Industries

19 10, 2016

Game of Thrones: Exploit Kit Edition

By |2017-11-14T11:24:07-07:00October 19th, 2016|Cybersecurity|

In the last few months, the exploit kit market experienced a major shake-up: the three major leading kits “died,” some in tragic circumstances (for their operators). This is big news, as exploit kits were responsible for most of the web-based cyberattacks in the last few years. Exploit Kits Origin Story Exploit kits are malicious software [...]

22 08, 2016

The NSA Hack and New Zero-Day Vulnerabilities: How Skybox Can Help

By |2017-11-14T11:37:31-07:00August 22nd, 2016|Cybersecurity|

‘Auction’ of NSA Tools Sends Security Companies Scrambling – New York Times, August 18, 2016 Recent news headlines described how zero-day vulnerabilities in network security equipment discovered by the NSA have been released by a hacker group. As if that wasn’t bad enough, here have been reports that this group plans to auction off the [...]

27 06, 2016

Ponemon Data Breach Study: Who has an extra $4M laying around?

By |2017-10-03T15:40:59-07:00June 27th, 2016|Cybersecurity|

According to the 2016 Cost of Data Breach Study put out by the Ponemon Institute (and in conjunction with IBM), the average cost of an enterprise data breach jumped up to $4 million. That’s a five percent bump over 2015, though the cost of data breaches hasn’t varied much since the study began in 2005. [...]

23 03, 2016

Gartner Defines New Technology Class for Security Operations, Analytics and Reporting

By |2017-10-12T11:18:30-07:00March 23rd, 2016|Cybersecurity|

As the attack surface has grown; so have the technologies built to tackle it. Unfortunately, the multitude of point solutions have in some ways complicated matters for security practitioners, creating segmented data that requires a great deal of time and resources to unite. And with networks and risks constantly in flux, all this work amounts [...]

12 02, 2016

Fostering a Security Ecosystem

By |2017-10-10T15:20:43-07:00February 12th, 2016|Cybersecurity|

In a recent blog post Throwing Down the Gauntlet for the Cyber Security Sector, BT Security’s General Manager Hugh Tatton-Brown urged industry leaders and BT partners to show how they’re answering the call for an “ecosystem” approach to cybersecurity challenges. Gauntlet: accepted. “While innovation is all around us … the problem is that they’ve been [...]

5 11, 2015

TalkTalk Hackers: The Young Face of Cyber Crime

By |2017-11-14T11:36:40-07:00November 5th, 2015|Cybersecurity|

Oh to be young. The teen years are filled with so many rites of passage—learning to drive, going to prom, braces: off, college search: on. But if sitting at your computer and testing the limits of the cyber world are more your style, seriously messing with an enterprise business or government organization is your golden [...]

20 10, 2015

Digital Disintegration: The end of the Internet as we know it

By |2017-11-13T16:03:24-07:00October 20th, 2015|Cybersecurity|

October marks cyber security awareness month. To the average citizen, that might mean updating those hastily created passwords (e.g., “password1”), updating their antivirus software, and not replying to Nigerian-prince related emails. But a broader understanding of cyber security and the inner workings of the digital world remain elusive to the general public. While high-profile breaches [...]