Leveraging UEBA to Address Insider Threats

The rapid adoption of new digital networking strategies has utterly transformed how and where we conduct business. Digital Transformation (DX) is expanding the attack surface, and one of the biggest challenges is extending security to all the places and devices where applications, workflows, and critical data need to travel to Continue Reading

Update: Google and Microsoft Cases: Know Where Your Data Is!

All the way back in February (where has the time gone?) I posted a blog, Threats to your Data in the Trump Age, where I outlined possible threats to your data, including a recent ruling against Google and a Microsoft case that was still in the court system. In early Continue Reading

Don’t Get Hit by the Whaler’s Harpoon

What is Whaling? Chances are you’re familiar with the term Phishing, where scammers use social engineering tactics to get users to give up personal information such as financial data, Social Security numbers, or other highly confidential and valuable information. That email you received from the “IRS” asking for your Social Continue Reading

Tornado warning: Commingling of public and IoT clouds?

Clouds are tricky things. It’s hard to tell where the foundations of a cloud reside. You could point at the physical infrastructure. Some of the best side-channel attacks target hardware. There is the operating system that runs everything. And there is the middleware, billing, hypervisors, drivers and web front ends. Continue Reading

The Power of Virtual Cell Wi-Fi

Wireless access has not only revolutionized networks. It has profoundly changed our culture. It has transformed how and where we work, how we interact through social media, and how we stay connected with family and friends. The challenge we are now facing is Wi-Fi saturation. Given the number of connected Continue Reading

Q&A on Using a Real Time Sandbox to Thwart Packed Malware

There have been numerous cases recently where advanced malware has been linked to significant data breaches. Malware authors employ a variety of techniques to hide their malicious intent, including the use of packing utilities to create “packed malware.” Ladi Adefala, Senior Security Strategist at Fortinet, explains how a real time Continue Reading

Meet Jayasilen, Ambassador of the month | November 2016

Jayasilen, our Ambassador of Malaysia, is working in Kuala Lumpur for a nutritional supplements company, where he is in charge of the online business, through a store powered by PrestaShop. He is the proof that PrestaShop is easy to use and user-friendly, as him and his assistant don’t have an Continue Reading

The Challenge of E-Voting

Countries where open elections occur have often developed arcane rules and processes for casting, collecting, and tabulating votes, in part because counting and managing votes is so time-consuming. But also because different groups, especially those with power, have strongly vested interests not only in the outcome, but also in the Continue Reading

//Build 2016 container announcements: Hyper-V Containers and Windows 10 and PowerShell for Docker

//Build will always be a special place for Windows containers. This was the stage where last year we first showed the world a Windows Server container. So it’s fitting that back home at //Build this year we made two new announcements as part of our Friday session “Setting the Continue Reading

>