Modern security is a myth

The trillion dollar myth of Endpoint Security

Thus far in our series we have reviewed a sophisticated ransomware utilizing stealth and lateral movement techniques, an infamous case of wiperware masquerading as ransomware spread by hacked nation-state tools and an ever-changing swiss army knife which exists as a tool run by one criminal organization offering services to many.   Today, in 2019, the[…]

scary kitty

Let’s dish about that ugly, nasty Scranos

No, not that guy! *Scranos*.     Scranos, the data-stealing malware which, according to ZDnet in an article dated June 13, 2019 claims, “…has returned with new attacks and nasty upgraded features”. It’s not quite as scary as a being capable of erasing half the population of earth, but you would not know that when reading[…]

Cyber-Security

Cyber Security – Information Security

Protect ourselves with cyber security is fundamental. In our organization, personal life, as well as in our schools. “Cyber security practitioners, perform job functions related to protecting and defending information systems. This is done by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.” CyberSec First Responders Certification Benjamin Franklin; “An ounce of prevention is worth a pound[…]

Application control, ransomware, computer security

Application Control – Prevent Ransomware

Begin protecting your computer today by using advanced application control. Given the volume of unknown malware, new variants, zero-day exploits, and hackers that are stealing and/or posting your data online, what good is any software that cannot stop the hack?  The second your data is stolen, you’re done!  There is no remediation.  Except to pay fines and eat the[…]

blacklisting castle-water-bridge

Critical Line of Defense

  Critical Line of Defense Understanding your layers of defense to protect against malware and breaches is mission critical for the entire organization today. Each layer has a function and purpose, and is meant to stop malware before it strikes. (To simplfy this discussion let’s leave out detection and remediation since that is really after a breach occurs,[…]