Ransomware: Just Say No to Stronger Scare Tactics
Blog Published: 10/04/2016
By Susan Richardson, Manager/Content Strategy, Code42Ah, those ingenious cyber criminals. They keep coming up with ever more frightening ransomware threats. JIGSAW warns victims it will delete files every hour until they pay $150 USD in bitcoins. Chimera threatens to publish the victim’s files...
HIPAA Violations Examples and Cases – Eight Cautionary Tales
Blog Published: 10/06/2016
By Ajmal Kohgadai, Product Marketing Manager, Skyhigh NetworksThe Health Insurance Portability and Accountability Act (HIPAA) helps protect patient privacy by requiring healthcare organizations and their business associates to protect sensitive data — including how the data is used and disclos...
Minister Denis Naughten to Address EU Security Directive at (ISC)2 Security Congress EMEA
Blog Published: 10/11/2016
Denis Naughten will address (ISC)2 Security Congress EMEA delegates on the latest developments in Ireland’s National Cyber Security Strategy since its launch in 2015, including the requirement to transpose the European Union Security of Network and Information Systems Directive (2016/1148) int...
Happy Birthday to… Wait, Who’s This Guy?
Blog Published: 10/11/2016
By Jacob Ansari, Manager, SchellmanHow many arbitrary people do you have to get into a room before two of them share the same birthday? Probability theory has considered this problem for so long that no one is quite certain who first posed the so-called “birthday problem” or “birthday paradox....
Five Prevention Tips and One Antidote for Ransomware
Blog Published: 10/25/2016
By Susan Richardson, Manager/Content Strategy, Code42During National Cyber Security Awareness Month, understanding the ins and outs of ransomware seems particularly important—given the scandalous growth of this malware. In this webinar on ransomware hosted by SC Magazine, guest speaker John Ki...
Everything You've Ever Posted Becomes Public from Tomorrow
Blog Published: 10/26/2016
By Avani Desai, Executive Vice President, Schellman & Co. As I sit here, ironically just wrapping up a privacy conference, scrolling my Facebook wall, I am seeing dozens of posts from smart, professional, aware people, all posting an apparent disclaimer to Facebook in an atte...
Defeating Insider Threats in the Cloud
Blog Published: 10/27/2016
By Evelyn de Souza, Data Privacy and Security Leader, Cisco Systems and Strategy Advisor, Cloud Security Alliance Everything we know about defeating the insider threat seems to not be solving the problem. In fact, evidence from the Deep, Dark and Open Web points to a greatly worsening probl...
To Include or Not to Include – Scoping ISO 27001 and Colocation Service Providers
Blog Published: 10/31/2016
By Ryan Mackie, Principal and ISO Certification Services Practice Director, SchellmanIntroductionISO 27001 North American GrowthISO/IEC 27001:2015 (ISO 27001) certification is becoming more of a conversation in most major businesses in the United States. To provide some depth, there was a 20% ...
The Dyn Outage and Mirai Botnet: Using Yesterday's Vulnerabilities to Attack Tomorrow's Devices Today
Blog Published: 11/02/2016
By Jacob Ansari, Manager, SchellmanOn Oct. 21, Dyn, a provider of domain name services (DNS), an essential function of the Internet that translates names like www.schellmanco.com to its numerical IP address, went offline after a significant distributed denial of service (DDoS) attack affected ...
Cyber Security Tip for CISOs: Beware of Security Fatigue
Blog Published: 11/04/2016
By Susan Richardson, Manager/Content Strategy, Code42What’s the most effective thing you can do for cyber security awareness? Stop talking about it, according to a new study that uncovered serious security fatigue among consumers. The National Institute of Standards and Technology study, publi...
Personalized Ransomware: Price Set by Your Ability to Pay
Blog Published: 11/11/2016
By Susan RichardsonSmart entrepreneurs have long employed differential pricing strategies to get more money from customers they think will pay a higher price. Cyber criminals have been doing the same thing on a small scale with ransomware: demanding a larger ransom from individuals or companie...
Fight Against Ransomware Takes to the Cloud
Blog Published: 11/14/2016
By Raj Samani, EMEA CTO, Intel Security“How many visitors do you expect to access the No More Ransom Portal?”This was the simple question asked prior to this law enforcement (Europol’s European Cybercrime Centre, Dutch Police) and private industry (Kaspersky Lab, Intel Security) portal going l...
Container Sprawl: The Next Great Security Challenge
Blog Published: 11/18/2016
By Jon King, Security Technologist and Principal Engineer, Intel SecurityAnd you thought virtualization was tough on security …Containers, the younger and smaller siblings of virtualization, are more active and growing faster than a litter of puppies. Recent stats for one vendor show container...
Evolving Threats Compel an About-face in Data Protection Strategy
Blog Published: 11/21/2016
By Vijay Ramanathan, Vice President of Product Management, Code42It’s time to flip our thinking about enterprise information security. For a long time, the starting point of our tech stacks has been the network. We employ a whole series of solutions on servers and networks—from monitoring and...
Out of the Shadows
Blog Published: 11/23/2016
By Patty Hatter, Vice President and General Manager, Intel Security Group Professional ServicesHow to Bring Cloud Usage into the LightOn any given day – with a quick spot-check – you’ll probably find that up to half of your company’s IT usage is basically hidden in the shadows of various busin...
One Day Is a Lifetime in Container Years
Blog Published: 11/30/2016
By Jon King, Security Technologist and Principal Engineer, Intel Security Securing virtual assets that appear and disappear. The average life span of a container is short and getting shorter. While some organizations use containers as replacements for virtual machines, many are using them incr...
Insurance Carrot Beats Government Stick in Quest for Stronger Cybersecurity
Blog Published: 12/02/2016
By Laurie Kumerow, Consultant, Code42When it comes to cybersecurity, the U.S. federal government recognizes the carrot is more effective than the stick. Instead of using regulations to increase data security and protect personal information within private organizations, the White House is enli...
DevOpsSec, SecDevOps, DevSecOps: What's in a Name?
Blog Published: 12/05/2016
By Jamie Tischart, CTO Cloud/SaaS, Intel SecurityThe world is awash in DevOps, but what does that really mean? Although DevOps can mean several things to different individuals and organizations, ultimately it is about the cultural and technical changes that occur to deliver cloud services in a...
IBM Touts Major Mac Cost Savings; IT Professionals Still Hesitant
Blog Published: 12/09/2016
By Lance Logan, Manager/Global Marketing Program, Code42For the second year in a row, IBM’s Fletcher Previn wowed the audience at the JAMF user conference with impressive statistics on how the company’s growing Mac-based workforce is delivering dramatic and measurable business value.IBM expect...
Standardizing Cloud Security with CSA STAR Certification
Blog Published: 12/14/2016
By Tolga Erbay, Senior Manager, Security Risk and Compliance, DropboxIn early 2014 Dropbox joined the Cloud Security Alliance (CSA). Working with the CSA is an important part of Dropbox’s commitment to security and transparency.In June of 2014 Dropbox achieved Level 1 Certification through STA...