Blog

admin
November 13, 2017
Articles No Comments

InfoArmor Out-of-the-Box Integrations

This post is for CISOs and customers looking for a Threat Intelligence solution.   Curious about InfoArmor and what security solutions they integrate with out-of-the-box? They can integrate into Splunk, Qradar and other SIEM integrations. They also have an API available, which they can develop upon request. To learn more about them and details about their solutions […]

READ MORE
admin
November 10, 2017
Articles No Comments

Acalvio Out-of-the-Box Integrations

This post is for CISOs and customer champions looking for a deception solution.   Thank you for reading. One of the questions we get asked quite frequently is whether we know who integrates with what out-of-the-box. This makes sense that CISOs and their teams want to make the most use out of what they already […]

READ MORE
admin
October 24, 2017
Articles No Comments

NICK STURGEON JOINS PONDURANCE AS SOC DIRECTOR

This article was originally posted at https://www.pondurance.com/nick-sturgeon-joins-pondurance-as-soc-director/   We are excited to announce that we’ve hired Nick Sturgeon to lead our growing security operations center (SOC) team. Nick comes to us from the Indiana Office of Technology’s Information Sharing and Analysis Center (IN-ISAC), where he served as the manger for both the IN-ISAC and the […]

READ MORE
admin
Articles No Comments

Cyber security is easy! Don’t believe me? It’s all about quick and effective implementation

This article was originally posted at https://blog.avecto.com/posts/cyber-security-is-easy-don-t-believe-me-it-s-all-about-quick-and-effective-implementation#more   I know from my experience of deploying privilege management in global organizations that people think it’s going to be hard. Every organization is facing an endpoint security balancing act. On one hand employees, and their endpoints, need to be secure. But on the other hand, many employees […]

READ MORE
admin
October 18, 2017
Articles No Comments

Adding forEach: The Power of SWIFT Closures

This article was originally posted at http://tekmonks.com/beta/beta/blog/swift_closures.html   Introduction to Closures Closures are definitely not a new invention, many languages have had them in the past, and even Javascript has closures. However, the implementation of closures as a first class language construct is certainly very elegant in SWIFT. Have a scoped unit of code, which […]

READ MORE
admin
Articles No Comments

BEC Fraud; Unmasking the Fraudsters

This article was originally posted at https://blog.area1security.com/bec-fraud-unmasking-the-fraudsters-6a8818851db7   Vivek Bhandari |@Area1Security| Area 1 Security The worst type of fraud is one that betrays personal trust: that’s Business Email Compromise (BEC), a specific form of phishing; and it’s gaining ground as one of the most dangerous and costly cyber threats on the globe. Recent studies, including […]

READ MORE
admin
Articles No Comments

Introducing Seclytics Predictive Threat Intelligence

This article was originally posted at https://www.seclytics.com/blog/2016/08/16/introducing_seclytics_predictive_threat_intelligence/   Hello, we are Seclytics and we predict threats before they launch. Over the past two years, our team built a truly predictive threat intelligence platform and we are now ready to introduce the next stage in the evolution of internet security. First, there was hash based detection […]

READ MORE
admin
Articles No Comments

Spreading Technique used by Retadup Worm

This article was originally posted at https://blog.acalvio.com/spreading-technique-used-by-retadup-worm   Retadup worm has been in the news recently. It was first observered infecting Israeli Hospitals [1] and recently it was observered active in South America mining for Crypto Currency[2]. The details of the worm have been published by Trend Labs[1][2].  This blog will share the spreading technique […]

READ MORE
admin
Articles No Comments

TRIAGINGX HAS BEEN LISTED AS TOP SECURITY LEADER 2017

This was originally posted at http://triagingx.com/2017/10/14/triagingx-has-been-listed-as-top-security-leader-2017/   Cyber Security Leaders 2017

READ MORE
admin
October 15, 2017
Articles No Comments

Cybersecurity Made Easy

This article was originally posted in Information Security Magazine on 10/13/17. Click here to check it out. Please follow us on Twitter @rfindery and connect with us at our LinkedIn page here. Thanks!   Cybersecurity is more important than ever right now, and a breach could be costly and damaging. As we’ve seen recently with the […]

READ MORE