Viewing cybersecurity incidents as normal accidents

As we continue on through National Cybersecurity Awareness Month (NCSAM), a time to focus on how cybersecurity is a shared responsibility that affects all Americans, one of the themes that I’ve been pondering is that of personal accountability. Years a… Continue reading Viewing cybersecurity incidents as normal accidents

New infosec products of the week: September 13, 2019

Awake Security enhances its platform with the ability to identify attackers based on their intent Awake Security introduced Adversarial Modeling, an industry-first capability that gives security teams an unparalleled ability to identify attackers based… Continue reading New infosec products of the week: September 13, 2019

Gigamon Application Metadata Intelligence delivers app visibility to an org’s tools ecosystem

Gigamon, the leader in network visibility and analytics for digital innovators, introduced Gigamon Application Metadata Intelligence (AMI), which delivers unprecedented application visibility to an organization’s tools ecosystem. Gigamon AMI provides o… Continue reading Gigamon Application Metadata Intelligence delivers app visibility to an org’s tools ecosystem

The pervasive use of second screens endangers corporate IT networks

Despite techies having argued for years that having a second computer screen is a great way to improve productivity in the workplace, a new study from Gigamon has revealed that many people today use their additional monitor to stream music and watch sp… Continue reading The pervasive use of second screens endangers corporate IT networks

Gigamon Application Intelligence to provide network visibility of the digital enterprise

Gigamon, the leading network visibility provider for the digital enterprise, introduced Gigamon Application Intelligence, which provides comprehensive visibility into the highly complex applications at the heart of digital transformations. As organizat… Continue reading Gigamon Application Intelligence to provide network visibility of the digital enterprise

You can’t fix what you can’t see: A new way of looking at network performance

Network performance, or the service quality of a business’ network, is critical to running a successful enterprise. Imagine the cost to an organization when the corporate network or the e-commerce site is down or experiencing unacceptable latency. Cust… Continue reading You can’t fix what you can’t see: A new way of looking at network performance

Norsk Hydro cyber attack: What happened?

“Hydro subject to cyber-attack,” warned Oslo-headquartered Norsk Hydro ASA, one of the world’s biggest aluminum producers, on Tuesday. “Hydro has isolated all plants and operations and is switching to manual operations and procedures … Continue reading Norsk Hydro cyber attack: What happened?

How malware traverses your network without you knowing about it

A research report has been released which, based on observed attack data over the second half of 2018 (2H 2018), reveals the command-and-control and lateral activities of three highest-volume malware, Emotet, LokiBot, and TrickBot. It also highlights e… Continue reading How malware traverses your network without you knowing about it

Is your organization ready for the data explosion?

“Data is the new oil” and its quantity is growing at an exponential rate, with IDC forecasting a 50-fold increase from 2010 to 2020. In fact, by 2020, it’s estimated that new information generated each second for every human being will approximate to 1… Continue reading Is your organization ready for the data explosion?

Adobe patches newly exploited Flash zero-day

Adobe has released an out-of-band security update for Flash Player that fixes two vulnerabilities, one of which is a zero-day (CVE-2018-15982) that has been spotted being exploited in the wild. About the vulnerability (CVE-2018-15982) CVE-2018-15982 is… Continue reading Adobe patches newly exploited Flash zero-day