Five Cyber Threats Every Security Leader Must Know About

Networks are evolving at an unprecedented rate. Physical and virtual environments, private and public clouds, and a growing array of IoT and endpoint devices are all dramatically expanding the potential attack surface. Protecting highly elastic network environments present cybersecurity leaders with a complex array of security challenges. In part, this Continue Reading

The Primary Factors Driving Cybersecurity Investments in Education

Today’s schools are technology-rich environments. For example, they have long used internal systems to keep and track a variety of records, including the personal data of their students and faculty. Today, however, that tech infrastructure must be optimized to accommodate the shift to a new digital education model. Teachers are Continue Reading

Malicious Macro Bypasses UAC to Elevate Privilege for Fareit Malware

To survive, Macro downloaders have to constantly develop new techniques for evading sandbox environments and anti-virus applications. Recently, Fortinet spotted a malicious document macro designed to bypass Microsoft Windows’ UAC security and execute Fareit, an information stealing malware, with high system privilege. SPAM This malicious document is distributed by a Continue Reading

Navigating the Grey Space of Cloud to Secure Your Enterprise

Managing network connections to hybrid cloud environments is a complex task- notwithstanding the sea of confusion over the hybrid cloud’s true definition. Paramount to the problem is securely optimizing transport and managing compute resources in geographically dispersed locations to ensure optimal application delivery and performance. While the industry debates the Continue Reading

Securing Business-to-Business Environments

Business to Business, or B2B networks are pervasive within Financial Services network environments. They are also highly vulnerable to attack.  One reason is that these networks are often woefully unprotected. Some organizations have implemented simple firewall capabilities into these B2B networks, and most have VPNs. But because performance is paramount, Continue Reading

>