How to Combat Advanced Persistent Threats

Imagine the following Security Operations (SecOps) scenario. A large organization conducts regular audits of its security controls. It monitors a collection of intrusion detection appliances and [...]

Countermeasures for APT38

APT38 has hit the news wires on several different feeds, they outline what this group has done and how it was able to accomplish several multi million dollar heists, and continue to pose a threat [...]

Did you just create a paradise for hackers? – Part 2

Why Shadow IT is the oxygen supply for APTs & what can you do to cut it off? The Use Case of Reverse RDP This is the second post of the series highlighting real life APT attacks examples (you [...]

5 Steps to Protect Your Business During This Summer

Finally,  your much-deserved summer vacation is about to commence. You and your colleagues prepared your office for downtime,  managed last-minute tasks and set up your automatic reply. So, [...]

These are the 61 most innovative startups in the world

Innovation doesn’t just belong to Silicon Valley — it comes from everywhere. That’s the message from the World Economic Forum sent with its annual list of the most innovative [...]

page 1 of 2