Archives of Digital Security

Why You Need a Web Application Firewall (WAF)

Hackers are getting control of web servers for different reasons, the main ones being the ability to control a server and spread malware.  Often, these two objectives go hand in hand. Why do hackers want to control a web server? Because a server is often hundreds of times more powerful than a workstation and that […]

Face it: Enterprise cyberattacks are going to happen

There are now so many cyberattacks that many enterprises simply accept that hackers and bad actors will find ways to break into their systems. A strategy some large businesses have developed over the past two years has been to quickly identify and isolate these attacks, possibly by shutting down part of a system or network […]

Cyber-Security Rundown

Learn about the basics of cyber-security and why it’s essential for all enterprises to have a secure cyber-security system.

Email Security that Meets Government Standards

Nation state actors, cyber criminals, hacktivists and other attackers continue to set their sights on government organizations. In 2017 alone, breaches were reported on the federal level at a major military branch, on the state level at a Division of Medicaid and Department of Motor Vehicles, and on the local level at a County Clerk’s […]

Email Security: A Buyer’s Guide

Today’s attackers seem to be using malicious emails more than anything else to infect their targets. Many of these sophisticated, malevolent messages trick users into clicking links, downloading attachments, sharing credentials or taking some action that activates ransomware, installs malware or gives cyber criminals access to business networks. Traditional signature-based and reputation-based defenses such as […]

The Power of Incident Response Technology

…incident response teams can deploy a mix of technologies to meet a customer’s investigative needs, and many of these same technologies have defensive capabilities that help protect the environment against additional attacks during the investigation. Read more about how incident response can help companies develop a quick reaction after a breach: https://www.fireeye.com/blog/products-and-services/2017/12/the-power-of-incident-response-technology.html

The Need for Symb-IoT-ic Relationships Across IT and LoB teams in IoT and OT Security

Who is ultimately responsible for protecting Industrial Internet of Things (IIoT) and operational technology (OT) equipment as businesses rush toward digital transformation? All CxOs should be asking their internal teams who are responsible for IT and OT security the same question. Read about the breaches concerning IoT and the importance of cooperation when it comes […]

Cybersecurity is every IT leader’s job

October is National Cybersecurity Awareness Month, a campaign created by the U.S. Department of Homeland Security to reinforce the importance of Internet security. This year, we hardly need reminding. We have the history-making Equifax breach of late September to thank. The breach of the credit reporting company’s repositories compromised personal data of more than 145 million people, […]

The Security Mirage

The feeling of security and the reality of security don’t always match, says computer-security expert Bruce Schneier. In his talk, he explains why we spend billions addressing news story risks, like the “security theater” now playing at your local airport, while neglecting more probable risks — and how we can break this pattern.
  • 1
  • 2