CSO

What is the cyber kill chain? Why it’s not always the right approach to cyber attacks

As an infosec professional, you’ve likely heard about using a cyber kill chain, also known as a cyber attack lifecycle, to help identify and prevent intrusions. Attackers are evolving their methods, which might require that you look at the cyber kill chain differently. What follows is a recap of what the cyber kill chain approach

What is the cyber kill chain? Why it’s not always the right approach to cyber attacks Read More »

How AI can help you stay ahead of cybersecurity threats

Since the 2013 Target breach, it’s been clear that companies need to respond better to security alerts even as volumes have gone up. With this year’s fast-spreading ransomware attacks and ever-tightening compliance requirements, response must be much faster. Adding staff is tough with the cybersecurity hiring crunch, so companies are turning to machine learning and

How AI can help you stay ahead of cybersecurity threats Read More »

Unlimited DDoS protection the new norm after Cloudflare announcement

Late last month, global distributed denial of service (DDoS) protection provider Cloudflare announced that it would no longer charge customers extra when they were under attack. The company claims to have nearly 10 million customers and a presence in 117 cities around the world, with enough capacity to handle more than 15 terabits of traffic

Unlimited DDoS protection the new norm after Cloudflare announcement Read More »

The best enterprise antivirus: Kaspersky leads in latest tests

Ransomware and other threats often get through signature-based antivirus protection, giving it a bad rap. However, anti-virus tools still play an important role in the enterprise security strategy. Traditional signature-based anti-virus is notoriously bad at stopping newer threats such as zero-day malware and ransomware, but it still has a place in the enterprise, experts say,

The best enterprise antivirus: Kaspersky leads in latest tests Read More »

What is a fileless attack? How hackers invade systems without installing software

“We see it every day,” says Steven Lentz, CSO at Samsung Research America. “Something coming through, some exploit type, unknown ransomware. We’ve stopped several things with our defenses, either network-wise or at the end point.” The attacks that Lentz is worried about are fileless attacks, also known as zero-footprint attacks, macro, or non-malware attacks. These

What is a fileless attack? How hackers invade systems without installing software Read More »

Is universal end-to-end encrypted email possible (or even desirable)?

People expect their email to be private between them and the recipient, but in reality, the contents of your email are exposed during transmission. Full end-to-end encryption would  mean that only the receiver of the email can decrypt their messages, but sharing public keys and agreeing on a common encryption standard can be tricky for

Is universal end-to-end encrypted email possible (or even desirable)? Read More »