Financial Impact of Cyber Threats

The WannaCry and NotPetya ransomware epidemics demonstrated how quickly malware can spread across the globe and cripple businesses. Their impact extended beyond traditional IT infrastructure into operational systems used to control industrial, manufacturing, and critical infrastructures. The scale of these incidents is forcing organizations to consider the financial impact and business exposure associated with cyber [...]

By |Cybersecurity, General|Comments Off on Financial Impact of Cyber Threats

Top cloud security threats for 2018

Cloud computing continues to transform the way organizations use, store, and share data, applications, and workloads. It has also introduced a host of new security threats and challenges. With so much data going into the cloud—and into public cloud services in particular—these resources become natural targets for bad actors. Contrary to what many might think, [...]

By |Cloud, Cybersecurity, General|Comments Off on Top cloud security threats for 2018

Cryptojacking – are you mining Bitcoins ?

Common threats like adware and spyware have a new tricky classmate called “cryptojacking”. Cryptojacking secretly uses your system or laptop or mobile device to mine cryptocurrency when you visit an infected site. Malicious miners aren’t new in themselves, but cryptojacking has exploded in popularity over the past few weeks, because it offers a clever twist. [...]

By |Cybersecurity, General, IOT|Comments Off on Cryptojacking – are you mining Bitcoins ?

The Real Repercussions for Cybersecurity Lapses

The past year has shown how real the implications of attack breaches are for business viability, for the job prospects of top brass in charge when lapses occur, and even for the personal finances of CEOs when the fecal matter hits the fan. Uber's massive data breach of 57 million accounts and its $100,000 effort [...]

By |Uncategorized|Comments Off on The Real Repercussions for Cybersecurity Lapses

Web Application Security Testing with Open Source ‘OWASP Zed Attack Proxy Project’

Attackers have an over-growing list of vulnerabilities to exploit in order to maliciously gain access to your web applications, networks and servers. Whether you’re a novice WordPress user or a sophisticated hosting service, if truly determined then an attacker will find any vulnerability you’ve failed to patch and use it to their advantage. New vulnerabilities [...]

By |Cybersecurity, General|Comments Off on Web Application Security Testing with Open Source ‘OWASP Zed Attack Proxy Project’

Cloud Private turn your data center into a cloud

IBM says it has just such an offering in IBM Cloud Private, a platform focused on assisting private data centers looking for a relatively simple way to move into the cloud. The idea is to offer a consistent way of managing your application stack, regardless of where they reside. IBM Cloud Private takes middleware and [...]

By |Uncategorized|Comments Off on Cloud Private turn your data center into a cloud

EndPoint Security – Rewriting the rules of patch management

In a world where seconds matter, the right endpoint solution can be the difference between a successful patch management strategy and one that leaves your organization at risk. Hackers are racing to exploit vulnerable computer systems before software vendors publish patches and you can apply them. When hackers win the race, you lose productivity and [...]

By |Cybersecurity, General, Uncategorized|Comments Off on EndPoint Security – Rewriting the rules of patch management
Go to Top