Blog

3 Questions about Oracle's breach that you are too afraid to ask

Point of Sale data breaches are one of the biggest sources of stolen payment cards for cybercriminals.  Attackers have honed their methods, paving the way for the mega-breaches of Target, Home...

Read more...

Five facts about ransomware that will make you think twice

As we all know, ransomware has quickly emerged as a very dangerous cyberthreat facing organizations worldwide and it has reached a new level of maturity in the past 12 months. Infection numbers...

Read more...

Blocking Satana ransomware with SECDO

Another day, another ransomware. The latest is now Satana and according to an article in PC World - attackers are developing an aggressive new ransomware program for Windows machines that encrypts...

Read more...

To Outsmart Bart (Ransomware), You Need to Be as Unpredictable as He Is

The new kid on the ransomware scene is Bart. Like its’ presumed namesake, Bart Simpson, Bart Ransomware doesn’t do what’s expected. Most ransomware families use cryptography (such as AES) to...

Read more...

Curated List of Security Resources

There is just so much noise (aka junk) on the web talking about the cybersecurity space. We thought it might be a good idea to share a curated list of industry resources from those that work in...

Read more...

Break the IR Bottleneck

With all of the focus on threat detection technology, it’s not surprising that incident response, which is primarily handled by human experts, is becoming the new bottleneck. In his recent article...

Read more...

SECDO Musings RSA 2016 - Not Enough Talent, Too Many Alerts

The SECDO team just returned from the annual RSA conference in San Francisco and we wanted to share their thoughts on the event.

Read more...

MSSPs are Leading the Way on Advanced Threat Protection

Recent analysis from Frost & Sullivan estimates the North American MSSP (Managed Security Service Providers) market to reach $3.25 billion in 2018. More and more businesses are turning to MSSPs to...

Read more...

A Day in the Life of the SOC…. Then and Now

Once upon a time, life in the Security Operations Center was hard. Fortunately, times have changed.

Read more...

No Agent? No Detection and Response.

There are two main reasons why the Endpoint Detection and Response market is growing so rapidly. First, enterprises have come to understand that the conventional lines of defense they have...

Read more...

Connect with us

Stay connected

whitepaper banner-280X233.png