The Email Laundry End of Life?...

June 1st 2020: Fireeye end of life The Email Laundry email security service. This comes as a surprise to many as Fireeye acquired The Email Laundry back in 2017 and seemingly had plans to greatly expand the service. The Email Laundry serviced MSPs and small organizations whereas Fireeye had a conserted desire and history servicing Enteprise businesses. This may be why Fireeye decided to exit the SME Email Security service market.

Profiling "VIP Accounts" Part 2

In this post, we continue our discussion of use cases involving account take over and credential access in enterprise data sets. In the first part of this series, we introduced the definition of a VIP account as any account that has privileged or root level access to systems/services. These VIP accounts are important to monitor for changes in behavior, particularly because they have critical access to key parts of the enterprise.

Stories from the SOC- SSH Brute Force Authentication Attempt

Ervin McBride IV – TDP Engineer II contributed to this article. Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers.

What Is the Cyber Kill Chain and How to Use It Effectively

You're probably familiar with the defense-in-depth or castle and moat approach to cybersecurity. It remains a common model that organizations use to think through their information security. However, as organizations have matured they have sought out new models to enable them to better understand how cyber attackers operate and how best to defend against them.

How to protect your crown Jewels while working remotely

The crown Jewels, part of the Royal Collection, are the most powerful symbols of the British Monarchy. They are housed in the ‘Jewel House’, vault at the Tower of London. Ever since attempts have been made to steal the crown jewels their security has been tightened. Conventional methods to protect the crown jewels are not sophisticated enough to stop the highly motivated adversarial threats. Let’s take a closer look at how these jewels are protected.

Your return-to-the-office cybersecurity checklist

The novel COVID-19 pandemic has changed the way organizations work. The sudden transition to remote work has forced organizations to look for temporary fixes to bridge the gap, leaving their endpoints exposed to an unprecedented threat landscape. Insecure internet connections, a lack of perimeter security, and the inability to implement effective security policies have made remote endpoints a breeding ground for threat actors.

Redscan ThreatDetect Highly Commended at SC Awards 2020

Chosen from a final shortlist of five companies, ThreatDetect was selected for service excellence and, in the words of the judges, for helping organisations ‘to reduce mean time to detect and respond to threats from months to minutes’. “We are delighted to have been recognised in the SC Awards for four consecutive years.” said Redscan’s Product Marketing Director, Simon Monahan.

5 Best Practices for Protecting Data While Working Remotely

As the Coronavirus disrupted the day-to-day lives of billions of people around the world over the last several months, businesses are in the middle of what Time Magazine describes as the “world’s largest work-from-home experiment.” Practically overnight, many companies were forced to adjust their operations by moving millions of workers out of their offices and into their homes.

Collaboration, Remote Work and Data Security

An interactive discussion offering a practical insight into the lives of four tech leaders from across the globe who will share the security lessons from the past few months and offer insights into how this will impact practices going forward. This is a great opportunity to hear from four exceptional speakers as they share their experiences and take questions.

Uncovering Bots in eCommerce Part 3: What Sets Scraper Bots Apart?

Web scraping uses bots to collect large amounts of data from websites. Quite simply to extract content and data from a website. Data that’s publicly available. The scraper bot can then duplicate entire website content elsewhere. Scraper bots, most of the time, are not always bad. Bots are constantly at work behind the scenes making our digital lives run smoothly. They are usually looking for information that you are freely giving to your website’s visitors.