Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

What is Ransomware?

Ransomware is a type of malicious software, or malware, designed to deny access to a computer system or data until ransom is paid. Ransomware spreads through phishing emails, malvertising, visiting infected websites or by exploiting vulnerabilities. Ransomware attacks cause downtime, data leaks, intellectual property theft and data breaches. Ransom payment amounts range from a few hundred to hundreds of thousands of dollars. Payable in cryptocurrencies like Bitcoin.

What is an Information Security Policy?

An information security policy (ISP) is a set of rules, policies and procedures designed to ensure all users and networks within an organization meet minimum IT security and data protection security requirements. ISPs should address all data, programs, systems, facilities, infrastructure, users, third-parties and fourth-parties of an organization.

Enhancing Enterprise Security | ANLYZ

Organizations worldwide are grappling with the effects of cybersecurity breaches and its impact on business to enhance enterprise security. Hackers are willing to do what it takes to eavesdrop on vulnerable IT environments to steal intellectual property or sensitive information. They have the skills to infiltrate and break barriers in a highly connected and digitized business environment.

How to manage Internet of Things (IoT) security in 2019

Photo by BENCE BOROS on Unsplash Welcome to the world of Internet of Things (IoT) and a glimpse into the future. The IoT is where the physical world merges with the digital world. Soon, we expect the world IoT population to outnumber the human population tenfold—perhaps as many as 80 billion connected devices by 2025.

An introduction to penetration testing

The digital world has become a dangerous place. It’s like the Wild West (the movie kind, not the real kind, which was decidedly less wild than it’s portrayed), with outlaws out to do you harm and make off with your precious data. Fortunately, like any good western, there are also honour-bound gun slingers seeking to bring law, order and – most importantly – security to the digital landscape.

Airbus Hit by Cyber Attacks on Multiple Suppliers

Security sources have found that the European aerospace giant Airbus has been hit by a series of cyberattacks by hackers who targeted the company's suppliers in search of technical secrets, with suspicions the attack is linked to China. Two security sources involved in the investigation claim there have been four major attacks on Airbus within the last 12 months.

Featured Post

Protecting Customers by Protecting Your Business

Many small businesses are now aware of the importance of maintaining data security. However, not all companies pay close attention to customer data. Breaches that result in customer information being compromised are among the most expensive to deal with. For example, exposing credit card numbers, addresses, and names of customers could result in significant financial loss, reputation damages, and compliance issues. This means that your company might end up incurring as much as $4 million per incident of this nature.

Best Practices for Using Tripwire Enterprise in Dynamic Environments - Part 1

Just a few years ago, most IT environments were made up of deployed servers on which personnel installed applications, oftentimes as many as that one system could handle. They then remained and ran that way for years. In the meantime, the IT team maintained the system and updated the applications as needed. Sometimes there were test versions of those systems, but this wasn’t often. Even then, the OS often didn’t match the production version of the same system.