The bane of all security teams is a false positive combined with little or no information to diagnose it. Even the simplest alert could require a time-consuming search through multiple systems, databases, logs, and reports just to get to the point where an analyst understands what (or what hasn’t) happened and then formulates a response.
Government employees are working to determine the source and severity of a cyberattack that forced most city servers offline. The city of Baltimore has been hit with a ransomware attack that forced the shutdown of most city servers as officials investigate the origin and severity of the campaign. Baltimore’s 911 and 311 systems were not
Intellectual property and personally identifiable information tie for the type of data IT practitioners are worried about losing. Today’s IT and security pros are no strangers to data theft: 61% have experienced a data breach at their current company; 48% at a previous company. On average, each has dealt with six. Researchers surveyed 700 IT
My first post in this series on wired networking explored why open wired ports are a security risk that’s been overlooked for too long and why port-based security is no longer enough. In this second post, I present why organizations must implement stronger pre-connect controls and segmentation on the wired network to mitigate the risk of insider
Most organizations lock down Wi-Fi access but rely on physical security and static segmentation as the primary defensive technique for the wired network. This blog is the first in a 3-part series that explores why this practice is commonplace today, the risks of this approach, and what alternatives exist. Let me start by telling you
When it comes to network security, the definition of those responsibilities has greatly evolved, just as the capabilities of networking have evolved. Think of the past environments you have worked in, going back as far as your token ring or dial-up days. Then fast forward to modern data centers, littered with fiber connections and traffic
When there’s a DDoS attack against your voice network, are you ready to fight against it? An estimated 240 million calls are made to 911 in the US each year. With the US population estimated at more than 328 million people as of November 2018, this means each US resident makes, on average, more than
Barrett Lyon is co-founder of Netography, which emerged today with $2.6M in seed funding from Andreessen Horowitz. Netography, a new autonomous network security platform, today emerged with $2.6 million in seed funding from Andreessen Horowitz. The startup aims to leverage real-time data from network devices to help security and network teams automatically block malicious traffic.
The 16-year-old made off with 90 gigs of sensitive data. An Australian teenager hacked into Apple’s enterprise computer network, making off with 90 gigabytes of data before being discovered. He also accessed an undisclosed number of customer accounts during his year-long intrusion. According to reports – by Reuters and Melbourne, Australia-based newspaper The Age, citing court
Because you can’t hack back without breaking the law, these tactics will frustrate, deceive, and annoy intruders instead. 1 of 7 When you see an attacker on your network, it’s understandable to want to give them a taste of their own medicine. But how can you effectively anger intruders when “hacking back” is illegal? In