SC Media

How the events of 2016 could shape the future of democratic elections

Travis Farral discusses the malicious activity that surrounded the US election, addressing Russian actors and examples of other Nation State hacking activity that enterprises can learn from.It's been hard to miss all of the rumours surrounding the recent US election, particularly the speculation surrounding Russia's involvement. Examples...

Read More

Anomali Announces Cybersecurity Updates, Phishing Protection

Anomali announced a host of new updates to its threat intelligence platform on Monday, including the addition of a detection service to halt damaging email-based phishing attacks. Previously known as ThreatStream, Anomali provides a suite of Software-as-a-Service (SaaS) solutions that aim to pinpoint threat indicators in real-time. Anomali unveiled...

Read More
Bank of England

Bank of England works with Anomali to improve threat intelligence capabilities

​The Bank of England FinTech Accelerator recently ran a proof of concept looking at innovative technologies that collect, integrate, hunt and investigate cyber security intelligence data. Following the successful completion of this proof of concept, the Bank has decided to continue to work with Anomali to monitor and mitigate efforts...

Read More
CSOOnline

Hacking the 2016 Election: A Timeline

History has yet to judge the 2016 presidential election, but from where we sit in the early days of 2017, it’s hard to imagine that it will ever be relegated to a footnote.From how spectacularly polling failed to predict the election’s outcome to how the election was...

Read More
InformationAge

Nation State hacking: a long history?

Among the many scandals that pervaded the US election, the notion of state sponsored hacking was a theme that dominated candidate rhetoric and media coverage the most.Volatility and uncertainty parallel an era of innovation and opportunity. The US election brought this strange reality that the world finds itself in,...

Read More
TechTarget

Insecure MongoDB configuration leads to boom in ransom attacks

Cybercriminals have found weaknesses in many MongoDB configurations that have opened the door to tens of thousands of ransom attacks.Niall Merrigan, security researcher and Microsoft developer based in Norway, has been tracking the MongoDB ransom incidents, and in one day, he saw the number of...

Read More
InfoSecurity Group

Researchers: Brace for a Major Cloud Provider Compromise

The balkanization of the internet and the movement of data to the cloud will define the 2017 cybersecurity landscape, according to researchers—and we should brace for a major compromise of a cloud provider.Cloud-based methods of persistence and compromise have been presented at many security conferences, including BlackHat and...

Read More
Dark Reading

DHS Designates Election Systems As Critical Infrastructure

The Department of Homeland Security has deemed the nation's voting system as part of its critical infrastructure, citing security reasons.The US Department of Homeland Security (DHS) has designated the nation's election system as part of its critical infrastructure, a status change it has been debating ...

Read More
Chicago Tribune

Norridge part of new Cook County cyberthreat grid

As essentially one person in charge of the village of Norridge's information technology department, Doug Strempek naturally has his limits on just how many projects he can take on.So when Cook County officials recently visited and put on a presentation about a new platform designed to support...

Read More
Cyber Defense Magazine

Mitigating Detection Gaps

Mitigating Detection Gaps Corporate Security teams are often governed by strict business processes and controls that can impede rapid adopti on of new security solutions or changes to existing ones. The result of stringent change controls can sometimes mean organizations are forced to put maximum reliance on their security solutions...

Read More