by Liora |
Jun 28, 2015 12:03:21 PM |
0 Comments
In an article for Bankingtech.com, Peter Cheney, the director of cybersecurity at independent global risk and strategic consulting firm Control Risks, has identified three essential questions that he believes enterprises must ask within the first 48 hours after a network breach:
read more
by Liora |
Jun 22, 2015 7:32:05 PM |
0 Comments
About 15 years ago, a game show took public humiliation to new heights (or depths, depending on one’s perspective) by branding unsuccessful contestants as the weakest link in the group. They were then ushered offstage to the tune of the most soul-crushing “goodbye” in television history by the host.
read more
by Liora |
Jun 22, 2015 7:31:32 PM |
0 Comments
A survey of 500 IT decision-makers in UK enterprises (250+ employees) has revealed that 54% lack the knowledge and capacity required to thwart sophisticated cyber attacks.
read more
by Liora |
Jun 10, 2015 2:36:06 PM |
0 Comments
An automated and independent malware testing service has taken a quick break from analyzing malware such as worms, information stealers, and rootkits so that it can crunch some numbers — and the news isn’t good for enterprises that rely exclusively on prevention-based security software packages.
read more
by Liora |
May 20, 2015 1:33:47 PM |
0 Comments
Today's enterprises still remain vulnerable to threats, in particular those companies relying on prevention-based perimeter...
read more
by Liora |
May 19, 2015 3:57:59 PM |
0 Comments
On-Demand Webinar
read more
by Liora |
May 4, 2015 5:00:51 PM |
0 Comments
Now Seculert researchers have discovered new changes that make Dyre more difficult to detect and analyze.
read more
by Liora |
May 4, 2015 2:59:28 PM |
0 Comments
Seculert research discovers that a new version of the financial malware Dyre is avoiding sandbox detection by counting the number of cores.
read more
by Liora |
May 4, 2015 2:58:21 PM |
0 Comments
A new variant of Dyre banking Trojan has emerged with a simple, yet efficient trick that prevents malware researchers from analyzing it.
read more
by Liora |
May 4, 2015 2:56:13 PM |
0 Comments
Core checker a defensive wrecker
read more