#BENVLOG: Hardening Systems with Appropriate Buy-In

By: June 25, 2015
benblog

As Ben Johnson notes in his latest vlog, all members of your organization should understand they are part of the “defense.” That understanding may lead to a more effective hardening of the required systems, Ben says.

2015 Point-of-Sale Security Mid-Year Health Assessment: Budgets are on the Rise, but Where’s the Money Going?

By: June 23, 2015
POS Banner

Point-of-sale systems (POS) are in the crosshairs for the same reasons that certain operating systems and applications always seem to be targeted by hackers—they’re in widespread use, and their weaknesses are fairly well-known. According to World Bank estimates, there are… Read More

As Hacking Evolves into a Business, So Should Your Perspective

By: June 22, 2015
bottomline

I often read articles about how ISIS is doing something entrepreneurial and how they are running their organization like American businesses with effective marketing techniques. I read that they are “brand-savvy” and “bottom-line aware.” They recruit talent with “Hollywood slickness,”… Read More

In a World of Unknown Bad, Recording and Denying are Critical

By: June 19, 2015
unknown

Dell SecureWorks, one of our MSSP partners, recently released details of an interesting piece of malware they call “Stegoloader.” What’s interesting is that this modular malware downloads its main module as a PNG graphic with the code hidden inside, and… Read More

#BENVLOG: With Threat Hunting, It’s Time to Get Creative

By: June 18, 2015
benblog

“Hunting” is popping up as a common theme in conversations with security leaders. As Ben Johnson notes, these leaders should be letting their teams get creative when it comes to hunting threats.

Risk Recon: Navigating Security and Risk

By: June 17, 2015
roads

(Editor’s note: This blog appears as part of the eBook, “Should You Buy Endpoint Security from a Network Security Vendor?” available here.) By David Monahan, Research Director, Security & Risk Management Enterprise Management Associates (EMA) As I was analyzing the Data-Driven Security Reloaded… Read More