2017 Security Trends

Enterprise Security In enterprise security investment, more emphasis has been put on post breach detection and incident response for this passing year. We will see this trend continue in 2017. Technologies in the area of breach detection, data leak protection, remediation, and so forth, are focusing on the full cyber kill chain rather than an…
by
The Characteristics of the Locky Ransomware Locky is a ransomware that is usually contained within a Microsoft Word document sent by email as an attachment – often as an invoice – to large numbers of recipients using a massive spam campaign. Locky has spread rapidly since its first appearance and has infected thousands of computers…
What is a web crawler? A web crawler (also called web spider, web robot) is typically a script or computer program that browses the targeted website in an orderly and automated manner. It is an important method for collecting information on the Internet and is a critical component of search engine technology. Most popular search…
RSA 2016 put out the slogan “Connect to Protect”. This is a rather naïve but very true statement. The world today is even more connected over the internet. It has not only changed how we live our lives but also how companies conduct business. However, this “CONNECT” part, gives those bad guys more opportunities to…
What a beautiful day it turned out to be in San Francisco. A bright and sunny day welcomed us on the first official day of the industry’s premier security conference. If you were at the Keynote speech, Attorney General Loretta Lynch brought it home – there is still a lot of opportunity for all of…