Blog

Bridging the Gap Between IT and Security Teams

Thoughts on how to increase cooperation between security and IT teams during incident response for a smoother workflow

Read more...

Casinos don’t gamble when it comes to security – why should you?

If you ever set foot in a Las Vegas casino, you’ve probably noticed the unbelievable amount of visible security. From security guards stationed throughout the casino, to the cameras in the...

Read more...

Time to say "Buh Bye" to post-mortem forensics

Sysinternals, sandboxes, EnCase, FTK, Sleuthkit, DFF, IEF, Wireshark, SIFT, CAINE, COFEE, Volatility, custom scripts in various languages, etc. If any of these names, terms and acronyms are...

Read more...

Reputation Intelligence Feeds – the best way to exhaust the SOC

Just like any good buzz term in the security industry, “Reputation Intelligence” spread like wildfire in our community. Many vendors offered a variety of reputation intelligence feeds like IPs,...

Read more...

Traditional EDR solutions are like treating cancer with Aspirin...here is why

"The era of Anti-Virus is over!" was probably the most common sentence uttered in the security world at the beginning of this decade. At the time, you couldn’t get away from terms like “APT” and...

Read more...

3 Questions about Oracle's breach that you are too afraid to ask

Point of Sale data breaches are one of the biggest sources of stolen payment cards for cybercriminals.  Attackers have honed their methods, paving the way for the mega-breaches of Target, Home...

Read more...

Five facts about ransomware that will make you think twice

As we all know, ransomware has quickly emerged as a very dangerous cyberthreat facing organizations worldwide and it has reached a new level of maturity in the past 12 months. Infection numbers...

Read more...

Blocking Satana ransomware with SECDO

Another day, another ransomware. The latest is now Satana and according to an article in PC World - attackers are developing an aggressive new ransomware program for Windows machines that encrypts...

Read more...

To Outsmart Bart (Ransomware), You Need to Be as Unpredictable as He Is

The new kid on the ransomware scene is Bart. Like its’ presumed namesake, Bart Simpson, Bart Ransomware doesn’t do what’s expected. Most ransomware families use cryptography (such as AES) to...

Read more...

Curated List of Security Resources

There is just so much noise (aka junk) on the web talking about the cybersecurity space. We thought it might be a good idea to share a curated list of industry resources from those that work in...

Read more...

Connect with us

Stay connected

whitepaper banner-280X233.png