+1-202-802-9399 U.S. Headquarters
Free Trial

Archive for the ‘Security’ Category

Shamoon Cyber Attack Reinforces the Need for Privileged Password Security

Friday, December 2nd, 2016

According to reports, the Shamoon malware contained embedded credentials that allowed the malware to move throughout the network and cause harm. The attack was likely initiated using a worm, which is how Shamoon operated historically. Propagation occurs by accessing shares in the network or through other remote access, using stolen credentials. The pattern of privileged […]

Thanks to IoT, the Internet is Entering the Wild West 3.0…

Wednesday, November 16th, 2016

By now last week’s historic Internet outage that shut down access to some of the most popular consumer websites—PayPal, Pinterest, Reddit, Spotify, the New York Times, Twitter among an estimated 1192 others—is old news. For anyone who isn’t up to date, it is believed that hackers leveraged tens of thousands of Internet of Things (IoT) […]

Cyber security Tips for Break Room and Board Room Business Leaders

Tuesday, October 11th, 2016

Everyone’s more familiar with cyber security than ever before as it’s now a frequent headline in the daily news and media. Every day we are updated about the latest cyber security breaches whether it’s Yahoo, Dropbox or LinkedIn, how many records have been stolen, or how much companies have paid in result from ransomware or […]

It Matters: The EU Gets It Right with its Network and Information Security (NIS) Directive

Friday, August 12th, 2016

Cyber security is one of the most pressing issues of our time, many consider it to be as big a threat to society as terrorism. When you take into account that a breach within critical sectors—  ranging from Energy– suppliers, operators, distributors, transmitters of oil and gas; to Transportation- airlines, airport managing bodies, rail transport […]

Could Pokémon Go be the largest surveillance app yet?

Tuesday, August 2nd, 2016

Access to location information, your camera, your photo’s and your email all in one simple app download. Computer Gaming has always been a way to lure people to downloading a so called free app which comes bundled with malware either to use your computer for malicious activity or to steal your data for cyber crime […]

The EU General Data Protection Regulation is finalized. What’s it all about?

Wednesday, May 4th, 2016

The new EU General Data Protection Regulation is something that has been going on for several years. It will replace what was previously the European General Data Protection directive from 1995. The idea was to build a consistent foundation across all European Union States so there’s a basic commonality or consistency between what happens with data […]

10 Must-Follow InfoSec Bloggers of 2015

Thursday, November 12th, 2015

Want to stay up to date on the latest information security trends, breaches, and discoveries? We searched across the deep web to find the top bloggers who live and breathe information security. It’s these amazing security experts who make your life easier by keeping you up to date on the latest InfoSec news and research. […]

Why you are being targeted by cyber criminals & 7 things you can do about it

Thursday, October 22nd, 2015

Imagine this. You’re a high ranking government officer on your way to classified meeting discussing extremely sensitive details for an operation you’re overseeing. Suddenly, you get an email in your personal account from a friendly colleague who is asking for the list of people that are attending a meeting next week. Without a second thought, […]

PRIVILEGED USERS AND DATA BREACHES: A MATCH MADE IN HEAVEN?

Tuesday, December 2nd, 2014

With data breaches on the rise, more evidence is constantly being discovered to support the link between privileged accounts in organizations and network breaches. Thycotic and IANS recently conducted a survey of 100 experienced security and IT operations professionals regarding their recent data breaches and privileged account misuse, and the results show there is indeed […]

Access Control: Models and Methods

Tuesday, November 4th, 2014

By: Stuart Gentry, an InfoSec Institute contributor and computer security enthusiast/researcher. There are times when people need access to information, such as documents, slides, etc., on a network drive but don’t have the appropriate level of access to read and/or modify the item. This can happen at the most inconvenient time and they would need […]

Secret Server is the enterprise password management software that IT Admins and Security Pros love!

Try it FREE for 30 Days