The holiday shopping season is well upon us. In the US 2017 holiday online sales are at an all-time high, with online transactions on Cyber Monday in the US reaching a record $6.59 billion. With online holiday shopping quickly becoming the preferred choice of consumers over brick and mortar stores, consumers and retailers need to be on the lookout for Cyber Ghosts, that unlike Scrooge’s visitors, come for those with a generous spirit. But don’t despair there is hope if you change your old cybersecurity ways.Read More »
During the recent International Cyber Security and Intelligence Conference info security execs were lectured on the importance of being proactive vs reactive to stop cyberattacks. As part of a proactive strategy speaker Nik Alleyne, senior manager of cyber security at Forsythe Solutions Group, recommended vulnerability assessments and regular penetration tests. While these are important tools for evaluating cybersecurity risk, they only answer half of the security paradox; “Can I be hacked?” They do not answer the more vital question; “Am I already breached?”Read More »
Many enterprises rely on security information and event management (SIEM) solutions to help detect suspicious activity on their networks. However, despite SIEM’s attempts to dedup, contextualize, and correlate thousands to millions of alerts daily, many organizations find themselves drowning in irrelevant and/or false positive data. The resulting ‘alert fatigue’ increases the likelihood that a real threat will be missed, wreaking havoc on your systems and reputation.Read More »
Proactive threat hunting is quickly becoming a must for any organization that’s serious about protecting itself and its bottom line. But where do you start? We’ve assembled a list of the top 6 host indicators of compromise that every organization needs to be looking for to find hidden malware and APTs that threaten the security of your systems and data.Read More »
Banks continue to come under designed attack from malware and APTs. Indeed, the prevalence of financial malware is more than double that of ransomware. Overall, the cybersecurity threat landscape has made significant advancements to target verticals with high value assets and business models, making the financial sector in general a prime target.Read More »
The holidays signal the peak shopping season for both brick and mortar shops and online retailers. This year’s sales are predicted to bring in $682 billion for US retailers alone. But as the holiday shopping season approaches, we also need to brace for more retail focused cyberattacks from Point Of Sale (POS) malware attacks to retail and bank account takeovers.
Read More »
Security approaches need to evolve. Most IT and security pros continue to believe that the best shield against cybercrime involves strengthening a network’s perimeter to keep attackers out and antivirus software for endpoint defense. The need for new security approaches that improve response time or action has never been more apparent, as threats (unfortunately) arise more quickly than security strategies.
Read More »
Cybersecurity pros beware, your systems may be lurking with untold dangers and shadowy characters that could be the source of never-ending nightmares. The good news is you don’t have to run in terror from these threats. Like any good vampire slayer or werewolf hunter, you just need a strategy and the right tools to stop them in their tracks.Read More »
Infocyte has developed a new integration with Splunk Enterprise to provide users with enhanced data-centric hunt, incident investigation and response capabilities. The new Infocyte HUNT App integrates Splunk Enterprise with the Infocyte platform to provide Splunk users with post breach detection, leveraging Forensic State Analysis (FSA) for more comprehensive and scalable detection of fileless implants, persistence mechanisms and forensic evasions.Read More »
Dwell time, or the breach detection gap, are cybersecurity terms used to describe the period of time between malware executing within an environment and it being detected. Detection can be achieved through a variety of security procedures and solutions, however it seems to often occur when an enterprise is notified of suspicious banking activity or a data breach.Read More »