October 2018 marks the 15thanniversary of the National Cybersecurity Awareness Month. On one hand this should comfort CISO’s that recognition of this important issue gains visibility at a new scale, on the other it should be a bit scary that we...Read More
At some point everyone has played “tag” as a kid. The thrill of running away from the person who is “it” with everything from sheer speed to American football running back-like fakes for evasion kept you “safe” but usually only for a moment. At...Read More
Do you truly know the difference between real threats and fake or even inconsequential ones? Maybe the difference between the threat of the boogeyman under your bed versus being taught stranger danger as a child? What about the threat of being...Read More
Since the publication of the vulnerabilities found in Microsoft Equation (CVE-2017-11882 & CVE-2018-0802), it appears that unique usage of these exploits are being re-implemented in various ways to evade security solutions.
In recent weeks,...Read More
Sandboxes have been touted as the best method to prevent a cyber attack on organizations because they allow you to test everything before it can affect your production environment. But does that come with a cost and are they as effective as...Read More
There are literally hundreds, if not thousands or approaches cyber criminals can use to exploit your IT infrastructure and access sensitive data. Once an exploit is discovered it can be dealt with using signature-based technologies that scan for...Read More