Cybersecurity
Last year, over 420 million malware variants were discovered, over half a billion personal information records were lost to breaches and one zero-day vulnerability was discovered each week. It’s time to fight back!
Cybersecurity
Many organizations are quickly discovering that cyber threat hunting is the next step in the evolution of the modern Security Operations Center (SOC). But what is “hunting"? Sqrrl, a leader in big data analytics and cybersecurity, defines hunting as “the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.”
Cybersecurity, Uncategorized
The one-year anniversary of the OPM data breach has come and gone, yet the sensitive data of four million federal employees still remains unencrypted, reports FCW.
Cybersecurity, Uncategorized
We’re all familiar with the outcomes of cyberattacks – stolen personal information and identities, files and systems held hostage, and so on. But with the growth of the Internet of Things (IoT), the attack surface for potential cyberattacks is growing and the perpetrators are demonstrating increasingly hostile motives.
Cybersecurity, Uncategorized
Today, cybersecurity threats are growing in volume, sophistication, and persistence. That’s according to the findings of Symantec’s 2016 Internet Security Threat Report which draws on threat data from its Global Intelligence Network and monitoring activity in over 157 countries.