<img height="1" width="1" alt="" style="display:none" src="https://www.facebook.com/tr?id=619966238105738&amp;ev=PixelInitialized">

Predictions 2017: MSSPs Will Rule the Security Market

In 2017, we predict that the Managed Security Services Providers market will continue to grow as security vendors start to offer their own security services.

Predictions 2017: The All-in-One Combo – EDR and EPP

In 2017, we predict that customers will mandate the integration of both Endpoint Protection Platform (EPP) and Endpoint Detection and Response (EDR) capabilities into a single one-stop shop platform.

Predictions 2017: Goodbye Flash. Hello Jscript.

In 2017, we predict that as Flash phases out, JScript will take its place as the leading browser-exploitation vector.

Predictions 2017: Security Moves Down the Stack

In 2017, we predict that security – the good and the bad – will be moving down the stack.

Both sides — defense vs offense — are moving down the stack. On one side: the confidentiality, integrity and availability of data, operations and...

Predictions 2017: Targeted Ransomware

In 2017, we predict that ransomware authors will target mission-critical servers and PCs - within targeted departments.

By holding these sensitive devices hostage, ransomware authors will be applying the right pressure at the right time to...

Cyber-Security in 120 Secs: Ransomware Sends SF'ers on a Free Ride

This week, San Francisco's Transport System suffered from a ransomware attack that allowed riders to ride free on Saturday; Madison Square Garden Company began an investigation on a PoS malware that first infiltrated their merchandise/food...

Cyber-Security in 120 Secs: Cyber Monday Brings Security Concerns

As we near the holidays with Black Friday and Cyber Monday approaching, retailers should be prepared for an increase of malicious infiltrations; also with an increase of cyber attacks with IoT's devices, cybersecurity guru, Bruce Schneier...

Cyber-Security in 120 Secs: Cozy Bear & Fancy Bear Draw on Elections

This week, hacking groups were using post-U.S. presidential themes in their spear-phishing attacks; the Identity Theft Resource Center (ITRC) reports that there have been 858 data breaches recorded this year; another ransomware attack on a...

After the (Atom)Bombing

In late October enSilo researchers discovered a new code injection technique that leveraged atom tables – an underlying component of the Windows Operating System.

While code injection isn’t new, utilizing the atom tables in Windows is. The...

Cyber-Security in 120 Secs: Election Day Brings in Cyber Fears

This week all is being focused on the U.S. presidential elections with "unprecedented efforts" being made to protect any potential attacks on the voting system; Google disclosed a Windows exploit that highlighted the importance of...