Category: News
Cofense Report: 90% of Verified Phish Found in Environments Using Email Gateways
By Kaustubh Jagtap Our recently released 2019 Phishing Threat and Malware Review highlights how perimeter protection technologies can’t stop all advanced phishing threats. Email gateways are a critical first line of defense, but as attackers3 Tips for Starting a Threat Hunting Program
Peter Silberman is the Director of Detection & Response, Innovation at Expel. Mary Singh is a Detection and Response Lead at Expel. So, you want to build a threat hunting program…but where do you start? There are lots of ways to build aThe Zombie Phish Is Back with a Vengeance
Keep a close on your inboxes—the Zombie Phish is back and it’s hitting hard. Last October, on the eve of Halloween, the CofenseTM Phishing Defense CenterTM reported on a new phishing threat dubbed the Zombie Phish. This phish spreads much like aKerbpurge – Group memebership without a reboot
KerbPurge - What is it?When you add a computer to a group in Active Directory, the computer does not know that it has been added to the group until a reboot happens. There are many obvious reasons why this is a problem. For example, youA few SQL Server Security Basics that every Database Admin should know
Too many data breaches are caused by poorly secured database servers. Microsoft SQL Server is a popular enterprise solution, but it is also complex to understand and configure. Here are 6 SQL Server security features that you should know to keepWhat is Data Exfiltration?
Data exfiltration is among organizations’ top concerns today: According to a recent study from McAfee, 61 percent of security professionals have experienced a data breach at their current companies. With stricter compliance regulations aroundKonferencija RISK dolazi u Bosnu i Hercegovinu 8. oktobra 2019
Rezervirajte datum, jer 8. oktobra 2019 kritičko prihvaćena informacijska konferencija RISK dolazi u hotel Hills Sarajevo. Upoznajte stručnjake iz sistemskih integratora, IT konsultante, državne institucije, telco provajdere, prodavače iHow Insiders Get Around Data Loss Prevention Solutions
Many organizations rely on data loss prevention (DLP) solutions to secure information, but data leaks still happen. That’s because legacy DLP solutions can’t always effectively monitor the digital activities of employees, privilegedThe top 10 cyber hygiene issues that lead to a breach: Part two — The perils of convenience
Spotting cyber hygiene issues caused by a lack of due diligence requires AI tools that alert on critical changes to network activity in real time.Welcome to the Age of the Investigations Platform
Remember when we used to believe we could prevent every attack? We focused on prevention, layering defenses so that if one layer failed another would be there to stop the attack. As the years passed, we realized that despite a defense-in-depthLoad More