#infosec | The Case of the Missing Data

The latest twist in the Equifax breach has serious implications for organizations. When the Equifax breach — one of the largest breaches of all time — went public nearly a year-and-a-half ago, it was widely assumed that the data had been stolen for nefarious financial purposes. But as the resulting frenzy…

read more

#infosec | A Metaphor for Today’s …

The Matrix ushered in a new generation of sci-fi movies and futuristic plotlines with a relentless, seemingly invulnerable set of villains. Twenty years later, that theme is all too familiar to security pros. It’s difficult to believe that The Matrix celebrated its 20th anniversary in March. It’s equally hard to…

read more

#infosec | 1 in 4 Workers Are Aware Of Security Guidelines

Even more are knowingly connecting to unsecure networks and sharing confidential information through collaboration platforms, according to Symphony Communication Services. An alarming percentage of workers are consciously avoiding IT guidelines for security, according to a new report from Symphony Communication Services. The report, released this morning, is based on a…

read more

#infosec | World Password Day or Groundhog Day?

Despite decades trying to fortify our passwords with bolt-on solutions, attackers have always found ways to defeat them. Here are four reasons why. Happy World Password Day! This year’s “Hallmark-Holiday-for-Password-Maintenance,” May 2, coincides with the commemoration of another event: the 40-year anniversary of then 16-year-old Kevin Mitnick’s infamous hack on…

read more

What 3 Powerful GoT Women Teach Us about …

Imagine Game of Thrones’ Daenerys Targaryen, Arya Stark, and Cersei Lannister on the front lines in the real-world battleground of enterprise security. Season 8 of the award-winning and critically acclaimed HBO Game of Thrones series ended a long, exciting saga spanning almost a decade, keeping viewers spellbound by the citizens…

read more

Nodersok malware delivery campaign relies on advanced techniques

Microsoft researchers observed a campaign delivering malware, dubbed Nodersok, relying on advanced techniques and elusive network infrastructure. Microsoft experts observed a malware campaign, tracked as Nodersok, relying on advanced techniques and elusive network infrastructure. Microsoft uncovered the campaign in mid-July when noticed patterns in the anomalous usage of MSHTA.exe. Nodersok…

read more

Insider Threats: An M&A Dealmaker’s Nightmare

Because data has never been more portable, taking it has never been easier. And that’s a huge problem during mergers and acquisitions. When it comes to insider threats, business and security leaders are facing a harsh reality. Last year, there were 50,000 mergers and acquisitions (M&A) transactions worldwide, with a…

read more