Information overload, SIEM version
It's been over a year since I last wrote about my security information and event management (SIEM) platform -- and a lot has happened since then. Back then, I wrote, "Now that my SIEM has been in...
View ArticleDiscovering a blind eye to vulnerabilities
Last week, I was horrified to discover a problem with my vulnerability scanner. The product I use relies on a user account to connect to our Microsoft Windows servers and workstations to check them for...
View ArticleData held hostage; backups to the rescue
Last year, I wrote about a ransomware infection that encrypted the hard drive of one of my company's employees. In that situation, a live, in-person scammer called the employee, claiming to be from...
View ArticleNetwork analysis is like turning over rocks
I just found out my company's employees have been finding ways to get around my Web filtering. And that came as a surprise, because I use a best-in-class product that employs a database to categorize...
View ArticleAssessing the value of cyber-insurance
I've ventured into new territory lately: cyber-insurance. Here's why.
View ArticleMilling with the hackers at Black Hat and Def Con
Attending both for the first time was a chance to compare and contrast.
View ArticleThe sharks of the Internet
That’s what hackers are — they should be feared, but our fears are completely out of proportion.
View ArticleMalvertising is a troubling trend
Malware that can infect a computer with no user interaction needed is certainly bad news.
View ArticleTrying to stay ahead of the bad guys
Even a security manager who has steered away from emerging technology has a change of heart when it becomes ever more difficult to keep up with the ways criminals can sneak into our systems.
View ArticleAs pre-IE11 support ends, scrambling for workarounds
For our security manager, the two big issues are the browsers his users employ, and the versions supported by the corporate website.
View ArticleA ray of hope in the fight against malvertising
A new service offers to keep all your Web browsing on its servers. It could be the answer, despite the risks of contracting with a startup.
View ArticleThe battle of the reboot
Patching has become routine, but patches don’t take without a reboot. That’s a problem when business units insist on zero downtime.
View ArticleSurprise! You have mystery PCs
Vulnerability scans uncover on the network unpatched, unprotected PCs that IT never even heard about.
View ArticleWhen Locky strikes
A friend’s company is hit with aggressive ransomware and calls our manager for advice.
View ArticleAs the phish, we all need to recognize the baited hook
Phishing scams aren’t going away, and the scammers are in fact getting more sophisticated. That means users have to be more cautious than ever.
View Article
More Pages to Explore .....