In any cyber attack, the longer an attacker can remain undetected, the more pervasive, intrusive, and destructive they can be. So, the search is constantly on for new ways to compromise and takeRead More >>
Throughout the history of combat and military engagement, there are plenty of stories how a smaller force was able to overcome a larger force through the use of trickery and deception.Read More >>
During the last 12 hours, a new ransomware campaign is causing mayhem in what appears to be a one of the most catastrophic and aggressive ransomware attacks ever seen.
The ransomware is
The outbreak of WannaCry ransomware has caused enterprises to examine their approach to safeguarding endpoints. What controls could have dampened the worm’s propagation? What measures could
Caught in the middle of a malware outbreak without sufficient preventative mechanisms, how can the organization contain the malicious program, to give itself the opportunity to remediate theRead More >>
The WannaCry/WannaCrypt malware outbreak of May 12th presents a powerful opportunity to reflect upon the endpoint security architecture to understand the role of the various defense layers thatRead More >>