cybersecurity Tag

naughty list in behavioral analysis

14 Apr The Naughty List Is New Again

So Here's How to Pick the Better Behavioral Analysis Security Product . . . The security industry wants you to behave. That's apparently the latest hurdle to cybersecurity at the corporate level-- behaving. Now imagine a collapsed mother in near tears as kids knock over all the nice things that parents can't have and that's the security industry as a metaphor. Cybercriminals...

Read More
Computer mouse insecure with wireless

11 Apr Your Computer Mouse Can Betray You

We’ve known for a long time that except for the few devices using Bluetooth, the signals between your wireless computer mouse and your computer are not secure. But nobody seemed to really care about this vulnerability. This callous attitude probably stems because most assume, as I did, that the wireless range of a mouse and computer was so small that...

Read More
cybersecurity tools

30 Mar Good Tools Help Shortage of Cybersecurity Professionals

2015 has earned the dubious distinction of being the worst year ever for cybercrime, with nearly 1,000 major data breaches. Attacks included the theft of 21.5 million records from the federal government's OPM (Office of Personnel Management) and T-Mobile’s 15 million record data breach that exposed the names, addresses, and Social Security numbers of many of the company’s customers. To add...

Read More
breach

28 Mar Another breach — If It Can Happen to Verizon, It Can Happen To Anyone

Every year I anticipate the release of Verizon’s annual Data Breach Investigations Report. I’ve read it religiously for years. As a company that specializes in data breach security and helps countless organizations respond to and investigate security breaches, it’s ironic to say the least that Verizon just experienced a massive data breach of their own. Verizon recently reported that an attacker...

Read More
insider threats trend du jour

24 Mar Trend du jour: Insider threats — Are you next?

We've all heard that users can be a companies weakest link—whether deliberate or through negligence—employees (and ex-employees) are increasingly creating security risks within their organizations. With insider threats rapidly becoming the trend du jour—companies need to amp up vigilance. You also have to consider ex-insiders who may go rogue. In the recent Ofcom breach, an ex-employee went rogue and handed over approximately six...

Read More
cybersecurity wakeup call

23 Mar Need for Cybersecurity Accelerates

Many years ago when personal computers were just starting to emerge, I got a phone call from my brother. He’d just started a cybersecurity company—one of the first. “Come work for me, I need your help” he implored. It seems ridiculous now, but although I agreed, I remember thinking “OK, I can do that for a while, but it doesn’t...

Read More
Network World RSA

23 Feb Anticipating the RSA Security Conference

By Jon Oltsik. Skills shortage, security automation, cloud security, data security, endpoint security and security analytics top my list of priorities. Just a week to go before the biggest cybersecurity event of the year, the RSA Security Conference in San Francisco. Building upon industry momentum and the dangerous threat landscape, I expect a record-breaking crowd from the Moscone Center to Union Square. What will...

Read More
Fortscale Partners with FireEye's Cyber Security Coalition CSC

19 Feb Fortscale Partners with FireEye’s Cyber Security Coalition (CSC)

FireEye, a leader in stopping today's advanced cyber attacks recently announced Fortscale as a new technology partner to the FireEye Cyber Security Coalition (CSC). As part of participation in CSC, Fortscale User Behavior Analytics (UBE) has completed integrations with FireEye. This unique program allows FireEye to work with cybersecurity companies who have complementary technology and products to create integrated solutions that enhance the...

Read More