Five steps to defend against a ransomware attack
Understanding what happens at each phase of a ransomware attack, and knowing the indicators of compromise [IOCs] to look for, increases the likelihood of being able to successfully defend against—or at least mitigate the effects of—an attack…
Read MoreJuly 11, 2016
LogRhythm opens regional Hq in Singapore to build on momentum
Security intelligence and analytics company LogRhythm has announced the opening of its new Asia Pacific and Japan (APJ) headquarters in Singapore to support a growing demand for security intelligence solutions. LogRhythm opened its first office in Singapore in 2014 and…
Read MoreJuly 6, 2016
Patient Zero
Ransomware had compromised the $5 billion health-care provider that operates 10 hospitals and more than 250 outpatient facilities in the Washington, D.C., region, serving thousands of patients and employing more than 30,000. While exact details were not released before Security…
Read MoreJuly 1, 2016
Mitigating the insider threat to your business
This year, we have seen a steady flow of high profile data breaches hitting the headlines. Whether the result of unknown web vulnerabilities, DDOS attacks or overall lax corporate data security policies, data breaches are becoming an everyday occurrence. In…
Read MoreJune 25, 2016
Next-generation SIEM turns low-level security monitoring for high-level business goals
Despite an initial rush to adopt security and information event management (SIEM) tools, complex implementations and a lack of skilled staff left many companies struggling to use SIEM effectively. That’s all set to change, however, as a new generation of…
Read MoreJune 16, 2016
Ransomware explosion is the latest security wakeup call for CxOs
The massive data breach of US retailer Target was a wakeup call for senior business executives too often disengaged with cybersecurity issues, but surging ransomware attacks are honing CxOs’ attention on the need for automated analytics tools to detect security…
Read MoreJune 16, 2016