MY TAKE: How advanced automation of threat intel sharing has quickened incident response

Threat intelligence sharing is such a simple concept that holds so much promise for stopping threat actors in their tracks. So why hasn’t it made more of an impact stopping network breaches? Related: Ground zero for cybersecurity research Having … Continue reading MY TAKE: How advanced automation of threat intel sharing has quickened incident response

MY TAKE: Six-figure GDPR privacy fines reinforce business case for advanced SIEM, UEBA tools

Europe came down hard this summer on British Airways and Marriott for failing to safeguard their customers’ personal data. The EU slammed the UK airline with a $230 million fine, and then hammered the US hotel chain with a $125 million penalty &#… Continue reading MY TAKE: Six-figure GDPR privacy fines reinforce business case for advanced SIEM, UEBA tools

Internet Cookies: What Are They and Are They Good or Bad?

Cookies! I LOVE Cookies. Oatmeal raisin are one of my particular favorite flavors.
However, we’re not here to talk about baked goods as much as I’d love to. We’re here to talk about itty bitty little files stored on your local machin… Continue reading Internet Cookies: What Are They and Are They Good or Bad?

Sucuri Can Help Secure Your Client Websites

At Sucuri, we understand that most web professionals and web agencies ultimately need to make their clients part of the decision-making process for choosing to secure their sites.
Overall, website security sounds like a good thing, but how do you posi… Continue reading Sucuri Can Help Secure Your Client Websites

How to Create a Website Maintenance Plan & Contract

In my years of experience working alongside agencies, I’ve realized that managed providers and other web pros who offer website maintenance to their clients, have a hard time convincing them on the value of managed services.
It’s a common … Continue reading How to Create a Website Maintenance Plan & Contract

Reset Email Account Passwords after Website Infection: Follow Up

In a previous analysis of a malicious file, we demonstrated why you should always update your email account passwords after a security compromise.
The information security threat landscape is always changing. Likewise, the tools used by bad actors are… Continue reading Reset Email Account Passwords after Website Infection: Follow Up

Stolen Payment Data: Infected Ecommerce Website to Darknet Markets

The final actor of the stolen payment data supply chain is the end user. Rather than just selling or reselling payment data, the end user plans on fraudulently monetizing it.
This malicious end user typically buys payment data in limited quantities, s… Continue reading Stolen Payment Data: Infected Ecommerce Website to Darknet Markets