Einträge von Technik Support

Transforming Endpoint Security

By Tom Stitt It’s been said before, but this bears repeating. On average, it takes organizations 100 days1 or more to detect a breach after it occurs. On average. This means attackers often have more than three months to examine an organization’s data and then steal what they want. Clearly, this is not effective. These […]

Transforming Endpoint Security

By Tom Stitt It’s been said before, but this bears repeating. On average, it takes organizations 100 days1 or more to detect a breach after it occurs. On average. This means attackers often have more than three months to examine an organization’s data and then steal what they want. Clearly, this is not effective. These […]

Sundown EK: You Better Take Care

By Talos Group This post was authored by Nick Biasini Over the last six months the exploit kit landscape has seen some major changes. These changes began with Nuclear ceasing operations in April/May and arrests in Russia coinciding with the end of Angler in June. Recently, Neutrino has been added to the list of exploit […]

Sundown EK: You Better Take Care

By Talos Group This post was authored by Nick Biasini Over the last six months the exploit kit landscape has seen some major changes. These changes began with Nuclear ceasing operations in April/May and arrests in Russia coinciding with the end of Angler in June. Recently, Neutrino has been added to the list of exploit […]

The Evolution of Scoring Security Vulnerabilities: The Sequel

By Omar Santos Back in April, I wrote a blog post about the new version of the Common Vulnerability Scoring System (CVSS). The changes made for CVSSv3 addressed some of the challenges that existed in CVSSv2. For example, CVSSv3 analyzes the scope of a vulnerability and identifies the privileges an attacker needs to exploit it. […]

The Evolution of Scoring Security Vulnerabilities: The Sequel

By Omar Santos Back in April, I wrote a blog post about the new version of the Common Vulnerability Scoring System (CVSS). The changes made for CVSSv3 addressed some of the challenges that existed in CVSSv2. For example, CVSSv3 analyzes the scope of a vulnerability and identifies the privileges an attacker needs to exploit it. […]

National Cybersecurity: A Collaborative Approach is Required

By Edna Conway As we wrap up National Cybersecurity Awareness Month in the U.S., cybersecurity continues to be a top-of-mind issue for business, government and consumers alike. In February 2016, President Obama announced a Cybersecurity National Action Plan to improve the United States‘ cybersecurity posture. The non-partisan Commission on Enhancing National Cybersecurity was created and […]

National Cybersecurity: A Collaborative Approach is Required

By Edna Conway As we wrap up National Cybersecurity Awareness Month in the U.S., cybersecurity continues to be a top-of-mind issue for business, government and consumers alike. In February 2016, President Obama announced a Cybersecurity National Action Plan to improve the United States‘ cybersecurity posture. The non-partisan Commission on Enhancing National Cybersecurity was created and […]

To be Effective, Security Must be Simple, Open, and Automated

By Jason Lamar Organizations must take advantage of the digital economy in order to succeed and grow. But to do this, and do it securely, we can’t be compromised by complexity. Our IT landscapes are often systems cobbled together over the years. We may have servers from 15 years ago and cloud apps from 15 […]

To be Effective, Security Must be Simple, Open, and Automated

By Jason Lamar Organizations must take advantage of the digital economy in order to succeed and grow. But to do this, and do it securely, we can’t be compromised by complexity. Our IT landscapes are often systems cobbled together over the years. We may have servers from 15 years ago and cloud apps from 15 […]