Opinion stories - Page 126
A short history of the computer password
Mon, 15th May 2017
#
malware
#
cybersecurity
#
passwords
The concept of a password was developed so that users could only access their own specific files for their allotted four hours a week.
How to protect your organisation from WannaCry ransomware
Mon, 15th May 2017
#
malware
#
ransomware
#
ai security
Defend against the global WannaCry threat with robust cybersecurity measures and constant vigilance, says Carbon Black's team.
Big changes in the infosec landscape: Time to take note and take action
Mon, 15th May 2017
#
malware
#
breach prevention
#
cybersecurity
Do you like RDP? Good. So do attackers. Wait? What?! Yes, attackers love your weakly-defended RDP port as the payoff can be huge.
The rise of ransomware in Southeast Asia
Fri, 12th May 2017
#
malware
#
ddos
#
ransomware
It is likely that cybercriminals will target on internet of things (IOT) devices in technologically, advanced economies throughout Southeast Asia.
What we can learn from the Google Docs hack
Fri, 12th May 2017
#
malware
#
phishing
#
email security
Remember, don't be embarrassed about falling victim. The more we talk about how these things happen the better we will be.
The do's and don'ts of responding to ransomware
Thu, 11th May 2017
#
malware
#
ransomware
#
cybersecurity
Ransomware set to increase in volume and variety in 2017, but a smart incident response strategy can help prevent losses.
Fingerprint security & biometrics: Three major myths busted
Mon, 8th May 2017
#
malware
#
biometrics
#
cybersecurity
Contrary to what many people assume biometric readers aren't foolproof. They have their own set of unique vulnerabilities. Fingerprints can be stolen.
Firebox Cloud: Public cloud security for small and midsize businesses
Mon, 8th May 2017
#
malware
#
firewalls
#
network infrastructure
Small and midsize firms bolster cyber defences with Firebox Cloud, bringing enterprise-level security to the public cloud.
Fake Chrome extensions inject code into web pages
Tue, 2nd May 2017
#
malware
#
digital entertainment
#
cybersecurity
Recently, here at our research lab, we have seen an increase in the number of JS/Chromex.Submelius threats detected.
Carbon Black: How to set up a threat hunting program
Mon, 1st May 2017
#
endpoint protection
#
edr
#
threat intelligence
UK firms urged to proactively hunt cyber threats by mastering OS intricacies and tailoring threat hunting teams to bolster digital defences.
From raw data to actionable intelligence: The art and science of endpoint security
Fri, 28th Apr 2017
#
ai security
#
ai
#
microsoft
The endpoint is vulnerable. That's where many enterprise cyber breaches begin: An employee clicks on a phishing link and installs malware.
Young cybercriminals 'more motivated by peer respect than financial gain'
Thu, 27th Apr 2017
#
malware
#
ddos
#
cybersecurity
An increasing number of young cybercriminals are motivated by a sense of notoriety and popularity with their peers rather than financial gain.
Carbon Black asks: So what exactly is threat hunting?
Wed, 26th Apr 2017
#
malware
#
semiconductors
#
cybersecurity
Information security professionals used to put all of their chips towards incident prevention. This didn't work out very well.
Women in cybersecurity: Slowly but surely, change is coming
Mon, 24th Apr 2017
#
malware
#
cybersecurity
#
opinion
Strides in diversity: Women are breaking barriers in cybersecurity, shifting the industry's gender dynamic for the better.
Why stakeholder collaboration is key to your cloud success
Fri, 21st Apr 2017
#
devops
#
apm
#
cybersecurity
However, adoption of the cloud often starts with the infrastructure team and fails to bring other key teams along on the journey.
Around 17 million websites are already powered by WordPress - are they secure?
Thu, 20th Apr 2017
#
mfa
#
iam
#
cybersecurity
WordPress, the most popular and most used content management system, is also a great tool for businesses and individuals.
Zero day distributing FINSPY espionage malware and LATENTBOT malware
Tue, 18th Apr 2017
#
malware
#
breach prevention
#
cybersecurity
FireEye recently identified a vulnerability – CVE-2017-0199 – that allows a malicious actor to download and execute a Visual Basic script.
Don't buy the elixir of youth: Machine learning is not magic
Tue, 18th Apr 2017
#
malware
#
ai
#
cybersecurity
If someone told you they had a magic elixir that would heal all your illnesses or injuries, and make you young again, would you believe them?.
Making design thinking an 'always-on activity'
Wed, 12th Apr 2017
#
martech
#
assurity
#
opinion
When operated as a continuous routine process with your customers, design learning cycles will help inform your fundamental business strategy.
Strategy for cyber crime: own the routers, own the Internet
Mon, 10th Apr 2017
#
router
#
carbon black
#
opinion
Mobile devices & smart TVs controlled by cyber criminals make scary headlines. There's something scarier – the possibility that routers can be owned.