Sicherheit

Obfuscated Fileless Malware in Cyberattackers' Toolkits: A Closer Look

The latest from Mimecast Research Labs includes a malware technique never observed previously. Introduction Fileless malware has become an increasingly popular technique among cyberattackers because it reduces the defender’s ability to detect …

Lesen Sie mehr dazu
Sicherheit

Baltimore Ransomware Attack Highlights Vulnerabilities in Municipal IT Security

Resource-thin IT departments need a plan for cyber resilience. A high-profile ransomware attack against the government of a major American city has brought new light on an ongoing cybersecurity quandary: how can those with the least resources defend…

Lesen Sie mehr dazu
Sicherheit

Using Convenience and Simplicity to Win the Security Arms Race

How can we build smarter security systems? The arms race between attackers and defenders is constructive. It should lead to the detection of inefficient parts and production of more robust solutions help to improve systems. It is an unfortunate fact…

Lesen Sie mehr dazu
Sicherheit

What is the Current State of Email Security Globally?

Our third annual State of Email Security report is here. What is the current state of email security globally? Excellent question. The short answer, per the results of the Mimecast State of Email Security Report 2019 – is not good. Sorry to st…

Lesen Sie mehr dazu
Sicherheit

Every Organization Needs Safe Content

Content theft remains a huge problem for all organizations. It seems that the only thing scarier for a Chief Information Security Officer, IT security professional or Security Operations Center than a marathon of Freddy Kruger movies is the theft or…

Lesen Sie mehr dazu
Sicherheit

Nearly Half of All Breaches are on SMBs

Convince the cybersecurity skeptics with this and other data points. When you're making your case for cybersecurity solutions back to your business/finance colleagues at your small-to-medium sized organization, it's helpful to have cold, hard facts …

Lesen Sie mehr dazu
Sicherheit

How Much Can We Expect Cyber Breaches to Grow?

The more things change, the more they seem to stay the same. It seems that in cybersecurity, the more we attempt to stop or mitigate the damage of cybersecurity breaches, the more they occur. And why should we expect anything different when the rewa…

Lesen Sie mehr dazu
Sicherheit

Is Dynamic Analysis Enough to Stop Evasive Malware Attacks?

Malware authors are evolving as quickly as the AV and security vendors are. If you've been following industry news, you often hear about major malware infections and their impact, but rarely do you learn why these attacks were successful in the firs…

Lesen Sie mehr dazu
Sicherheit

Airline Breaches Abound

It may be safer to fly in an airplane than to book your travel. While there is a very remote chance you will come to harm while flying, it seems that based on the news lately you can come to cyber-theft harm just through booking your flights. Cyber…

Lesen Sie mehr dazu
Sicherheit

Securing the Department of Homeland Security Way

Learn how the DHS recommends you approach cybersecurity. Homeland security was not a thing much on the minds of anyone prior to Sept. 11, 2001. That changed with the successful terrorist attacks and shined a rather large spotlight on an ever-growing…

Lesen Sie mehr dazu
Archivierung

Compliance Supervision: More Than Checking a Box

Compliance supervision reviewers face big challenges. It doesn’t have to be so complicated. Compliance supervision is one of the most important areas of investment for archiving buyers today but is also unfortunately one of the stagnant areas …

Lesen Sie mehr dazu
Sicherheit

Threat Intelligence Best Practices for Lean IT Organizations: Part 2

Make your organization a harder target for adversaries to crack. Editor’s note: For cybersecurity professionals, threat intelligence isn’t just about reacting to indicators of compromise after they've already impacted an organization. In…

Lesen Sie mehr dazu
Sicherheit

Securing the NSA Way

What can you learn from NSA cybersecurity strategies? The United States National Security Agency originated as a unit to decipher coded communications in World War II and was officially formed as the NSA by President Harry S. Truman in 1952. Since …

Lesen Sie mehr dazu