizations to gain new analytic insights and operational efficiencies through the use of multiple standard, low-cost, high-speed, parallel processing nodes operating on very large sets of data. The resulting flexibility, performance, and scalability are unprecedented. But data security was not the primary design goal. When used in

Read More

Cyber Threat Alliance Marks New Era in Industry Collaboration and Customer Protection

The announcement by the Cyber Threat Alliance (CTA) at the RSA Conference is an important moment in the security industry.  It truly marks a new era of industry collaboration for the greater good through the sharing of threat intelligence to drive better protection for all member customers. What is the CTA? The Cyber Threat Alliance

Read More

There are Only Two Types of Clouds: Those you control and those you don’t

Cloudy insights from the State of Application Delivery 2017 Control. We use that word a lot. Control yourself! Control your own destiny! Control your financial future. Find out how! Control is a simple word that connotes a very powerful concept: that of taking the reins and directing where and how something happens. In the enterprise,

Read More

Networking for the Cloud Era

Cloud. Mobility. Applications. These are the drivers in today’s digital world that are reshaping the business and enterprise IT. Today, the enterprise network is complex and unpredictable. Networking has missed the cloud revolution and is still stuck in the traditional and hardware-centric world. Networking needs the same agility that is provided by the cloud to

Read More

10 Commands Commonly Used During the Cyber Attack Cycle

Today, CyberArk announced a new capability that helps organizations automatically detect insider threats and accelerate incident response times. With this integrated release of CyberArk Privileged Threat Analytics and CyberArk Privileged Session Manager, customers can now receive customizable, prioritized alerts on high-risk user activity – during privileged sessions – to help security teams swiftly investigate and

Read More

The Cyber Threat Alliance Steps Up to Boost Protection

With each new cyber threat report, we learn about the increasing volume of new, complex threats appearing across a myriad of server systems, networking equipment, personal computing platforms, and IoT devices. We also read about the real-world challenges that information security professionals face when attempting to identify, scope, and prioritize security events generated by their

Read More

Meet the Worst Candidate for the Job—Petya

The new variant of Petya doesn’t have a preference between shaken or stirred. Mostly it’s just in favor of causing a frenzy as the new ransomware, GoldenEye. Much like the James Bond film it’s named for, it is making a bold return. What is Petya? Petya is a unique ransomware threat that appeared in the

Read More

Forcepoint™ Launches New Businesses to Drive Customer-Centric Innovation

Cloud Security, Network Security, Data & Insider Threat Security and Global Governments businesses focus resources around key customer needs Global cybersecurity leader Forcepoint™ today announced that it has established four market-centric business units. Forcepoint’s businesses – Cloud Security, Network Security, Data & Insider Threat Security and Global Governments – will drive innovation across each product

Read More

A CISO’s Take on Phishing Prevention, Layered Security, and Managing Insider Threats

Where does security sit in the IT organization? What techniques do you use to improve security awareness? How do you handle phishing and suspicious activity from insiders and contractors? Imperva CISO, Shahar Ben Hador, answered these questions and more in a Q&A webinar we held featuring his perspectives on a number of IT and security-related

Read More

Moving Toward a Security Immune System

There’s no such thing as secure anymore. Breaches are inevitable. It’s a fact that everyone is finally beginning to accept. But why? Why has this become a fact of life? I can offer two key reasons: The speed of data. With the speed at which data travels today, real-time security against unknown threats is a

Read More

Mobile, payments and security predictions for 2017

The universe of mobile and connected devices is expanding at a rapid rate, leading to the proliferation of data transmission between applications, devices and enterprise systems. According to a recent IDC report, there are more than 1.4 billion smartphones worldwide, with that number expected to increase to more than 1.8 billion by 2020. Additionally, there are currently

Read More

Mobile Security and Risk Review, Third Edition Mobile Security and Risk Review, Third Edition

Welcome to the third edition of the Mobile Security and Risk Review. This bi-annual review provides IT security leaders with timely information about the mobile threat landscape and the emerging risks facing their organizations. This edition includes: Regional data from Australia, Belgium, France, Germany, Japan, the Netherlands, Spain, the United Kingdom, and the United States

Read More

New dog, new tricks

Industry’s first Secure Internet Gateway in the cloud secures access to the internet anywhere users connect, even when off the VPN. Industry’s first Secure Internet Gateway in the cloud Before users connect to any destination on the internet, a Secure Internet Gateway provides the first line of defense and inspection. Core capabilities include: Visibility and

Read More

Networking for the Cloud Era Simplified Cloud Connectivity with SD-WAN

Join Microsoft and Riverbed for a discussion and demonstration of enhancements to SteelConnect. Announced in April 2016, Riverbed SteelConnect is a revolutionary SD-WAN solution that makes deploying and managing network services very simple and intuitive. SteelConnect is built for the cloud and brings enterprise networking to the cloud era. Join us to see the power

Read More

CyberArk Delivers Privileged Account Security Across the Enterprise: In the Cloud and on Endpoints, at RSA Conference 2017

CyberArk Chairman and CEO Udi Mokady to Participate in Panel with Business Leaders and Ex-Intelligence Officers on the Secrets to Israeli’s Cybersecurity Startup Success CyberArk,  the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced details of its participation at RSA Conference 2017 in San Francisco.

Read More

New Intel Security Cloud Report Reveals IT Departments Find It Hard to Keep the Cloud Safe

Close to 40 Percent of Cloud Services Are Commissioned Without the Involvement of IT, Leading to More Security Risk for Companies NEWS HIGHLIGHTS Trust now outnumbers distrust for public clouds by more than 2-to-1. 49 percent of professionals slowed cloud adoption due to a lack of cybersecurity skills. 65 percent think Shadow IT is interfering

Read More

Top 3 Reasons to Include Data Masking in Your Data Security Strategy

What is Data Masking? Also known as data anonymization or pseudonymization, data masking is used to reduce the unnecessary spread and exposure of sensitive data within an organization—protecting it while simultaneously maintaining its usability. Data masking replaces real data with functional fictitious data so that it can be used safely in situations where actual data

Read More

Gigamon Delivers Advanced Inline SSL Solution to Eliminate Network Blind Spots

New SSL/TLS Decryption/Encryption solution provides scalable visibility and management of encrypted traffic to expose hidden malware, data exfiltration and command and control threats Gigamon, the industry leader in traffic visibility solutions and provider of the Gigamon Visibility Platform, today announced a significant expansion to its GigaSECURE® SSL/TLS Decryption solution, with new inline capabilities, bringing enhanced visibility into

Read More

Forcepoint™ Cybersecurity Leadership Forum

Register today to ensure your seat at the annual Forcepoint, powered by Raytheon, Cybersecurity Leadership Forum. The event will host discussions on the current state of cybersecurity and how to best prepare for future threats. This year’s forum is a unique opportunity to gather with thought leaders across Defense, Intelligence, Federal, Civilian, State & Local government.

Read More

How IoT Will Bring a More Connected Future

We’re beginning to see is a world where everything is connected and everything computes, driven by the Internet of Things (IoT). Find out how IoT will connect people around the world to help them focus on the things that matter most – family, friends, health and happiness.  Here’s to a more connected future!

Read More

New Malware Threats: Ransomworm Is Coming, Are You Ready?

In 2016, there were over 4,000 ransomware attacks every day. This was a 300% increase over 2015, when there were 1,000 attacks every day, and it’s likely to get worse in 2017. In the first quarter of 2016, cyber criminals used ransomware to steal $209 million from US businesses with an expected $1B for the

Read More

The biggest tech trends shaping the new year

As we’ve seen this year with promising tech, the future is now. For technology enthusiasts and industry futurists, end of the year reflections and new year predictions are exciting events. Both give us a chance to measure our collective progress, set our sights to the future, and buoy our hopes and dreams. Admittedly, commercial technology

Read More

Forcepoint acquires Skyfence in cloud security push

Imperva has agreed to sell the Skyfence business to Forcepoint in a deal designed to improve Forcepoint’s cloud security and IP protections portfolio. Austin, Texas-based Forcepoint announced the buyout on Wednesday. According to a SEC filing, the deal is worth approximately $40 million in cash. The company says the agreement “plays a pivotal role” in

Read More

CyberArk Announces Support for Amazon Inspector for Enhanced Cloud Security

CyberArk’s Integration with Amazon Inspector Simplifies Discovery and Prioritization of Privileged Account Risk; Enhanced AWS Access Key Protection Further Reduces Exposure to Advanced Threats CyberArk, the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced expanded privileged account security solutions for Amazon Web Services (AWS) to

Read More

Sustainable Security Operations

The number and types of incidents organizations face daily are steadily increasing, as is the cost of complying with regulations and managing policies. Yet an unintegrated, distributed, and complex security and IT infrastructure makes it difficult for analysts to notice and act on important events, trends, and changes. It also impairs the security administrator’s ability

Read More

Interview with a Lead Information Security Engineer about His Company’s Experience Migrating to McAfee Endpoint Security

Endpoint and network products at his U.S. insurance company with approximately 8,000 endpoints. The company recently migrated endpoints to ENS 10.2 and plans to migrate to ENS 10.5 in the next three months. Q. What was the driving factor in the decision to migrate to McAfee Endpoint Security (ENS)? A. About five years ago we

Read More

CyberArk Releases Framework for Rapidly Reducing Privileged Credential Risk

New CISO View Research Recommends a 30-Day Sprint to Mitigate Privileged Credential Vulnerabilities; Features Insights from Global 1000 CISOs and Post-Breach Experiences from Security Experts CyberArk issued a new research report that recommends an accelerated 30-day plan to improve protection of privileged credentials. The report outlines a proven framework for rapid risk reduction based on lessons

Read More

Alternative Fax

Alternative facts, are we underestimating the number of fax machines still in production? There was a time when fax machines ruled the world, well maybe not ruled the world but they were definitely the primary means to “swiftly” transport important documents between locations. Hollywood even found a way to work fax machines into the movies.

Read More

NASA: CDM implementation going well

America’s space agency started implementing in November the first phase of the Continuous Diagnostics and Mitigation program designed to give agencies the tools they need to identify, prioritize and tackle cybersecurity risks, a NASA official told FedScoop. Not only is that implementation going well so far, NASA’s CDM program executive said, but phase two is, also. The Department of

Read More

Choose ID over IP. Please.

I take lots of pictures. Sometimes I’m using WiFi. Other times I’m out by the pond (fishing, if you must know) and using my cell connection. Same house. Same location. And yet the geolocation information embedded into pictures taken in the same location vary based on whether I’m on Wi-Fi or cell. Sometimes I’m “near

Read More

Ransomware Roundup

This is the first of the SentinelOne threat Roundups, this is designed to be a one stop blog for the most recent and interesting developments in the cyber threat arena. This particular blog, is unsurprisingly, dedicated to developments in the ransomware malware family space. Since exiting 2016 we are closing in on 300 different malware

Read More

Networking for the Cloud Era

Join Microsoft and Riverbed for a discussion and demonstration of enhancements to SteelConnect. Announced in April 2016, Riverbed SteelConnect is a revolutionary SD-WAN solution that makes deploying and managing network services very simple and intuitive. SteelConnect is built for the cloud and brings enterprise networking to the cloud era. Join us to see the power

Read More

Protect Your Gaming Infrastructure from Hackers and Competitors

Online gaming is uniquely vulnerable to costly DDoS attacks: how can you protect these platforms from cyber attacks and resulting outages? This webinar will discuss what makes the online gaming industry such a prime target for DDoS and will propose a new solution to address this growing problem. Benefits of attending the webinar include: –

Read More

Expanding Our Partnership Vision With F5’s New Security Platform

When we first launched our strategic partnership with F5 more than a year ago, the reasoning was very simple: FireEye customers needed a way to gain better visibility into SSL encrypted traffic. And by leveraging the trusted application infrastructure investments they made with F5’s BIG IP platform, they could also manage their SSL encrypted traffic

Read More

Securing Big Data in the IoT age

McDonald’s sold its 1 billionth hamburger in 1963. The company’s signage used to keep track in increments of 5 billion. It sold the 1 trillionth in 1993 and switched to the “Billions and Billions Served” slogan. Now it doesn’t mention the number sold anymore. Sounds a lot like the growth of data storage. In 1987, a megabyte of

Read More

Unknown Malware Continues to Rise

Last year, unknown malware downloads rose over 900% with more than 970 downloads per hour compared to 106 previously. Known and unknown malware, bots and mobile vulnerabilities – find out where your organization is most exposed in the 2016 Check Point Security Report. YOU WILL LEARN: The latest trends in known and unknown malware To

Read More

Three Steps to Defining a Cloud-First Strategy

As NetApp’s business goals evolve, so must IT. We constantly look at ways to streamline IT processes to become more efficient in terms of cost and agility. When we looked to the cloud as a possible solution, we discovered the real conversation has evolved from ‘to cloud or not to cloud?’ but ‘how to cloud

Read More

Secure Web Apps Without Complexity, F5 Silverline WAF

The growth of cloud-hosted web applications has been accompanied by increasingly sophisticated security attacks and risks that threaten enterprise data. As a result, administrators and security teams face challenges keeping up to date on the latest attacks and protection measures. At the same time, they must meet the stringent compliance requirements for online commerce and

Read More

How to ‘Scratch the Surface’ of Performance Monitoring

As you may have heard, Cisco has announced its intent to acquire AppDynamics, an APM vendor for $3.7 billion.This is almost twice the valuation, which was at $1.9 billion, of the company. Why make this move? They cite the importance of “end to end visibility and intelligence”. At Riverbed SteelCentral, we completely agree—comprehensive end to

Read More

Target of Massive DDoS Attack and Ransom Demand, Lloyds Banking Group Manages to Fend off Cybercriminals

In the matter of 48 hours, over 20 million customers couldn’t check their  bank accounts online. And it’s all because of two people. Two cybercriminals, to be exact, who worked in tandem to conduct a DDoS (distributed denial of service) attack against Lloyds Banking Group. The end goal? Demand a ransom from the banking group,

Read More

Top Seven WordPress Security Issues and How to Protect Against Them

WordPress is the most popular publishing platform in the world. It runs over 24 percent of all websites worldwide. Since it’s an open source platform, the WordPress code is visible to everyone and because it powers so many websites, it has become a target for hackers. The most recent vulnerability discovered prompted the update to WordPress 4.7.2 to secure

Read More

Join Us for a Cyber Attack Simulation

Cybersecurity threats continue to be among the most pressing issues today. Companies must proactively take steps to protect themselves against the risks arising from the compromise of personal data, loss of critical business systems, and theft of intellectual property and other proprietary information. Please join us for a Cyber Attack Simulation where experts from FireEye,

Read More

Ensuring IT security within a modern, agile business

One of the biggest challenges facing Australian businesses and government departments today is finding ways to secure their core IT infrastructures from targeted and potentially costly attacks. Methods need to be effective while at the same time not blow a hole in constrained budgets. With governments and businesses increasingly linking their core systems to external

Read More

Heartland Payment Systems and HPE SecureData Payments

Bob Carr discusses the value HPE SecureData Payments gave Heartland and their merchants – after a major breach. HPE SecureData Payments was the only solution that would encrypt the card data at the point of swipe and entry into the system and protect it through to the backend.

Read More

Imperva Incapsula Now Available in the Microsoft Azure Marketplace

Imperva, Inc., committed to protecting business-critical data and applications in the cloud and on-premises, announced that the Imperva Incapsula solution is available in the Microsoft Azure Marketplace. Now customers can purchase the Incapsula service directly from the Marketplace and receive the benefits of one consolidated bill and unified contract management. Incapsula, along with the Imperva

Read More

Gigamon’s Metadata Engine feeds high fidelity network data to security tools to increase effectiveness  

Most organizations built their network security infrastructure one point solution at a time. They started with a firewall, added anti-virus, and when that wasn’t enough they brought in an intrusion prevention system (IPS), added endpoint protection, an intrusion detection system (IDS), a security information and event management (SIEM) system, and perhaps even a user behavioral

Read More

Ransomware’s Path to Extortion

Ransomware delivered through the Internet poses a serious threat. Follow ransomware’s path to extortion: Learn how cybercriminals use the Internet to deliver ransomware Dive deep into a real attack Discover technologies that work together to prevent its devastating impact Approximate time to complete: 6 minutes

Read More

NetApp United Program

The NetApp United program is a program designated for influencers who are curious about NetApp technologies and want an organized way to learn more. It’s a way for passionate technologists to stay engaged, receive exclusive access to NetApp information and experts, and share their knowledge, expertise, and thoughts across their personal channels, as well as

Read More

PCI DSS 3.2 – Are You Up on What’s Changed?

The Payment Card Industry Security Standards Council (PCI SSC) has published a new version of the industry standard of requirements to protect sensitive payment cardholder data as it flows through different payment ecosystem applications. Any company that processes, stores, or enables payment transactions through any channel have to follow these requirements to ensure the security

Read More

Gilmar – Cloud Network Security

The Gilmar Group (Gilmar) is a leader in the manufacturing and distribution of quality clothing brands, both house (Iceberg and Ice Iceberg) and license (Paolo Pecora, Siviglia and N°21). In continual expansion, the company pursues growth and development on multi product levels, from high-end ready-to-wear to youth fashion lines and always devotes keen attention to

Read More

Tips From The Essential CDN: How Caching Works

Anyone looking into optimal global website performance will eventually come across the term, content delivery network (CDN). Just what is a CDN and how can one work for you? Whether you’re using a CDN or are shopping around for one, we’ve put together The Essential CDN Guide, which covers the technologies, aspects and benefits for

Read More

Teneo and Riverbed Connect to Deliver Managed SD-WAN Service

Simplification is the dream of every IT department. But as use of cloud services from providers such as AWS and Azure increases, and more data resides outside the corporate network, data traffic patterns are as complex as they’ve ever been. For cloud-centric enterprises, an SD-WAN architecture makes controlling and viewing that data traffic a much

Read More

Q&A – The 2017 Security Landscape for EMEA

2017 Security Predictions – It has been said that “the future is uncertain,” but in the cyber security industry we know that certain types of attacks and crime will continue unabated. FireEye and other experts in the industry have been making predictions about the year ahead for longer than a decade now. Some of those

Read More

Confidence Lost

Perhaps I should have been born the Queen of Dragons. Or, at the very least, in another era. When quills were used to correspond, horses to travel. You know, so long as I didn’t have to give up penicillin or my dental hygienist. This penchant for the past (and, if you know me, anything equine-related)

Read More

Why Storage Plays Such a Critical Role in the Success of the NetApp Multimedia Team

Last year was a busy year for NetApp IT AV & Multimedia Services. Within this group, the Multimedia team is responsible for architecting the video production infrastructure as well as capturing, editing, and delivering video content for the entire enterprise. Our charter covers a wide array of activities: Produce an average of 370 live events

Read More

Fortune 500 Company’s Information Security Team Saves 20 Hours Each Week by Migrating to McAfee Endpoint Security

For HollyFrontier Director of IT Infrastructure Edwin Drayden, the primary driver for migrating to McAfee Endpoint Security 10 was not better performance or consolidation of legacy products. It was the ability to integrate new endpoint protection framework with his favorite McAfee product, McAfee Advanced Threat Defense (ATD) dynamic sandboxing. Under Drayden’s leadership, HollyFrontier, a Fortune

Read More

Unleash the Potential of Your Data. Data Fabric Now.

Thursday, March 2, 2017 Attend “Unleash the Potential of Your Data” and get the latest information, expertise, and insight to help you succeed in today’s data-centric IT environment. Why Attend? At this no-cost, live virtual event, thought leader and NetApp CEO George Kurian shares the importance of digital transformation. Learn how the Data Fabric helps

Read More

Carbanak Group uses Google for Malware Command-and-Control

Forcepoint Security Labs™ recently investigated a trojanized RTF document which we tied to the Carbank criminal gang. The document contains an encoded Visual Basic Script (VBScript) typical of previous Carbanak malware. Recent samples of the malware have now included the ability to use Google services for command-and-control (C&C) communication. We have notified Google of the abuse and

Read More

CyberArk Now Available on U.S. Army ITES Software Contract

CyberArk Inclusion in Additional Federal Government Contract Continues to Make It Easier for Agencies to Implement Proactive Privileged Account Security Solutions CyberArk, company that protects organizations from cyber attacks that have made their way inside the network perimeter, and Carahsoft Technology Corp., the trusted government IT solutions provider, today announced the availability of the CyberArk

Read More

Chatbots for business: 4 simple ideas to make your team and ops smarter

There’s a chatbot revolution underway. Here’s how you can harness the technology to improve your business operations. Ever since IBM’s Deep Blue won its first game against world chess champion Garry Kasparov in February 1996, we’ve seen artificial intelligence (AI) move from science fiction to science fact in the public mind. This subfield of computer science is all about solving

Read More

What Won’t Be Reported in 2017—Even Though It’s Likely to Happen

Last year, more than a few stories didn’t make headlines that I thought should have. Whether they weren’t sexy or sensational enough for mainstream news channels, I don’t know. But my inner Nostradamus is telling me that the trend will continue and, therefore, I’m predicting seven storylines that should be covered in 2017, but that

Read More

Solving Cloud and Branch SD-WAN Security Challenges with Riverbed SteelConnect

If you are going to solve your security challenges in the cloud and branch, you are going to need more than one security super hero on the job. “Crimes in cyberspace cost the global economy $445 billion in 2016—more than the market cap of Microsoft ($411 billion), Facebook ($314 billion), or ExxonMobil ($332 billion)”—according to

Read More

Stopping Malware With a Fake Virtual Machine

As we explained in a previous post, some advanced malware can detect a virtual environment such as a sandbox to avoid detection and analysis. Some threats can also detect monitoring tools used for malware analysis. Often such malware will not execute or change their behavior to appear harmless. Because some malware uses these tactics, planting

Read More

SentinelOne Secures $70 Million to Meet Growing Demand to Replace Traditional Antivirus

SentinelOne, the company transforming endpoint security by delivering real-time protection powered by machine learning and dynamic behavior analysis, today announced it has raised an additional $70 million in Series C financing. The company plans to use this new infusion of capital to aggressively expand its sales and marketing efforts to drive more than 400 percent

Read More

vSEC for your AWS Workloads

Utilizing the same security management tool across your hybrid cloud architecture can help your organization be more secure and agile. Maximize the strength of your security posture and capacity for innovation in cloud environments with vSEC.  

Read More

FireEye and Marsh & McLennan at the World Economic Form – A Closer Look at the Perfect Storm Threatening Europe

During this week’s World Economic Forum (WEF) in Switzerland, FireEye and Marsh & McLennan Companies released a cyber risk report that focuses on a fundamental challenge facing the European Union – the evolving threat landscape and the region’s ability to address new cyber threats. This FireEye-Marsh report – Cyber Threats: A Perfect Storm About To

Read More

Riverbed SteelConnect is Ready for Microsoft Azure!

Riverbed SteelConnect is Ready for Microsoft Azure! We’re excited to bring Riverbed’s app-defined SD-WAN solution to Azure! As a Gold Cloud Platform competency partner, we want all of solutions to be ready for our customers moving to Azure. You can now find SteelConnect in the Azure Marketplace. As applications continue to move to the cloud,

Read More

Russians, APTs and Cyber Security: What’s So Common about Common Sense Anyway?

While the world awaits the next titillating chapter of the ongoing saga involving Russia and the U.S. presidential election, there is one section of the recently released Joint Action Report (JAR) compiled by the DHS and FBI that has gone unnoticed and woefully under-reported — and worth digging into. Yes, there was a lot of

Read More

Loeb Consulting relies on HPE SecureData to secure Big Data environments

Loeb Consulting uses HPE SecureData to protect sensitive corporate information for major enterprises to help secure Big Data environments with minimal impacts to speed and system capabilities.  

Read More

Riverbed Soars to Microsoft Gold Cloud Status

To demonstrate our commitment to our customers moving to the Cloud and our partnership with Microsoft, we are excited to announce we’ve achieved the Microsoft Partner Network’s (MPN) Gold Cloud Platform competency. It’s no simple feat and only the top tier of Microsoft partners are able to showcase the in-house expertise, customer success, and performance

Read More

Stop Ransomware with Email Security

See how FireEye Email Security protects your organization by stopping ransomware threats that typically begin with a spear-phishing email. Learn more https://www.fireeye.com/email

Read More

Bot Traffic Report 2016

The annual Imperva Incapsula Bot Traffic Report, now in its fifth year, is an ongoing statistical study of the bot traffic landscape. For our latest report we examined 16.7+ billion visits to 100,000 randomly-selected domains on the Incapsula network to tackle the following questions: How much website traffic is generated by bots? How are bad

Read More

Holly Frontier

Simple roll out, product functionality, and quality made HollyFrontier’s decision to migrate to McAfee Endpoint Security 10 a no brainer.

Read More

Limited Time Promotions: Cut costs while getting your network ready for digital

DNA Secure Access Promotion Get up to 33% more value when purchasing switching and wireless solutions. DNA Secure WAN Promotion Deploy secure, routing solutions while receiving up to 134% more value. Cisco DNA Strategy and Analysis Services Accelerate digital transformation by aligning your organization’s goals and technology. Get these Offers!

Read More

Is an NIH for InfoSec the Proper Cyber Attack Response?

Let’s imagine something for a second. A new disease is sweeping the world, some deadly thing akin to Zika, Ebola, or bird flu. The entire world clamors for a cure, but the only entities interested in working on it are private companies. The FDA, the CDC, and the NIH all remain silent. If this sounds

Read More

The State of Application Delivery in 2017

F5 asked nearly 2,200 customers across the globe about their application environments, the services they use, and the challenges they face. We also asked how customers are approaching security, the cloud, DevOps, and automation and orchestration. Read the Report

Read More

Veeam and AltaVault: The Perfect Backup Combination

In my line of work, I spend most of my time talking to customers. And as a long-time NetApp fanboy (read my other blog supporting Mercy Hospital for a NetApp Innovation Award), a lot of that time is spent talking up NetApp solutions. However, while I’m always a bit partial to NetApp, my team and

Read More

Combat Online Payment Card Attacks using Threat Intelligence

Financial institutions and e-commerce merchants have become targets of massive financial fraud as cyber criminals have used stolen payment card data from major data breaches1, such as the ones involving Wendy’s restaurants in 2015, Home Depot in 2014, and Target in 2013 to make illegal purchases online. As brick-and-mortar stores move to EMV chip-based cards

Read More

Focus on Five High-Priority Changes to Tackle the EU GDPR

Is your Organization ready for GDPR? Gartner predicts that, “By the end of 2018, over 50% of companies affected by the GDPR will not be in full compliance with its requirements.”* In 2018, the European General Data Protection Regulation (GDPR) will require organizations to have a much higher level of data protection security. With the

Read More

Small and Medium-Sized Businesses Not Immune From Cyber Attacks

Small- and medium-sized businesses (SMBs) are the backbone of the U.S. economy. According to data available in the U.S. Small Business Administration’s Small Business Profile for 2016, SMBs with fewer than 500 employees make up 99.7 percent of all U.S. companies and employ 56.8 million workers—48 percent of the U.S. workforce. Cyber security is as

Read More

Know Yourself or Fail the Art of Cyber War

As physical and digital worlds collide, the complexity, volume and variety of risks, threats and vulnerabilities continue to grow. The catastrophic effect of a cyber attack can have a long standing effect on your organization’s reputation, brand and ultimately shareholder value. Is your organization ready to defend itself? Hewlett Packard Enterprise (HPE) Enterprise Security Services

Read More

Riverbed Helps Leading Precision Engineering and Manufacturing Company Automate Robotic Manufacturing and Accelerate Digital Transformation

Challenges Strategic IT initiatives aimed at offsetting rising wage costs and a slowing economy boosted operational efficiency and productivity, but over time resulted in:  – Dramatically increased bandwidth usage  – Employee frustration resulting from poor app performance  – Difficulty diagnosing and solving network issues due to increased network complexity/lack of visibility Limited monitoring/visibility capabilities hindering ability to adhere

Read More

What’s to Learn from the DHS and FBI Joint Analysis Report on the DNC Hack?

On December 29, the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) issued a Joint Analysis Report (JAR) entitled “Grizzly Steppe – Russian Malicious Cyber Activity.” The report, which provides an analysis of the hack on the Democratic National Committee by the Russian advanced persistent threat groups, sends a clear message

Read More

Rotten Apples: Resurgence

In June 2016, we published a blog about a phishing campaign targeting the Apple IDs and passwords of Chinese Apple users that emerged in the first quarter of 2016 (referred to as the “Zycode” phishing campaign). At FireEye Labs we have an automated system designed to proactively detect newly registered malicious domains and this system

Read More

Orchestrated Security for your Private Cloud

As data centers have transformed into highly virtualized private clouds, new security concerns have arisen around stopping advanced threats in such a dynamic environment. Intel Security helps you architect security into your private cloud by design.

Read More

Mic Drop

What did everyone learn about us in 2016? Let’s find out from the founders, Dave Wright and Dave Hitz. Now see what the leading analysts are saying about NetApp. Get the reports today: http://nt-ap.com/2k8G3tn

Read More

Hunze en Aa Water Resource Board enhances Network Security, SCADA Systems with SandBlast

To help ensure safe operation of its pumping stations and other key systems, the Hunze en Aa Water Resource Board implemented NGTX appliances with SandBlast zero-day protection. Through the solution’s centralized management the board gained excellent visibility into the organization’s network and into the SCADA environment.

Read More

Deploy a Turnkey, Enterprise-Class WAF in Azure

Cloud Infrastructure-as-a-Service has driven greater agility, reduced opportunity costs, and enabled businesses to concentrate on core concerns and deliver new digital services faster than ever before. At the same time, the threats to these services have escalated in volume and sophistication. In the eye of the storm, finding the balance between protecting your applications and

Read More

Behind the Scenes of a Phishing Campaign

In a previous Imperva Hacker Intelligence Initiative (HII) report we delved into some of the financial aspects of phishing and credential theft. Obviously, one of the important factors in the cost of a campaign is the lifespan of a phishing site. With so many prying eyes of security vendors and researchers, phishing campaign operators are

Read More

Noteworthy Cyber Security Statistics

Securing privileged accounts and credentials must be at the top of the enterprise security agenda, and we’ve previously highlighted five top reasons why on CyberArk’s blog. With the launch of a new year, it’s a good time to be mindful of the lessons learned in 2016. The cyber security industry is chock-full of reports and

Read More

The 2017 State of Security Operations

The State of Security Operations 2017 report of capabilities and maturity of cyber defense organizations was released by Hewlett Packard Enterprise today, and provides deep analysis on the effectiveness of organizations’ security operations centers (SOCs), and best practices for mitigating risk in the evolving cybersecurity landscape. The report finds newer security approaches ineffective without real

Read More

Solve the mystery

Answer: Everything in Jack’s world must contain double letters in each word. FlexPod’s great performance — no mystery at all. FlexPod provides the performance, agility and economic benefits of the latest Cisco UCS servers, Nexus switches and NetApp All Flash FAS storage.     Download

Read More

Fight Back with FireEye and HPE

HPE partners with FireEye to deliver unique incident response, compromise assessments, and advanced threat management services to ease the burden on enterprises.  

Read More

CME Group Moves to the Cloud with the Gigamon Visibility Platform on AWS

It looks as though our soothsaying CTO Shehzad Merchant got it right—with some of his 2017 cloud predictions already coming true. As he estimated, not only are companies contemplating the opportunity the cloud presents, but they are officially announcing their intentions to make the move and bring on-premise applications into the cloud for better performance

Read More

Securing Tomorrow. Today: Security Pro, Did You Know?

Our series for Security Professionals brings you top leaders in the industry talking on the hottest topics – in less than 3 minutes! In this episode, Jason Julian, Lieutenant Colonel United States Marine Corps, Secretary of Defense Executive fellow, discusses his role at Intel Security and how Intel Security can help with the Department of

Read More

Ensuring Application Performance Across Hybrid Environments

In its quest to increase agility and reliability, IT is adopting cloud services and related technologies like PaaS, micro-services, and containers to rapidly deliver applications that scale to real-world conditions. Application topology is often transient and unpredictably interrelated with countless other applications and services. This poses a serious challenge for performance monitoring since most techniques

Read More

Defend Against PHPMailer Vulnerability with 0day Protection

On December 25th 2016, a critical new vulnerability in PHPMailer was made public. The open source PHP library for email handling embeds email functionality in web applications. This recent vulnerability takes advantage of insufficient validation of email addresses that allows remote (malicious) code injection, to create a backdoor for attackers to take control of a

Read More

Key Findings from the 2017 State of Security Operations Report

Taking your Security Operations Center (SOC) to the next level has never been more critical. Organizations around the globe are investing heavily in cyber defense capabilities to protect their most critical assets. Don’t miss this webinar to explore key findings from the 2017 State of Security Operations report on cyber defense organizations’ capabilities and maturity.

Read More

The Cost and Consequences of Security Complexity: New Ponemon Institute Research Identifies 8 Best Practices

Presented by: Dr. Larry Ponemon, Chairman and Founder, Ponemon Institute | Ojas Rege, Chief Strategy Officer, MobileIron Date/Time: Tuesday, January 17 at 10AM Pacific Complexity seems unstoppable. The Ponemon Institute surveyed almost 600 security professionals to study, for the first time, the impact of complexity on enterprise security posture. How can you identify the warning

Read More

NetOps Embracing Github Except for One Guy Hanging on to vimdiff

The NetworkToCode community is full of people passionate about networking and code. As cliché as might be, these folks have been automating networking since before it started to become cool (and an executive imperative) to do so. During the Fall of 2016 the community conducted a survey on a wide-ranging array of questions that focused

Read More

Recent Zero-Day Exploits

Standard defenses are powerless against zero-day threats Zero-day attacks are cyber attacks against software flaws that are unknown and have no patch or fix. It’s extremely difficult to detect zero-day attacks, especially with traditional cyber defenses. Traditional security measures focus on malware signatures and URL reputation. However, with zero-day attacks, this information is, by definition,

Read More

3 Essentials for Visibility During Data Center Transformation

Date: Available On Demand Time: Duration: 44 minutes As your data center undergoes a transformation caused by exponential traffic growth, virtualization, SDN, and the growing need for more tools to monitor, secure, and analyze the network, you may find yourself missing a critical layer: visibility. Jim Frey, Vice President of Research & Network Management at

Read More

Beyond the Patch: Reducing the Risk of Database and Application Vulnerabilities

Think that the fundamental objective of information security is to counter all threats, remediate all vulnerabilities, and mitigate all risks? Think again. Why our security focus needs to shift. Read the Aberdeen report and learn about virtual patching and database security.      

Read More

Top Cyber Security Trends for 2017

CTO and co-founder, Amichai Shulman provides valuable insight into cyber security trends and best practices to protect your organization. Data breach after DDoS attack after insider threat… hackers upped their game with all signs pointing to more threats, not less. What does this mean for 2017? Attend this webinar and learn: · What top 3

Read More

Forcepoint 2016 Year in Review

January 14, 2016 we officially announced ourselves as Forcepoint and it was an amazing year! We review some of our big events and highlights in this video.  

Read More

SWIFT Attacks Require Swift Investigations

SWIFT, the global financial messaging system, issued an alert message regarding new customer’s compromised environments by sophisticated adaptive attackers in an attempt to send fraudulent payment instructions. This resulted in February this year, when a successful attack of over $1 billion transactions were made from Bangladesh’s central bank resulted in $81 million in unrecoverable losses.

Read More

Get Cyber Security Right in 2017: Prioritize Privilege

Prudent organizations understand the need to have a cyber security program in place to protect assets, but it can be difficult to determine which investments will provide the best business value when making the budget case to C-level executives. This is true whether establishing a new security program or updating an existing one. When making

Read More

Why You Need to Adopt an Open Architecture to Secure Your Business

With more security threats than ever before, organizations are looking to new ways to secure, manage and monitor their environments. The cost and scope associated with this issue are huge. Security environments have traditionally been closed, sealed and ‘secured’ by nature; but as organizations look to solve problems, they are embracing the idea of adopting

Read More

Looking Beyond AV: Solving the Endpoint Protection Problem

There has been a noticeable decline in the effectiveness of traditional antivirus since 2012, but now it has become a serious problem. Read this whitepaper to find out why modern malware techniques are simply too advanced for AV and why it’s only going to get worse in the future. Download

Read More

Gigamon & Cisco Joint Solution Presentation

Cisco’s Doug Hurd covers the Gigamon & Cisco joint solution.

Read More

Three “Must-Do” New Year’s Resolutions to Eliminate Insider Threats

This is the season for New Year’s resolutions. Of course, we all realize that some of these “promises” are easier to keep than others. But if experience has taught us anything, it’s that we meet with more success here when our goals are tangibly beneficial and realistically achievable: We know what positive outcomes we’ll derive.

Read More

APT28: At the Center of the Storm

On Jan. 6, 2017, the U.S. Director of National Intelligence released its Intelligence Community Assessment: Assessing Russian Activities and Intentions in Recent US Elections. Still, questions persist about Russian involvement. Did the Russian government direct the group responsible for the breaches and related data leaks? If so, is this simply a matter of accepted state

Read More

Tackle Insider Threats with a Strong Security Culture

How do you build a strong corporate security culture to tackle insider threats? This paper discusses the internal control, checks, and balances in deterring malicious internal activities and how to leverage data protection technologies and tools to aid in awareness. Download What’s new with McAfee Data Loss Prevention (DLP) 10? We discuss the latest DLP

Read More

The Cost and Consequences of Security Complexity: New Ponemon Institute Research Identifies 8 Best Practices

Presented by: Dr. Larry Ponemon, Chairman and Founder, Ponemon Institute | Ojas Rege, Chief Strategy Officer, MobileIron Date/Time: Tuesday, January 17 at 10AM Pacific Complexity seems unstoppable. The Ponemon Institute surveyed almost 600 security professionals to study, for the first time, the impact of complexity on enterprise security posture. How can you identify the warning

Read More

The State of Application Delivery 2017: Security with a High Probability of Cloud

Forrest Gump, offering his especial brand of unexpected wisdom to a nurse in the eponymously named 1994 movie, said, “My mama always said you can tell a lot about a person by their shoes, where they going, where they been.” It turns out that the same thing can be said for app services; you can

Read More

How to Deploy a Hybrid WAF

Five years ago the New York Times picked up a case study that we had published about a hacktivist group. We were looking at an emerging security landscape – one in which distributed denial of service (DDoS) attacks were a major concern. At the time we had more on-premises security layers than cloud-based services. We had to prepare to

Read More

eBook: 5 Top Reasons to Prioritize Privileged Account Security Today

Establishing cyber security priorities can be difficult for security practitioners and there is confusion around what to do to get the most effective protection against cyber attacks. However, protection from advanced threats requires a complete layer of privileged account security making it the logical choice when it comes to what should come first. Download the

Read More

Hunting for Security Threats – Lessons Learned

Have you been planning on establishing hunting capabilities but just can’t seem to get it started? Check out this webinar to gain a clearer understanding on hunt teams and their effectiveness. This webinar will deep dive into successes and most importantly lessons learned from Hewlett Packard Enterprise’s own journey with leveraging emerging capabilities and hunting

Read More

Remote Code Execution (RCE) Attacks on Apache Struts

Since 2010, 68 vulnerabilities of Apache Struts—the popular open source framework used for building web applications—have been published. Although all of them have been mitigated through patches, hackers still constantly exploit these vulnerabilities to launch attacks. The most commonly exploited Apache Struts vulnerabilities are known as Remote Code Execution (RCE), which allows the attacker to

Read More

7 Questions To Consider When Looking For An Effective Endpoint Solution

The endpoint market is one that everyone seems to be talking about these days. With all that hype and buzz comes a confusing vendor landscape filled with nearly identical marketing speak from each and every vendor. How can the security professional make sense of all this noise? While certainly not an exhaustive list, here are

Read More

Think Before You Share on Social Media

We share a lot on social media. So it’s important to understand privacy settings on all your social media accounts so you know exactly who you are sharing your sensitive information with.  

Read More

Securing Enterprise IoT with Pulse Policy Secure

Neiman Marcus, Target, and Home Depot are front and center during this holiday time of the year.  If you recall, they were also key targets of data security breaches. Target reported costs of $148 million (1).  Home Depot reported $43 Million (2) while the high end retailer, Neiman, was only $4.1 million (3). Whether these

Read More

2017 Cybersecurity Predictions: Successful Ransomware Attack Causes Critical Infrastructure Downtime

It’s time again to make our annual cybersecurity predictions, and this year, I have the pleasure of doing two! Since my Magic 8 Ball hasn’t been too dependable in the past and inspecting animal entrails is not really my thing, I’ll go with a more useful and less messy approach of looking at trends. Calling

Read More

Credit Card Data and Other Information Targeted in Netflix Phishing Campaign

Through FireEye’s Email Threat Prevention (ETP) solution, FireEye Labs discovered a phishing campaign in the wild targeting the credit card data and other personal information of Netflix users primarily based in the United States. This campaign is interesting because of the evasion techniques that were used by the attackers: The phishing pages were hosted on

Read More

Security for What Matters Most

Cybercrime is about profit and making money. Cybercriminals make money on your data. Imperva has a singular purpose: to defend your business critical data and applications from cyber attacks and internal threats. Watch our video to see how we protect your applications and data against cybercrime.

Read More

Monitoring Applications Running on Docker Containers

Continuous monitoring has become an important part of an application life-cycle in many companies, including Riverbed. In a recent visit to one of our development centers I had the opportunity to chat with our dev team regarding the way they use Jenkins and Docker in our development process. It was quite interesting to see how

Read More

Top 5 Priorities Around Federal Cybersecurity for 2017

The year 2016 again saw large data breaches of both Federal and private companies, from the IRS to telcos and internet service providers. Couple that with hacks of emails during the 2016 Presidential Election, and the year ended with a lot of attention on data security. Cybersecurity, or the federal government’s lack of it, has

Read More

Check Point discovers three Zero-Day Vulnerabilities in web programming language PHP 7

PHP 7, the latest release of the popular web programming language that powers more than 80% of websites, offers great advantages for website owners and developers. Some of them include doubling the performance and adding numerous functionalities. Yet for hackers, it represents a completely fresh attack vector, where they can find previously undisclosed vulnerabilities. During

Read More

MM Core In-Memory Backdoor Returns as “BigBoss” and “SillyGoose”

In October 2016 Forcepoint Security Labs™ discovered new versions of the MM Core backdoor being used in targeted attacks. Also known as “BaneChant”, MM Core is a file-less APT which is executed in memory by a downloader component. It was first reported in 2013 under the version number “2.0-LNK” where it used the tag “BaneChant” in its command-and-control (C2) network

Read More

AWS X-Ray and Gigamon Visibility Platform for AWS: Different Strokes for Different Folks

At AWS re:Invent 2016 last week, Amazon unveiled a preview of AWS X-Ray, a service to help developers analyze and debug distributed applications. As AWS CTO Werner Vogels shared details at his keynote, it was received with enthusiasm by the audience. Are there any similarities with our Gigamon Visibility Platform for AWS announced earlier this

Read More

Control and Monitor Privileged Accounts to Minimize the Risk of Insider Threats

Security professionals must constantly be looking over their shoulder to see what threats and attacks are coming next. Not only do they need to be on the lookout for external threats, but also inside their organization for rogue employees, malicious contractors who have authorized access, former employees who still have privileged access to business critical

Read More

What Tactics are Thieves Using to Steal Data?

Find out different ways data thieves are stealing important company data.

Read More

Is Your Organization Secure?

See the top security priorities for 10 target industries and the best way to assess exposure. Learn more by downloading our whitepaper: http://bit.ly/2iy8exZ  

Read More

Securing Hybrid Networks for Dummies

Resilient, fast and secure connections are possible with hybrid networks, even when you manage large and distributed environments. IT security teams need to know what their different options are as their networks grow more complex and how to ensure that the network remains secure and available as the organization expands. Hybrid networks will play a

Read More

SteelCentral APM Recognized in the Gartner APM Magic Quadrant Report

SteelCentral APM had a very busy and exciting 2016! Here is a quick retrospective of 2016 and what is on the horizon for 2017. Let’s start with the newly released 2016 Gartner APM Magic Quadrant. Gartner has ranked Riverbed’s SteelCentral APM suite higher than previous years both in terms of critical product capabilities and positioning

Read More

SecureMail Webinar for Partner Sales (Business Focused Audience)

Join Arrow and HPE Security to learn why major global companies have adopted the award winning HPE SecureMail solution to address their email encryption and regulatory compliance requirements. The HPE SecureMail solution received the 2016 CyberSecurity Excellence Award! In this business-focused session hear: Why HPE SecureMail is a natural fit for customers transitioning to MS

Read More

Do You Know What’s in Your Data Center?

Improving data center efficiency is quickly rising to the top of IT priorities, as operating costs, energy prices, and capital investments steadily increase. Changes are needed to eliminate unnecessary expenses without sacrificing the quality or responsiveness of IT services. At the top of the list are automation, auto-discovery, and intelligent power metering which can deliver

Read More

How a Blockchain Could Revolutionize The Energy Sector

Blockchain technologies such as Bitcoin are turning the financial world upside down. But one of the biggest opportunities is in energy. January 04, 2017 Solar power is already a bright light in fighting against global climate change, but it could do more than just cut energy costs. Adding a blockchain like the one used for

Read More

No More Ransom! Check Point adds firepower to the global ransomware battle

If you didn’t know what ransomware was at the start of this year, chances are that you do now. It’s been the biggest cybersecurity story of 2016 for both businesses and consumers. Back in February, a Hollywood hospital was forced to pay $17,000 in bitcoin to get its systems back online after an attack; while over

Read More

FLARE Script Series: Querying Dynamic State using the FireEye Labs Query-Oriented Debugger (flare-qdb)

Introduction This post continues the FireEye Labs Advanced Reverse Engineering (FLARE) script series. Here, we introduce flare-qdb, a command-line utility and Python module based on vivisect for querying and altering dynamic binary state conveniently, iteratively, and at scale. flare-qdb works on Windows and Linux, and can be obtained from the flare-qdb github project. Motivation Efficiently

Read More

GigaTALKS: AWS w/Mike Clayville

We sat down with Mike Clayville from Amazon Web Services to discuss our latest announcement, visibility into the public cloud.

Read More

The Role of Privileged Accounts in the Cyber Attack Lifecycle

The role of privileged accounts in the cyber attack lifecycle. Learn about the common path attackers take from initial compromise to mission accomplished.

Read More

Leeds and York Partnership NHS Foundation Trust United Kingdom

OVERVIEW Leeds & York Partnership NHS Foundation Trust (LYPFT) provides mental health and learning disability services to the people of Leeds and across the Yorkshire and Humber regions of the United Kingdom. Established as a National Health Services (NHS) Foundation Trust in August 2007, LYPFT merged the mental health and learning disability services from NHS

Read More

Four Ways to Simplify Your Performance Management

Using the newly released SteelCentral solutions I don’t know if you’re like me, but twice year—spring and fall—I declutter. I go through my closets, garage, and basement and clean up, donate, give away, recycle, and throw away everything that no longer belongs. For example, I donate clothes that no longer fit, I haven’t worn in

Read More