Cyber Security Awareness and Vulnerabilities Blog
Image

Sophos Alternative for UNIX Centralized Management for Antivirus: We're Here to Stay
Recently, Sophos announced that as of January 2020, management of their antivirus solution for UNIX via their centralized management console would no longer be supported. In reaction to this decision, we would like to take the time to reaffirm our commitment to maintaining support for UNIX cybersecurity. We’re dedicated to not only continuing service for these critical operating systems but releasing ongoing updates that will provide additional value and evolve with these technologies.
Image

Best Practices for Red Teams, Blue Teams, Purple Teams
Want to determine the safety of a car? Perform a crash test. One of the most common ways to test the strength of something, particularly when it comes to technology, is by putting it through a stress test. Naturally, this same principle is a critical component of cybersecurity. One of the most effective ways to try and find your security infrastructure’s weaknesses, and your security team’s ability to detect and respond to attacks, is through red team/blue team tests.
Image

One (Big) Way to Reduce Helpdesk Costs While Increasing Security
IT teams handle a great number of tasks that enable an organization to run smoothly. These include handling questions related to technical support for the company’s computer systems, software, and hardware, in addition to performing regular system updates and meeting periodic training needs. Yet research shows that helpdesks are also spending anywhere from 20-50 percent of their time dealing with password requests. Why are helpdesks so bogged down with password management tasks, and how can you free up their time while also prioritizing security?
Image

Diversionary Tactics: The Use of Ransomware as Misdirection
Companies today are seeing a disturbing trend when it comes to the most common attacks they are facing. Ransomware is on the rise and no OS is immune. In fact, most reports show that malware on Linux has tripled since 2015. According to the 2019 Malware Report from Cybersecurity Insiders, respondents ranging from technical executives to IT security practitioners from organizations of varying sizes, across multiple industries, offer clarity on what kinds of attacks their organizations are experiencing.
Image

What is Rubber Stamping and Why is it a Serious Cybersecurity Concern?
Bulk approvals of requests to have access to any of the various systems and assets quickly becomes a security concern. In order to avoid giving into the temptation to rush approvals of these requests without adequate review, organizations must first understand the damage that can result from overusing approvals, why it happens, and how this can be prevented.
Image

The Cybersecurity Dangers of the Dark Web and How to Protect Your Organization
Even as its top marketplace, Dream Market, prepares to close its doors, the dark web continues to thrive. In fact, Darkode, one of the most well-known hacking forums and black markets, has recently reopened. And what are some of the most common wares at these underground markets? Organizational data, and the tools needed to get more. As long as the dark web exists, organizations must learn more about the threat they pose, and how to protect themselves.
Image

Five Reasons You Need Identity Governance & Administration
Demands on organizations continue to intensify – the precarious balance of requests for more access with the need to be more secure is difficult to maintain. Additionally, all of this is to be achieved faster, with fewer resources. It is more important than ever for each organization to develop a strategy for managing and governing user access in an automated manner. A well-defined Identity Governance and Administration (IGA) program is becoming an increasingly critical piece of an organization’s security portfolio.
Image

Five Malicious Insider Threat Indicators and How to Mitigate the Risk
With the prevalence of cyber attacks from individuals and groups looking to exploit corporate vulnerabilities and sensitive information assets, companies sometimes overlook another common threat: their own employees. It’s incredibly disheartening to think of trusted current or former colleagues looking to exploit sensitive information for their own monetary gain, but it’s increasingly common. Luckily, there are some telltale signs of this malicious activity that can enable you to identify and rectify problems as quickly as possible using the strategies detailed.
Image

Six Stages of Penetration Testing
Through penetration testing, you can proactively identify the most exploitable security weaknesses before someone else does. However, there’s a lot more to it than the actual act of infiltration. Penetration testing is a thorough, well thought out project that consists of several phases. Read on to learn about what it takes to complete a successful pen test.
Staying Ahead of the Curve: Implementing Privileged Access Management Solutions
For the second year in a row, Privileged Access Management (PAM) is listed as a top security priority by Gartner. Despite being around for decades, PAM tools are becoming increasingly vital as organizations’ access privileges become more complex. In fact, experts predict that more than two thirds will implement PAM in their enterprise by 2020.
Cryptoviral Extortion: The Enduring Problem of Ransomware
In 1989, the first instance of ransomware was delivered to thousands of people on floppy disks and demanded that money be sent in the form of a cashier’s check or international money order to a P.O. box in Panama. These days, ransomware has become increasingly more streamlined. Just about anyone can purchase a ransomware strain off the dark web and deploy it without needing to be all that tech savvy. Additionally, using cryptocurrency like Bitcoin helps attackers stay anonymous and untraceable.
Image

Staying Accountable: A Sarbanes-Oxley (SOX) Overview and Compliance Checklist
Back in the late 90s and early 2000s, a number of instances of financial fraud were uncovered in large public corporations, leading to a growing feeling of distrust in the market. Back in 2001, for instance, a scandal surrounded the American energy company Enron when they were discovered to have used fraudulent accounting practices and loopholes to hide their losses in financial reports. This incident, along with numerous other scandals like it, prompted the creation of the Sarbanes-Oxley Act to provide more oversight.
Image

Penetration Testing: Breaking in to Keep Others Out
What is Penetration Testing?
Penetration testing is a direct test of an application, a device, a website, an organization, and even the people that work at an organization. It first involves attempting to identify and then attempting to exploit different security weaknesses that can be found in these various areas.
Image

Monitoring Application Security with SIEM
It always seems like the clichéd image of a security expert is them sitting in a dark room with upwards of four to six bright monitors displaying different complex tasks. Regardless of how many monitors they use, we know security teams are using just as many, if not more, complex tools. According to analyst firm EMA’s Security Megatrend Report, 75% of respondents use more than six consoles to do their jobs.
Image

Evaluating Security Information and Event Management: Eight Criteria for Choosing the Right SIEM Solution
Imagine if you had cuckoo clock, but instead of chiming at the top of the hour, it chimed after every minute. Not only would you be overwhelmed by noise, you’d also have a hard time figuring what time it was. This is increasingly the experience of IT Teams as they are inundated with syslog events, with no time to discern which alerts should take precedence over others.
Image

Top Content in Review: 2018's Most Read Cybersecurity Information by IT and Security Professionals
As each year draws to a close, the temptation is always to wipe the slate clean, put the past behind us, and have a fresh start come January. However, for most things, and particularly when it comes to cybersecurity, the best way to ensure a successful year ahead is to utilize what we learned over the past year as a foundation to build on.
Read on as we revisit pieces from the past year that will remain relevant into 2019 and beyond.
Image

Powertech Antivirus and ClamAV: A Detection Rate Comparison
Antivirus solutions are like a water filter for your IT environment – they catch impurities that can poison your system. This is what makes detection rates such an important consideration when Linux IT security professionals are choosing an antivirus solution. These ratings analyze not only how much an antivirus solution catches, but also what it catches.
Why Corporate Networks are Key Targets for Cryptojacking
It’s hard to escape hearing about cryptocurrency these days. But this new monetary system is not utilized by a large percent of the population, and is incredibly complex, so many of us are left to simply smile and nod when it’s brought up in conversation.
Image

A Precarious Balance: Privileged Users and the Cloud
Organizations face a unique balancing act when dealing with privileged users. On the one side, they require high level access in order to successfully do their jobs.
Image

Cloud Watching: Ensuring Security in Every Cloud Environment
Though the common vernacular is “The Cloud,” the truth is, there are multiple cloud environments and providers available to organizations looking to utilize this growing technology. Read on to learn about the different types of cloud environments, and the biggest security obstacle each presents.
Cloud Types
Terminology in cloud computing is growing almost as rapidly as the technology. The following list outlines the important differences between the most common types of cloud deployments:
Image

Three Signs You’ve Outgrown Password Vault
Privileged Account and Session Management (PASM) software, better known as password vaulting, is a type of Privileged Access Management (PAM) solution that helps organizations manage accounts by restricting root access to their environment. These solutions are invaluable for protecting data.
Image

A Case for PEDM
Privileged Account and Session Management (PASM) tools, better known as password vaulting, are a type of PAM solution that restricts user access to IT systems and protects an organization’s data. Some organizations implement password vaulting technology to get started with managing privilege. However, as an infrastructure becomes more multifaceted, additional solutions that utilize other access management strategies should be integrated to maintain speed and security.
Different Paths, Same Goal: Privileged Account and Session Management (PASM) and Privilege Elevation and Delegation Management (PEDM)
Acronyms abound when it comes to Privileged Access Management (PAM). PIM, PAM, PUM, and SUPM, to name a few. As PAM solutions have evolved, analyst firm Gartner has established two further classifications to highlight different approaches: Privileged Account and Session Management (PASM) and Privilege Elevation and Delegation Management (PEDM). PASM and PEDM are two categories of security tools that have distinct approaches in how they manage access.
Image

A Full Body Scan: Protect Your Organization with Endpoint Antivirus Software
With cyberattacks still on the rise, you can never be too careful when it comes to securing your company’s data and the systems that house it. The problem is, without advanced endpoint protection it can be hard to discover the malware, viruses, and worms that may be lurking not only on user workstations, but also in server environments.
Image

Endpoint Antivirus Software: What It Is, and Why You Need It
The threat landscape can be a frightening scene when you look at the malicious attacks and ransomware infiltrating organizations around the globe. The good news: Endpoint antivirus applications are making enormous strides in their ability to protect enterprise-level equipment and data from attack. The bad news: Many companies overlook the need to secure non-Windows infrastructure and focus their antivirus security efforts only on individual user workstations.