Sharing Information is Critical to Defending Against Cybersecurity Threats

In an effort to strengthen the ability to fight security breaks, is sharing cybersecurity information among enterprises and the federal government helpful? The short answer is yes. While The Cyber Information Sharing Act is flawed, it is necessary. The sharing of information to increase public and corporate awareness of cybersecurity threats and intelligence is a… Read more »

Encrypting Root EBS Volumes for AWS Deployments

Based on your organization’s security policy and compliance requirements, you may want or need to provide additional data encryption safeguards when deploying AlienVault® USM Appliance™ in a off-premises, hosted cloud computing environment. When you deploy USM Appliance on AWS, you can encrypt the Amazon EBS-based volume from which you launch USM Appliance instances. When you… Read more »

Department of Homeland Security Cybersecurity Awareness

Help Older Americans Protect Against Online Scams Americans young and old are using the Internet and mobile devices on a daily basis. Specifically, older Americans are increasingly utilizing mobile phones, tablets, and wearables to stay connected, informed, and involved with family and friends. This increased connectivity has many advantages, but it also presents a unique… Read more »

WannaCry Malware – The Tip of the Iceberg

Over the last 16 months we have been speaking and publishing research on the topic of Ransomware, Spear Phishing and Business Process and Email Compromise attacks and how these integrated cyber-attacks are becoming more targeted, planned and orchestrated. These methods are highly effective and are becoming pervasively used by the criminal underground within the dark… Read more »

Department of Homeland Security December Cybersecurity Update

Holiday Shopping Tips from STOP.THINK.CONNECT. Just like food and decorations, deep discounts and bargain prices have become a huge part of the holidays. As shoppers go online to find good deals, they are also exposing themselves to cyber criminals seeking to exploit the festive season. Scammers and spammers view the holidays as a golden opportunity… Read more »

2018 Cyber-Attack Trends and Industry Predictions

Over the last 24 months, we have spoken publicly about rapidly emerging cyber-attack trends and how to plan for and mitigate the impact of these attacks. Many of these predictions unfortunately have become a reality and are now being highlighted in other industry leader predictions for 2018, including the growth and evolution of Ransomware, the… Read more »

Are You Ready for the Next Disaster?

Lately the news has been rife with disasters: fires, floods, hurricanes, earthquakes and mudslides all within just the last few months. And then there is the looming threat of terrorist attacks including nuclear missiles from North Korea, not to mention a hardware failure of your critical server(s). Is your business ready to sustain any of… Read more »

On 5/12/2017, the world saw a massive cyber attack that spread globally in a matter of minutes.

On the heels of a huge breach of Google accounts worldwide, a massive ransomware attack named WannaCry is causing significant alarm. As we learned, the initial attack vector was through spam email, often under the guise of invoices, job offers and other lures sent to random email addresses. Within the email is a .zip file… Read more »

As cloud spending rises, here’s where to capitalize

Overall cloud spending is rising at break neck speeds, faster than expected, but what’s important is putting your money in the right area(s) Corporate spending on cloud computing is growing at an astronomical rate, according to a report from IHS Technology, reaching $235.1 billion in 2017, triple the $78.2 billion spent in 2011. Then there’s… Read more »

3 Security Questions You Need to Ask About the Cloud

When looking at Cloud Security you want to make sure that your data is protected, and that the risk of data loss is greatly mitigated. As you migrate more of your business’s data into the cloud your security concerns will continue to grow. Here are 3 questions to help you understand and solve these concerns: How… Read more »