TechTarget

Insecure MongoDB configuration leads to boom in ransom attacks

Please see full article at:  http://searchsecurity.techtarget.com/news/450410798/Insecure-MongoDB-configuration-leads-to-boom-in-ransom-attacks

Read More
InfoSecurity Group

Researchers: Brace for a Major Cloud Provider Compromise

Please see full article at:  http://www.infosecurity-magazine.com/news/researchers-brace-for-a-major/

Read More
Dark Reading

DHS Designates Election Systems As Critical Infrastructure

Please see full article at:  http://www.darkreading.com/risk/dhs-designates-election-systems-as-critical-infrastructure/d/d-id/1327856?_mc=RSS_DR_EDT

Read More
Chicago Tribune

Norridge part of new Cook County cyberthreat grid

Please see full article at:  http://www.chicagotribune.com/suburbs/norridge/news/ct-nhh-cyber-security-plan-tl-0112-20170106-story.html

Read More
Cyber Defense Magazine

Mitigating Detection Gaps

Please see full article at:  http://www.cyberdefensemagazine.com/newsletters/november-2016/index.html#p=30

Read More
SC Magazine

After takedown, are Avalanche and its malware families buried?

Global authorities' takedown of Avalanche, a cybercriminal network whose malware and money laundering campaigns are estimated to have cost victims in over 180 countries hundreds of millions of dollars, was an achievement four years in the making – and yet the saga is far from over.International law enforcement agencies and...

Read More
IT Security Guru

Detection Gaps – An Inconvenient Truth

Corporate security teams face numerous challenges. They need to adapt to an increasing number of sophisticated attacks and at the same time, abide by strict business processes and controls. This can impede rapid adoption of new security solutions or changes to existing ones, with organisations cautious of updating these systems...

Read More
Risk Management

Terror Tech

Recent terrorist attacks both in the United States and abroad have underscored the need for tools and strategies that can anticipate and mitigate the dangers of terrorism—whether attacks occur on city streets, in workplaces, at social gatherings, or online in the form of cyberattacks on corporate or government...

Read More
eWeek

Anomali Debuts Free Tool for STIX/TAXII Threat Intelligence Feeds

Anomali's New STAXX cyber-threat intelligence offering aims to help fill the void left from the shutdown of the Soltra Edge software effort.Security firm Anomali announced on Nov. 21 the debut of its new free STAXX tool to receive threat intelligence feeds.In the world of threat feeds, STIX (Structured...

Read More
DARKReading

Surveys: Security Pros Overwhelmed, Not Communicating, Threat Intel Data

Two new surveys released in the last week revealed troubling but telling trends in enterprise security: 70 percent of infosec professionals are overwhelmed by the volume and complexity of threat intelligence data, according to a report from security vendor Anomali and the Ponemon Institute; a separate survey from consultancy BDO USA...

Read More