At the 2018 Gartner Security and Risk Management Summit in National Harbor, MD, privileged account management was named as the top project CISOs should have on their list this year.
With the release of Avecto Defendpoint v5.0 we have not only made implementation faster and easier with our Quick Start policy but also increased the security of our customer's endpoints as well. This security boost comes in the form of Trusted Application Protection (TAP), a new feature designed to neuter the common attack techniques that plague organisations today.
The popular PC cleanup tool, CCleaner has been hijacked by hackers in the latest widespread malware attack. The hack, identified by security researchers at Cisco Talos, found that anyone who downloaded or updated the CCleaner app between mid-August to mid-September also potentially downloaded malware without realising.
In part 1, I discussed the importance of understanding your company’s culture when embarking on a security project as this can be the key to success or failure. In this blog, I’ll take a closer look at the five key areas you should pay particular attention to.
Security researchers at enSilo recently released a novel code injection technique for Windows known as ‘Atom Bombing’. This is so called because it exploits Windows atom tables and Async procedure calls (APC) to evade detection by many common security solutions.
Last week marked an exciting new first – ransomware on a Mac disclosed by Palo Alto who had seen it with a client. What’s simultaneously encouraging and disappointing is that it could have been prevented without detection using highly recommended best practices – application whitelisting.
The issue of unquoted paths for services has been around for over 15 years. Despite this there is another potential privilege escalation with unquoted paths which doesn't get as much coverage, these are Scheduled Tasks.
Here at Avecto we believe that security products should be secure by design, meaning that they are designed from the ground up to be secure. A key principle is that you should be able to share details of the design without compromising its security, as opposed to security by obscurity, where you are reliant on keeping the solution secret to prevent a compromise.
With the arrival of Windows 10 in late July, businesses must once again pose many of the same questions that presented themselves at the time of the launch of Windows 8 in 2012, Windows 7 in 2009 and, for those with long enough memories, Windows XP in 2001.
Windows 7 Ultimate and Enterprise editions ship with AppLocker, which is a Group Policy based application control solution. AppLocker is a big improvement over Software Restriction Policies, as it provides a more flexible and intuitive solution to its predecessor. Here we discuss the pros and cons of Windows AppLocker.