Cyber Security Awareness and Vulnerabilities Blog

Cryptoviral Extortion: The Enduring Problem of Ransomware

Mar 12, 2019
In 1989, the first instance of ransomware was delivered to thousands of people on floppy disks and demanded that money be sent in the form of a cashier’s check or international money order to a P.O. box in Panama. These days, ransomware has become increasingly more streamlined. Just about anyone can purchase a ransomware strain off the dark web and deploy it without needing to be all that tech savvy. Additionally, using cryptocurrency like Bitcoin helps attackers stay anonymous and untraceable.
Security Compliance

Staying Accountable: A Sarbanes-Oxley (SOX) Overview and Compliance Checklist

Mar 10, 2019
Back in the late 90s and early 2000s, a number of instances of financial fraud were uncovered in large public corporations, leading to a growing feeling of distrust in the market. Back in 2001, for instance, a scandal surrounded the American energy company Enron when they were discovered to have used fraudulent accounting practices and loopholes to hide their losses in financial reports. This incident, along with numerous other scandals like it, prompted the creation of the Sarbanes-Oxley Act to provide more oversight.                      
Fingers types with digital security icons

Penetration Testing: Breaking in to Keep Others Out

Mar 3, 2019
What is Penetration Testing? Penetration testing is a direct test of an application, a device, a website, an organization, and even the people that work at an organization. It first involves attempting to identify and then attempting to exploit different security weaknesses that can be found in these various areas.
Security Tips

Monitoring Application Security with SIEM

Feb 6, 2019
It always seems like the clichéd image of a security expert is them sitting in a dark room with upwards of four to six bright monitors displaying different complex tasks. Regardless of how many monitors they use, we know security teams are using just as many, if not more, complex tools. According to analyst firm EMA’s Security Megatrend Report, 75% of respondents use more than six consoles to do their jobs.
IT Security

Evaluating Security Information and Event Management: Eight Criteria for Choosing the Right SIEM Solution

Jan 23, 2019
Imagine if you had cuckoo clock, but instead of chiming at the top of the hour, it chimed after every minute. Not only would you be overwhelmed by noise, you’d also have a hard time figuring what time it was. This is increasingly the experience of IT Teams as they are inundated with syslog events, with no time to discern which alerts should take precedence over others.
Security Tips

Top Content in Review: 2018's Most Read Cybersecurity Information by IT and Security Professionals

Dec 26, 2018
As each year draws to a close, the temptation is always to wipe the slate clean, put the past behind us, and have a fresh start come January. However, for most things, and particularly when it comes to cybersecurity, the best way to ensure a successful year ahead is to utilize what we learned over the past year as a foundation to build on. Read on as we revisit pieces from the past year that will remain relevant into 2019 and beyond.
Virus Protection

Powertech Antivirus and ClamAV: A Detection Rate Comparison

Dec 14, 2018
Antivirus solutions are like a water filter for your IT environment – they catch impurities that can poison your system. This is what makes detection rates such an important consideration when Linux IT security professionals are choosing an antivirus solution. These ratings analyze not only how much an antivirus solution catches, but also what it catches.

Why Corporate Networks are Key Targets for Cryptojacking

Dec 5, 2018
It’s hard to escape hearing about cryptocurrency these days. But this new monetary system is not utilized by a large percent of the population, and is incredibly complex, so many of us are left to simply smile and nod when it’s brought up in conversation.
Cloud Security

A Precarious Balance: Privileged Users and the Cloud

Nov 19, 2018
Organizations face a unique balancing act when dealing with privileged users. On the one side, they require high level access in order to successfully do their jobs.
Cloud Security

Cloud Watching: Ensuring Security in Every Cloud Environment

Nov 1, 2018
Though the common vernacular is “The Cloud,” the truth is, there are multiple cloud environments and providers available to organizations looking to utilize this growing technology. Read on to learn about the different types of cloud environments, and the biggest security obstacle each presents. Cloud Types Terminology in cloud computing is growing almost as rapidly as the technology. The following list outlines the important differences between the most common types of cloud deployments:
Cloud Security

The Shared Responsibility of Cloud Security

Oct 25, 2018
Even doubters now agree that the forecast of the future of cloud computing is sunnier than ever. As more and more people and organizations transition to cloud services, the question of how to keep the cloud secure becomes more important than ever. Though initially unclear, as the latest report from the Cloud Security Alliance (CSA) suggests, the agreement that cloud security is a shared responsibility between cloud providers and cloud users has now firmly taken hold. How those responsibilities shake out, however, is an ongoing conversation.
Computer keyboard with digital people icons

A Case for PEDM

Sep 24, 2018
Privileged Account and Session Management (PASM) tools, better known as password vaulting, are a type of PAM solution that restricts user access to IT systems and protects an organization’s data. Some organizations implement password vaulting technology to get started with managing privilege. However, as an infrastructure becomes more multifaceted, additional solutions that utilize other access management strategies should be integrated to maintain speed and security.
Typing on computer with security shield

Three Signs You’ve Outgrown Password Vault

Sep 24, 2018
Privileged Account and Session Management (PASM) software, better known as password vaulting, is a type of Privileged Access Management (PAM) solution that helps organizations manage accounts by restricting root access to their environment. These solutions are invaluable for protecting data.

Different Paths, Same Goal: Privileged Account and Session Management (PASM) and Privilege Elevation and Delegation Management (PEDM)

Sep 23, 2018
Acronyms abound when it comes to Privileged Access Management (PAM). PIM, PAM, PUM, and SUPM, to name a few. As PAM solutions have evolved, analyst firm Gartner has established two further classifications to highlight different approaches: Privileged Account and Session Management (PASM) and Privilege Elevation and Delegation Management (PEDM). PASM and PEDM are two categories of security tools that have distinct approaches in how they manage access.
Computer with ransomware

Endpoint Antivirus Software: What It Is, and Why You Need It

Sep 6, 2018
The threat landscape can be a frightening scene when you look at the malicious attacks and ransomware infiltrating organizations around the globe. The good news: Endpoint antivirus applications are making enormous strides in their ability to protect enterprise-level equipment and data from attack. The bad news: Many companies overlook the need to secure non-Windows infrastructure and focus their antivirus security efforts only on individual user workstations.
Virus Protection

A Full Body Scan: Protect Your Organization with Endpoint Antivirus Software

Sep 6, 2018
With cyberattacks still on the rise, you can never be too careful when it comes to securing your company’s data and the systems that house it. The problem is, without advanced endpoint protection it can be hard to discover the malware, viruses, and worms that may be lurking not only on user workstations, but also in server environments.
Digital lockpad inside circle

The Lifecycle of a Security Event

Aug 21, 2018
As a syslog server incessantly pings with every security notification, security teams can feel as though they are drowning in a sea of security warnings. Without a SIEM, it’s difficult to know which events are truly critical and which can be ignored. However, when a SIEM has been implemented, security teams get a much clearer picture of their environment’s security. There could truly be no threats, or multiple incidents may be occurring that simply have not yet affected performance.

The Six Ws of Granular Access Control

Jul 31, 2018
Security experts are in general agreement that passwords will simply no longer suffice when it comes to system security. As the numerous breaches within the past years have shown, it is too easy to crack passwords and gain access to all the data across entire systems. So, what can an organization do to better protect its systems? This is where granular access controls, a key feature in certain privileged access management solutions come in. 

Open Source SIEM vs. Enterprise-Level SIEM: Which Is Right for You?

Jul 25, 2018
Open source SIEM solutions provide basic functionality that can be great for smaller organizations that are just beginning to log and analyze their security event data. But over time, many IT pros find that open source SIEM software is too labor-intensive to be a viable option as the organization grows. In short, many organizations simply outgrow their open source solution.
Digital Key

What are the 3 Most Common Access Risks?

Jul 11, 2018
These days it seems like there are security solutions for almost everything except the one thing you can never fully secure: humans. But while you can’t control everything they open or click on, you can control their access to your sensitive data.
Data Security

Are Employees Undermining Your Data Breach Defenses from the Inside?

Jun 28, 2018
The annual Verizon Data Breach Report 2018 was released recently, and gives an independent, worldwide view of how market sectors are being attacked, scammed, spied on, and ransomed. 
Man looking at a computer

How to Solve the Top 3 Struggles of Identity Governance and Administration

Jun 27, 2018
Identity Governance and Administration (IGA) is a complex and growing, set of solutions that are put in place to help your organization stay compliant with government or industry regulations and, perhaps more importantly, help secure your organization. However, with every new solution, there are a host of new problems. In working with our IGA customers we keep seeing certain problems emerge so, in this blog, we will address the top three struggles of an IGA solution that we see most often.

How to Pen-Test with Core Impact

Jun 11, 2018
When conducting a penetration test, most testers will develop some type of process, and repeat that same process on every engagement. As I think through the basics of penetration testing, I believe that process can be broken up into six steps. Now, I’m not saying every tester follows every step or performs these steps in this exact order, however, this is a pretty good process to follow. Let’s take a closer look at each step.
Virus Protection

4 Reasons You Need Native Linux Virus Scanning

Jun 11, 2018
In today’s connected environments, Linux IT professionals can no longer claim that viruses are only a Windows threat. The biggest excuse people make for forgoing virus protection is that they scan their client PCs and therefore no virus would make it to the server. However, effective malware defense requires multiple layers. This brings us to the importance of native virus scanning. The following highlights the four main reasons security experts give for using antivirus software that runs natively on your Linux system.
Performance gears

Do I Need Identity Governance & Administration (IGA)?

May 30, 2018
Identity Governance & Administration (IGA) is commonly defined as 'the policy-based centralized orchestration of user identity management and access control.' Identity governance helps support overall IT security and regulatory compliance. Put into simpler terms, IGA means leveraging the most intelligent and efficient path to mitigating identity risk in your business.