How firewall automation can help prevent breaches caused by wrong configurations

How firewall automation can help prevent breaches caused by wrong configurations

A majority of IT staffers polled by firewall management service FireMon said they still use manual processes to manage changes. Firewalls are a critical form…

View More How firewall automation can help prevent breaches caused by wrong configurations
Cybercriminals using Google Analytics to enhance phishing efforts

Cybercriminals using Google Analytics to enhance phishing efforts

A report from security firm Akamai found that hackers were using analytics services to optimize their phishing efforts. Cloud security firm Akamai released a new…

View More Cybercriminals using Google Analytics to enhance phishing efforts
University to Create New Cybersecurity Approach Inspired by the Human Body

University to Create New Cybersecurity Approach Inspired by the Human Body

Researchers at the University of Arizona are developing a fresh approach to cybersecurity modeled on the human central nervous system. The new method, which is…

View More University to Create New Cybersecurity Approach Inspired by the Human Body
IoT Botnets and DDoS Attacks: Architecting Against Disaster

IoT Botnets and DDoS Attacks: Architecting Against Disaster

Cybercriminals have many different ways of exploiting network vulnerabilities and weak spots in our cyber defenses. Considering that the number of devices we use on…

View More IoT Botnets and DDoS Attacks: Architecting Against Disaster
More than two million major cyberattacks hit globally last year

More than two million major cyberattacks hit globally last year

Last year saw more than two million major cyberattacks strike businesses across the world. The latest figures by the Internet Society’s Online Trust Alliance claim that these…

View More More than two million major cyberattacks hit globally last year
Vietnam Rises as Cyberthreat

Vietnam Rises as Cyberthreat

The country’s rapid economic growth and other factors are driving an increase in cybercrime and cyber espionage activity. Vietnam has rarely been associated with cybercrime…

View More Vietnam Rises as Cyberthreat
What’s Your Defense Strategy? Best Practices for Red Teams, Blue Teams, Purple Teams

What’s Your Defense Strategy? Best Practices for Red Teams, Blue Teams, Purple Teams

Want to determine the safety of a car? Perform a crash test. One of the most common ways to test the strength of something, particularly…

View More What’s Your Defense Strategy? Best Practices for Red Teams, Blue Teams, Purple Teams
How to implement and use the MITRE ATT&CK framework

How to implement and use the MITRE ATT&CK framework

Mitigating security vulnerabilities is difficult. Attackers need to exploit just one vulnerability to breach your network, but defenders have to secure everything. That’s why security…

View More How to implement and use the MITRE ATT&CK framework
Practical Ways to Reduce Ransomware Impact: Actions You Can Take Today

Practical Ways to Reduce Ransomware Impact: Actions You Can Take Today

During the past year, Cisco Security Incident Response Services has provided emergency incident response services for many customers dealing with incidents that sometimes become a…

View More Practical Ways to Reduce Ransomware Impact: Actions You Can Take Today
Singapore Responds to Recent Cybersecurity Attacks

Singapore Responds to Recent Cybersecurity Attacks

During a visit to San Francisco, Singapore foreign affairs minister Vivian Balakrishnan commented that the country cannot “go back to pen and paper. … If…

View More Singapore Responds to Recent Cybersecurity Attacks