Cybersecurity Tactics to Defend Against Cyberattack
Cybercrime continues to plague organizations resulting in compromised information, damaged reputations and expensive reparations. As cyberattacks grow in complexity, they are capable of attacking various forms of infrastructure using a wide range of tactics. In short, our dependence on technology makes cybersecurity a concern for all of us. Most of us, for personal or professional…
Artificial Intelligence Is Only As Good As Our Input
Much of the intelligence and SIEM tools cybersecurity and IT pros use day in and day out have a machine learning component that falls into the category of Artificial Intelligence (AI). For example, it could be argued that the AlienVault Unified Security Management (USM) product, with SIEM capabilities, operates with some AI characteristics and capabilities….
What Is Cyber Intelligence?
In February 2002, Donald Rumsfeld, then US Secretary of State for Defense, stated at a briefing, “There are known knowns. There are things we know that we know. There are known unknowns. That is to say, there are things that we now know we don’t know. But there are also unknown unknowns. There are things…
2020 Election: URL Hijacking Could Be a Serious Issue
The Internet Is the Ideal Staging Ground for 2020 Election Attacks Good and bad news spreads at the speed of the Internet. People share thousands of posts on social media before fact checking can even start. And once disseminated, even false information requires an enormous effort to correct. And we may not even be able…
What Is A Zero-Day Vulnerability and How Does it Work?
Understanding Zero-Day Vulnerability There’s no end to the numerous challenges involved in securing your networks, systems, and environment. Whether it’s ransomware, social engineering or data theft, the volume of cyber threats that impact IT assets, personal data, and business networks are staggering. This is especially the case with “zero-day vulnerabilities.” Because cybersecurity is reliant on…
Raising Cybersecurity Awareness: 7 Questions to Ask
Security is a team effort. It’s no longer solely the responsibility of IT or cybersecurity departments to defend organizations against cyber attack. Cyber criminals can target anyone, across all departments and roles, and this means that everyone has a part to play in protecting networks, systems and data. Staying informed about security best practices and…
The Truth Behind Voter Registration Data Found on the Darknet
Election security has been a heightened focus of concern since 2016 and the media is highlighting a range of activities that could indicate serious hacker activity as we head in the 2020 election. We’re worried about hacking voting systems and stolen voter registration data in addition to the deliberate distribution of false candidate information. The…
Protect 2020: Now Is the Time to Secure the Election
We may feel that there is still time to prepare for the 2020 election, but cyberattackers are already actively seeking ways to undermine it. Election attacks typically start long before the actual election. Threat actors seek to infiltrate systems by stealing valuable login credentials through methods like phishing or purchasing stolen data in underground markets,…
How to Defend Against Motivated and Sophisticated Cyberattackers
Everyone loves a good villain. They make our most treasured stories so much more interesting. As human beings we’re complex, so we love to see our villains portrayed with layers. We crave a visceral, relatable depiction to send a shiver up the spine. I’d point you in the direction of Anthony Hopkins’ unflinching Hannibal Lecter,…
BOTNETS: When IOT Goes Rogue
WHAT ARE IoT DEVICES? In a world thriving on interconnectivity, one big development over the last 10 years is not just the invention of IoT devices, but the availability of those devices. Not only do they extend internet connectivity beyond the standard desktop or laptop, they’ve been developed to touch every aspect of our lives….