Blog

Faster Data Breach Investigation Equals Faster Incident Response

Here we go, again.  The recent Petya ransomware attack caught the EU off-guard and created chaos that rippled through organizations wide and far.  Luckily, it was not as severe as Wannacry, but it reinforces that companies are still not prepared to quickly identify and take the necessary response to get a suspected cyber-attack under control….

Read More

A New Twist on Data Privacy Regulations – Employee Data Rights

Where data privacy is concerned the main thrust of the discussion has been around the protection and consequence deriving from a breach of customer data. This is the topic that receives the most attention from the media, government and has the largest impact on a company’s bottom line.  However, there is another side of data…

Read More

The Role of a Channel Partner in Data Privacy Regulation Readiness

Channel partners fulfill a critical role for their customers by guiding them toward the best technology investment given their unique business needs.  Until now, the notion of data security was highly important but not viewed through the lens of meeting PII data privacy compliance requirements.  However, with the rise of conflicting US regulations between states…

Read More

Malware detection is simple, right?

  Wrong.  Day after day millions of computers are attacked by malware. As the number of malicious software attacks has been growing over years, the types of malware detection and antivirus solutions also grow. Yet, the attackers have the upperhand as there is no protection against zero-day attacks, or something which has just been invented….

Read More

Reap the benefits of IoT without Compromising SCADA security

Industry 4.0 is the term used to describe the fourth industrial revolution, which is the future of industrial production based on the “Internet of Things” (IoT).  As with all major transitions this leads to exciting opportunities, but also great challenges. The good news is that IoT is expected to offer advanced connectivity of devices, systems,…

Read More

A New Approach to Incident Response

Cyber threat forensic analysis isn’t complicated. Assuming you have the right solution in place.   Organizations are under intense pressure to do all they can to secure their organizations. Yet, until now, their approach to cyber security has been faulty. This is not necessarily their fault – the industry has been lacking proper solutions, which…

Read More

The Implications of WannaCry on Your Critical Data

WannaCry? Only if you lose your most critical data. Last week’s attack has many people wondering: DzI wanna know if my critical assets were exposed to threats.dz Ransomware is bad, but losing data can be far more costly. Unfortunately, WannaCry’s apparent success will only further embolden more cyber criminals. What’s interesting is that a decent…

Read More