aidarrow-end-inversearrow-endWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareResources.iconsResources.iconsResources.iconsResources.iconsResources.iconsResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days
Date published
6/19/2017 7:51:45 AM
Contributor:
Andrew Avanessian

The culture shock (Part 2)

In part 1, I discussed the importance of understanding your company’s culture when embarking on a security project as this can be the key to success or failure. In this blog, I’ll take a closer look at the five key areas you should pay particular attention to.

Continue reading
Date published
9/28/2015 11:01:13 AM
Contributor:
Laura Butler

A coffee with Graham Cluley

Organizations, security professionals and vendors are in a constant battle to keep up with an evolving environment of advanced threats and malware strains. It seems as soon as we catch up with the cyber criminals, they shift up a gear. At the recent Gartner Security and Risk Management Summit in London, Avecto grabbed a coffee with the renowned security blogger and independent analyst, Graham Cluley, to take a pulse check of enterprise security.

Continue reading
Date published
8/18/2015 7:14:23 PM
Contributor:
James Maude

Fear and Loathing in Las Vegas - Advanced attacks and the InfoSec dream

During August members of the InfoSec community leave the comfort of their ergonomic desks and head out into the Nevada desert on a spiritual pilgrimage to Las Vegas. This mass movement is no coincidence, the draw is clear with Black Hat, DEF CON, BSides Vegas and the Star Trek Convention all occurring within a week. If you have an interest in offensive security, protecting data or ensuring your car cannot be remotely hijacked, Las Vegas is the place to be in August.

Continue reading
Date published
5/1/2015 7:31:36 AM
Contributor:
James Maude

File less fears

Since the popular Angler Exploit Kit started delivering Poweliks file less malware in late 2014 malware authors have been turning to this technique to bypass detection and infect systems.

Continue reading
Date published
4/27/2015 6:58:02 AM
Contributor:
Andrew Avanessian

Is InfoSec languishing in the dark ages?

Last week saw the start of RSA 2015, the annual gathering of security professionals and vendors from across the world in San Francisco. In the opening session, Amit Yoran, president of RSA, declared that InfoSec needed to escape the dark ages.

Continue reading
  1. 1
  2. 2