Erkang Zheng is the CISO of LifeOmic and the General Manager of JupiterOne.
One of the key challenges facing growing cloud-native organizations is the ability to maintain your security and compliance posture despite your employees’ access to
SEON Ransomware ver 0.2 was found being distributed by the GreenFlash Sundown exploit kit via a drive-by-attack campaign. After performing the encryption, SEON will drop and display the following ransom note and append ‘.fixt’ as the extension
Today, 5G is around the corner and, in the foreseeable future, it will definitely bring more convenience to our lives. Higher rates of mobile terminals, more devices connected to the Internet of Things (IoT), more convenient remote services… All
Mitigation measures are implemented with many implicit assumptions. They can work only when these assumptions prove to be true and would be bypassed if these assumptions were broken.
During the R&D process, we should try to minimize
1.1 DDoS Size Expansion
IP data source: The Zettabyte Era: Trends and Analysis
The past decade has witnessed a steady growth in the peak size of DDoS attacks, especially in 2013 when the reflection method was used by attackers
Peter Silberman is the Director of Detection & Response, Innovation at Expel. Mary Singh is a Detection and Response Lead at Expel.
So, you want to build a threat hunting program…but where do you start?
There are lots of ways to build a
The Hillstone X10800 has been proved to be a successful platform. Today, we are excited to announce the release of the X9180 Data Center Firewall that shares the same innovative, fully distributed architecture as the X10800, with smaller form
Ryan Stolte is the co-founder and CTO for Bay Dynamics.
There are clearly many reasons why Endpoint Detection and Response (EDR) has materialized into such a hotbed of interest, investment and emerging best practices – endpoint security must