So many times, I have seen security become an afterthought, rather than being an integral part of a design from the outset. Good security design is not always visible and therefore often not very well understood by the c-suite, who pile on the pressure to release systems or improve user freedom.
The much anticipated 2017 Data Breach Investigations Report from Verizon was launched this week and once again it highlights some interesting and concerning security trends.
The recent NCA report shows how easy it is for young people to slip down the path of cybercrime. The barrier to entry in the cyber crime market is at an all-time low with the tools needed to create new ransomware attacks available for free online. There are videos, tutorials, and blogs all detailing how to make money usually in the form of anonymous crypto currencies such as bitcoin.
I speak to many IT professionals who don’t have visibility over the endpoints and don’t really understand the day to day work behaviors of their staff. When asked to “secure the endpoint” by their management, there are many misconceptions about the effectiveness which naturally arise.
For nearly a decade, Avecto's customers have relied on Defendpoint to underpin "traditional AV", next generation AV, machine learning and advanced network-based analysis solutions. Despite notable advances, detection will never reach 100% efficacy.
It’s often said that you can either have security or you can have usability, but you can’t have both. Before I worked for a security company I believed this accepted wisdom without question – security was going to be something frustrating and annoying that would get added to my design at some point.
Over the course of 2016, McAfee has been progressing a story and supporting a technical strategy that addresses the challenges of a rapidly changing risk landscape. In recent years at McAfee’s annual security conference, FOCUS, we’ve seen Chris Young, Brian Dye and others mature a narrative that started with more integrated products, and then an integration framework with the Data Exchange Layer (DXL) and now a DXL that’s going to be released as open source.
Once again retailers are ramping up operations in time for the infamous Black Friday and Cyber Monday sales. Given the recent huge scale DDoS attacks powered by IOT devices under the control of the Mirai botnet retailers are taking many precautions to keep the transactions flowing during the sales. Unfortunately, just as the retailers are getting prepared so are the attackers, ready to seize any opportunity to steal user’s data or hold retailers to ransom.
Gartner recently published “The Real Value of a Non-Signature-Based Anti-Malware Solution to Your Organization” providing insight into how non-signature approaches to malware prevention can not only prevent attacks but offer reduced footprints on the endpoint. As you would expect Avecto are mentioned as one of the vendors in this space.
New and sophisticated security threats and cyber attacks such as zero-days, “phishing”, and advanced persistent threats are plaguing organizations the world over...