Remote workforces need network detection and response tools (NDR), but deploying an NDR that works with remote and hybrid environments is another story. Most NDRs are designed for on-premises networks. Unfortunately, that couldn’t be further from what the typical modern environment looks like.
The U.S. government created a new office to block disinformation. The new Foreign Malign Influence Center (FMIC) oversees efforts that span U.S. military, law enforcement, intelligence, and diplomatic agencies. The FMIC was established on September 23 of last year after Congress approved funding, and is situated within the Office of the Director of National Intelligence. The FMIC has the unique authority to marshal support from all elements of the U.S.
The evidence is clear – there is nothing most people and organizations can do to vastly lower cybersecurity risk than to mitigate social engineering attacks. Social engineering is involved in 70%-90% of all successful attacks. No other root cause of initial breach comes close (unpatched software is involved in 20% to 40% of attacks and everything else is in the single digits). Every person and organization should create their best possible defense-in-depth plan to fight social engineering.
Nightfall’s Cloud DLP platform helps you limit access to sensitive data, by protecting the data where it is stored. With Nightfall you can redact, delete attachments, or make the data private in one click or via automated actions.
Over the past twenty years, security information and event management (SIEM) platforms have been one of the key solutions for cybersecurity management, as they help security teams centralize attack and threat detection activities. The cybersecurity industry is now shifting towards a new type of solution known as extended detection and response (XDR). As the two technologies are similar and have overlapping capabilities, many people still don’t know how they differ.
Recently, a new trend has emerged in the world of ransomware: intermittent encryption, the partial encryption of targeted files. Many ransomware groups, such as BlackCat and Play, have adopted this approach. However, intermittent encryption is flawed. In this blog post, I will introduce White Phoenix, a tool my team built that takes advantage of the fact that those files aren’t entirely encrypted and can, in the right circumstances, salvage some content from the unencrypted parts of the files.
Brighline is a virtual counseling service that provides help to children, teenagers, and whole families. This pediatric counseling service offers a range of mental health care services to patients throughout the world. Brightline stores a significant amount of personal data to maintain these patient records and offer reliable care, but the company recently suffered from a dangerous data breach, exposing hundreds of thousands of patient records to the internet.