Archives of Cybersecurity

Why You Need a Web Application Firewall (WAF)

Hackers are getting control of web servers for different reasons, the main ones being the ability to control a server and spread malware.  Often, these two objectives go hand in hand. Why do hackers want to control a web server? Because a server is often hundreds of times more powerful than a workstation and that […]

Face it: Enterprise cyberattacks are going to happen

There are now so many cyberattacks that many enterprises simply accept that hackers and bad actors will find ways to break into their systems. A strategy some large businesses have developed over the past two years has been to quickly identify and isolate these attacks, possibly by shutting down part of a system or network […]

Cyber-Security Rundown

Learn about the basics of cyber-security and why it’s essential for all enterprises to have a secure cyber-security system.

Email Security that Meets Government Standards

Nation state actors, cyber criminals, hacktivists and other attackers continue to set their sights on government organizations. In 2017 alone, breaches were reported on the federal level at a major military branch, on the state level at a Division of Medicaid and Department of Motor Vehicles, and on the local level at a County Clerk’s […]

Email Security: A Buyer’s Guide

Today’s attackers seem to be using malicious emails more than anything else to infect their targets. Many of these sophisticated, malevolent messages trick users into clicking links, downloading attachments, sharing credentials or taking some action that activates ransomware, installs malware or gives cyber criminals access to business networks. Traditional signature-based and reputation-based defenses such as […]

The Power of Incident Response Technology

…incident response teams can deploy a mix of technologies to meet a customer’s investigative needs, and many of these same technologies have defensive capabilities that help protect the environment against additional attacks during the investigation. Read more about how incident response can help companies develop a quick reaction after a breach: https://www.fireeye.com/blog/products-and-services/2017/12/the-power-of-incident-response-technology.html