As Ben Johnson notes in his latest vlog, all members of your organization should understand they are part of the “defense.” That understanding may lead to a more effective hardening of the required systems, Ben says.
2015 Point-of-Sale Security Mid-Year Health Assessment: Budgets are on the Rise, but Where’s the Money Going?
Point-of-sale systems (POS) are in the crosshairs for the same reasons that certain operating systems and applications always seem to be targeted by hackers—they’re in widespread use, and their weaknesses are fairly well-known. According to World Bank estimates, there are… Read More
I often read articles about how ISIS is doing something entrepreneurial and how they are running their organization like American businesses with effective marketing techniques. I read that they are “brand-savvy” and “bottom-line aware.” They recruit talent with “Hollywood slickness,”… Read More
Dell SecureWorks, one of our MSSP partners, recently released details of an interesting piece of malware they call “Stegoloader.” What’s interesting is that this modular malware downloads its main module as a PNG graphic with the code hidden inside, and… Read More
“Hunting” is popping up as a common theme in conversations with security leaders. As Ben Johnson notes, these leaders should be letting their teams get creative when it comes to hunting threats.
(Editor’s note: This blog appears as part of the eBook, “Should You Buy Endpoint Security from a Network Security Vendor?” available here.) By David Monahan, Research Director, Security & Risk Management Enterprise Management Associates (EMA) As I was analyzing the Data-Driven Security Reloaded… Read More