Preparation Requires Prioritizing Threats

As the attack methods and strategies of our cyber adversaries continue to expand, organizations must stay ahead of those threats most likely to affect individual networks and connected resources. According to Fortinet’s most recent global Threat Landscape Report, not only are cybercriminals using new attack methods (even for older attacks), Continue Reading

Threat Intelligence and the Evolving Threat Landscape

As organizations continue to adopt and drive digital transformation (DX), staying ahead of the threat landscape and attack chain curves is becoming increasingly difficult to achieve. Today, rather than having a single network to secure, most organizations now own and manage a variety of environments, including physical networks, private cloud Continue Reading

MySQL Cluster Manager 1.4.4 released!

MySQL Cluster Manager 1.4.4 is now available for download from My Oracle Support. What’s new?With MCM 1.4.4 we continue to improve on MySQL Cluster Manager, specifically around: the collect logs command process status reporting process command execution in specific scenarios More detailsMore details are available in the MCM 1.4.4 Release Continue Reading

Adapting Network Security for DevOps in Financial Services

The financial services sector is expected to continue to deliver new, customer-driven and business-critical capabilities as they continue their transition to a digital business model. For example, customers have come to expect to be able to access and make changes to their financial information online and through mobile web applications. Continue Reading

IoT is the Weakest Link for Attacking the Cloud

As cloud-based services continue to increase in scope and scale, there isn’t a single organization that wouldn’t benefit in some way from the cloud. Indeed, with the promise of lowering OPEX, while reducing or even abolishing CAPEX, the cloud can enable an organization to better focus on its core business, which Continue Reading

Threat Intelligence Roundup September 09, 2016

This is our third week of the roundup, and things in the cyberthreat world continue to be interesting, including the return of several attacks we have seen for years. Here’s a quick summary of what happened this week. 1. It’s Still About Ransomware. While last week’s spike seems to have Continue Reading

Fake-Game: The Emergence of a Phishing-as-a-Service Platform

Malware-as-a-Service (MaaS) business models continue to thrive in the cyber underground. It has allowed cyber crooks to generate renewable income through renting malware rather than selling their tool for a one-time payment. As a result, the business model has been adopted in various underground commodities such as exploit kits and Continue Reading

>