Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

opsdemon

Latest posts

Cloud Security & SSL Decryption Overview

Growth of cloud services has ushered in a new computing architecture and, with it, a host of security challenges. Three such challenges include governing usage; protecting sensitive data and preventing its loss; and defending against threats that propagate in the cloud. Unlike traditional computing architectures in a corporate network - for which security solutions have been designed - cloud services enable security violations and threats to fly under the detection radar.

WannaCry FAQ: What you need to know today!

Friday May 12th will be the day we remember the start of the mayhem caused by ‘WannaCry’, the most successful ransomware infection in history. Since Friday, Security teams have been running around with their heads on fire trying to get ahead of the infection and to understand the malware’s capabilities. In the process, a lot new sales lead ransomware experts seem to have risen from the depths and have confused the situation further.

WannaCry Ransomware Infects Thousands Especially UK's NHS

The recent WannaCry ransomware attack, that has hit over 100 countries, would have been much larger had it not been for the early actions of both a UK cybersecurity researcher who blogs for Malwaretech and two Proofpoint researchers. In this attack, a powerful Microsoft exploit turned into a very nasty worm. As part of their initial effort, the researchers found and sinkholed a domain name hardcoded in the malware, for $10.69 during the early stages of the attack.

Technology Webinar: ImmuniWeb Application Security Platform

ImmuniWeb® Application Security Testing Platform leverages a machine learning technology for intelligent automation of web vulnerability scanning. Complemented by human intelligence, it detects the most sophisticated web application vulnerabilities and comes with zero false-positives SLA.

Women Talk Success in Security from 3 Perspectives | Panel

Embracing diversity is a key driver for success in today’s business world. As a young woman starting or developing her career in technology, you may find inspiration in hearing from other successful women. This live panel features 3 speakers from our R&D organization who will talk about their own career paths leading into security and will share tips and advice that they've learned along the way.

Cybersecurity Dissonance: Perception vs Reality Panel Discussion

Arctic Wolf recently completed a cybersecurity survey and found that nearly every company has very high confidence in their security defenses. However, the survey also identified that IT/security professionals felt security was complex, and they found it difficult to focus on security because their role covered so many different areas.