Beyond Ransomware: Four Threats Facing Companies Today

The recent DarkSide attack makes it clear: no system is safe from ransomware. And while the attackers say they weren’t out to hurt anyone, only to make money, the impact is the same. It could lead to potential disruptions of critical services across the country. At the same time, it stokes fears that similar attacks […]

The post Beyond Ransomware: Four Threats Facing Companies Today appeared first on Security Intelligence.

Continue reading Beyond Ransomware: Four Threats Facing Companies Today

New Video: MixMode Cyber Anomaly Detection Platform

We recently released a new video to better explain how MixMode’s next-generation cybersecurity anomaly detection platform combines the functionality of SIEM, NDR, NTA and UEBA for advanced threat detection, zero day attack identification, false positiv… Continue reading New Video: MixMode Cyber Anomaly Detection Platform

The Top 5 Considerations That Should Guide Your SOC Strategy in 2021 and Beyond

It’s evident that while organizations are spending more and more on legacy cybersecurity solutions, these platforms are not holding up their end of the deal and are not able to proactively defend in a modern, non-signature attack threatscape.
The post … Continue reading The Top 5 Considerations That Should Guide Your SOC Strategy in 2021 and Beyond

Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks

In our newest whitepaper, “Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks,” we dive into how traditional cybersecurity tools work, why this fundamentally limits them from being able to detect zero-day or pre… Continue reading Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks

A Modern SOC Should Not Be Entirely Dependent On Human Operators and Their Personal Experience

A modern SOC should not be entirely dependent on human operators and their personal experience. The issue has been a foundational problem with not only the methodologies used by SOCs for the past 15 to 20 years, but it should be questioned whether the … Continue reading A Modern SOC Should Not Be Entirely Dependent On Human Operators and Their Personal Experience

The Mobile Isolation Era Begins

Mobile Isolation from Menlo Security features Smart Document Object Model (DOM), a next-generation browser remoting technology designed to deliver a best-in-class browsing experience despite the unique challenges of the mobile environment and an e… Continue reading The Mobile Isolation Era Begins

Menlo Security Prevents Zero-Day Threat on Internet Explorer

The Still-Active Zero-Day Exploit Threatens the Frequently Vulnerable JavaScript Engine
Customers of Menlo Security using Internet Explorer (IE) are protected against a recent and still-active zero-day exploit using Internet Explorer, as outlined … Continue reading Menlo Security Prevents Zero-Day Threat on Internet Explorer

The Many Ways Your Employees Can Get Hacked While Working From Home and How to Respond

Although it is not surprising at all that hackers are taking advantage of the global pandemic —phishing threat reports are always highest when there is some natural disaster happening— we have never before had such an unsafe environment to … Continue reading The Many Ways Your Employees Can Get Hacked While Working From Home and How to Respond

The Big Switch: A Lack of Employable Security Professionals Causes Companies to Make the Switch to AI

For the past few years, a major problem has been mounting in the cybersecurity industry: a people shortage. Even before the outbreak of the current global pandemic, enterprises were hurting in the cybersecurity hiring department.  Companies are st… Continue reading The Big Switch: A Lack of Employable Security Professionals Causes Companies to Make the Switch to AI