All Security Operations
jake

Detecting IP spoofing with Plixer Scrutinizer and Endpoint Analytics

A common tactic for bad actors to get a foothold into the network is to leverage IP spoofing to either: Regardless of the intention,...

jeffmonaco

An “A-list” ransomware attack

How safe is your personal information? Well, several celebrity clients of a New York law firm have discovered that it’s only as safe as...

How to build data governance into your security strategy

How do you know who’s accessing your data? Do you know if your data has been copied to other locations? Have you put enough...

cybersecurity roundup Q

A “cursed” domain, a biodata bill of rights, and more: Q1 ’20 cybersecurity roundup

In our first roundup post of the decade, I’ve included interesting articles whose topics include hacking satellites, the difference in mindset between technologists and...

joanna

VPN security for a rapidly scaling remote workforce

We’ve all had days when we think to ourselves, “Man, I wish I could just work from home in my PJs.” Recently, as companies...

VPN malware protection

Almost every organization is equipped with VPNs to support a remote workforce these days. Often, secure VPNs use a no-split secure tunnel, tunneling all...

elgin eclectic society

The strategic approach to adtech monitoring

When exploring how digital advertising affects users on a daily basis, you may wonder what solutions are in place to monitor complex systems in...

traci

What you should know about Ryuk ransomware

Ryuk ransomware was discovered in August of 2018. Since then, over 100 US organizations have been affected. Knowing more about how Ryuk ransomware operates...