Micro-segmentation is fast becoming a foundational layer of the security architecture for today's data center and cloud computing environments. It has seen a big push by a range of vendors as well as growing recommendations from leading analyst firms such as Gartner, ESG, and the 451 Group.
The idea of using network...
As of January 1, 2018, all SWIFT customers must self-attest to their compliance with the new SWIFT Customer Security Program (CSP). The program is designed to respond to the wave of cybercrime targeting SWIFT installations that began with the Bank of Bangladesh breach back in February 2016 and has swept across the...
How bad does a third-party fix have to be for Microsoft to issue a rare, weekend update that helps IT administrators disable it? A security update from Microsoft allows users to disable a faulty Intel firmware update that can lead to frequent rebooting as well as lost or corrupted data.
Many Malwarebytes users had a busy weekend after a software update led their Windows systems to experience "out of memory" errors, loss of internet access and, in some cases, crashing. The security firm has apologized and issued detailed instructions for reversing the problems and installing its fix.
Leading the latest edition of the ISMG Security Report: Ransomware crypto-locks customer data stored by a cloud-based service provider. Also, there's a move afoot to use blockchain technology to better protect people's personally identifiable information.
While many .gov domains have attempted DMARC, few have succeeded in using it to stop fraud. In fact, an exclusive analysis shows that 96 percent of government domains are easy to impersonate with fake emails that appear to come from their domains.
Download this whitepaper on DMARC and learn why:
Half of the...
People are always the weakest link in security, but the stakes are higher now because of the massive amounts of sensitive information accessible online and the determination of cyberattackers. The standard username/password approach is no longer enough.
Because of this, government agencies are starting to realize...
An analysis of the most popular 1 million global domains shows that most domain owners have not attempted to implement fraud protection through the latest and most complete form of protection, DMARC. Of those that have attempted DMARC, only 23 percent are actually achieving protection from fraud.
Despite DMARC's enormous advantages, an analysis has found that 77 percent of organizations that attempt to implement it aren't getting it right.
The vast majority of domains either had configuration errors or hadn't set it to enforce the whitelist. Large enterprises with big IT departments had approximately the...
The web may be largely funded thanks to online advertising, but the threat posted by malicious advertisements continues to escalate. Indeed, the latest malvertising scheme, uncovered by security firm Confiant, served 1 billion malicious advertisements.
Technology giants are still struggling to identify what's at risk from the Spectre and Meltdown flaws in modern CPUs, never mind getting working security updates into users' hands. In the meantime, expect a rush by researchers to find more flaws in microprocessor code.
DMARC enables companies to authenticate legitimate email, publish policies enforceable throughout the ecosystem, and gain intelligence on their email streams.
Download this DMARC fact sheet and learn how these benefits can be measured, resulting in:
326% average ROI;
$1.1m reduction in customer support...
What are the immediate tasks that federal agencies must undertake to comply with the new DHS directive Binding Operational Directive (BOD) 18-01?
Download this whitepaper and learn:
How and when to issue your agency plan of action;
Why there will be complexity with DMARC deployments;
How to get to DMARC reject.
The usual advice for major security flaws is to patch as quickly as possible. Now Intel is calling for a full stop due to imperfect patches for a trio of chip security vulnerabilities known as Meltdown and Spectre.
As the cybersecurity threat landscape evolved over the past two decades, firewalls grew increasingly ineffective at blocking attackers from accessing network data. Next-generation firewalls (NGFWs) aim to fill those gaps, but do they really provide an all-encompassing solution for network security?