THE ENTERPRISE IS BLOATED WITH CYBERSECURITY JUNK FOOD Over the last decade, adversaries have been quite artful in managing to steal from the enterprise, mostly by compromising its poorly protected endpoints. Year after year, the adversaries and defenders add new tools and practices to their craft. The adversary simply discards one thing when something better […]
Read More ›The Meltdown and Spectre vulnerabilities in Intel and other CPU’s are most disturbing because these exist beneath the reach of software-based cyber controls to explicitly intervene. To mitigate risks from the Meltdown and Spectre vulnerabilities in Intel and other CPU’s, AppGuard customers need not do anything other than implement operating system patches, as should be […]
Read More ›Through Partnership, Sheepdog will Offer its Physical Security Customers with Access to AppGuard Autonomous Endpoint Security, and AppGuard will provide its Customers with Access to Sheepdog’s Training NEW YORK, N.Y. –Dec. 19, 2017 – AppGuard, a global leader in endpoint and IoT security, today announced a partnership with Sheepdog Response, a military and counter terrorism training […]
Read More ›This week, researchers presented at Black Hat Europe in London information regarding an extremely dangerous new “fileless” attack vector that affects all Windows operating systems. The researchers observed that the attack bypasses many widely used endpoint security tools. AppGuard customers need NOT make any policy adjustments to mitigate risks from such attacks. AppGuard already blocks […]
Read More ›2016 was an alarming year for tallying increases in data breaches and analyzing the sophistication of cybersecurity attacks and threats. It is clear that companies and individuals are playing games of catch up from a growing array of cyber adversaries. The following links are compiled from recent statistics pulled from a variety of articles and […]
Read More ›Long said in movies and TV, it’s the bullet that you don’t see that kills you. This was true for Target in 2011 where they missed the alerts their tools generated. This has remained so for many others ever since. Pick an organization with 1000’s of employees. Look at the IT/Sec-Ops people as they really […]
Read More ›Introducing the Cyber Concepts Series The articles in this series are intended to be conceptual expositions on technical topics. Engineers and uber security analysts likely prefer far more nuanced details. The non-technical person will find these articles a bit of a stretch, straddling the fence between ‘too simple’ and ‘too much’. The ultimate purpose of […]
Read More ›Ransomware is the Clear and Present Danger Now Probabilities, preparedness, and potential impact mean that Ransomware reigns supreme amongst healthcare provider threats. If you can’t treat patients because you don’t have access to medical equipment, records, billing processes, scheduling, or vital 3rd party services, the impact is immediate, pervasive, urgent, and even life threatening, far […]
Read More ›While most people worry that the Equifax data breach will cause a spike in identity theft and other cyber fraud, maybe we should be more concerned if this does NOT happen. Articles about Equifax and the breach headlined periodicals not just in the trade rags but also in the mainstream. Such coverage surprises no one […]
Read More ›The Equifax breaches and subsequent firing of the CEO, CIO, and CISO are a giant canary in the enterprise world. Their failures are far from unique. Most organizations struggle with the same issues too. But after a breach has occurred, challenges get reported as failures in the periodicals. Caricatures of what did or didn’t happen […]
Read More ›