IBM App Fights Cybersecurity Problems from the Inside

A new app from IBM may be leading the charge into ensuring that insider cybersecurity threats are stamped out. When most administrators think of data breaches, they often jump to actions like closing current vulnerabilities in company software or installing firewalls. While these are obviously necessary measures, what a lot of people forget about is what kind of information employees and outside contractors have access to. 

Read More

Top 4 Cybersecurity Certifications

Cybersecurity is incredibly important these days, especially to the business sector. With so many prominent names hitting the headlines after having customer information stolen, it's no surprise so many administrators are terrified at the thought of a data breach. This fear isn't unfounded, either. A study conducted by Centrify found that around 66 percent of customers in the U.S. would likely halt any interaction with a company that's officially been hacked. 

Read More

Security Threats: 5 Common Network Blind Spots

Enterprise networks are changing at a rapid pace – becoming more complex as next-generation advancements transform traditional architectures. Simultaneously, enterprises of all kinds and across all industries are coming to the sobering conclusion that with these changes, the traditional approach to cybersecurity is no longer effective.
 
Perimeter defenses, while still necessary, are no longer sufficient in the face of this once inconceivable, but now irrefutable, reality: Breaches will occur. Where cyber attacks of the past were intentionally grandiose and overt, today's attackers more often prefer to move low and slow, creating command and control channels through which to steal valuable information over long periods of time while remaining undetected.
 

With these changes a new security paradigm is emerging, one that charges security and network professionals not only with keeping threats out, but also with gaining and maintaining visibility over what's already inside their networks; however, the increasing complexity of networks creates blind spots that make seeing these threats more difficult than ever. What's more, these blind spots are caused by a number of factors and often create bottlenecks that can degrade network performance.

Read More

Cybercrime Case Study: Verizon Lessons Learned

In one particular instance, a customer contacted the RISK Team with an issue involving a primary competitor, a suspected threat actor, located on another continent that had recently made public a new piece of large construction equipment. At first glance, the equipment looked like an exact copy of a model recently developed by our customer, the victim. This was even more suspicious as the competitor, the threat actor, hadn't traditionally produced this type of equipment and therefore had no past track record in this part of the market. The victim's concern was not just that this equipment's design details were obtained illicitly, but that other projects were also in danger of similar compromise.

Read More

Subscribe Here!