<img height="1" width="1" alt="" style="display:none" src="https://www.facebook.com/tr?id=619966238105738&amp;ev=PixelInitialized">

enSilo’s Real-Time Data Protection Platform: Now for Mac OS X

It’s time for enSilo’s data protection platform for Mac OS X.

We’re increasingly seeing Mac OS X -based devices entering the workplace. Large development and financial shops - traditionally a Windows OS-based environment, have now got teams...

Cyber-Security in 120 Secs: Malwares, Healthcare Risks and More

In this week's news, an airport in Ukraine discovered a Remote Access Trojan (RAT) on an IT’s computer, Cisco released a report stating that security professionals were less confident in their security infrastructures in 2015 than in 2014,...

Cyber-Security in 120 Secs: 0-days, and a new RAT targeting APJ

 

Silverlight is deemed as being Microsoft’s first 2016 zero-day, TrendMicro’s AV grants any website command-line access, Cyber-espionage in Myanmar with Trochilus RAT, and survey says- over half of Europeans and American company respondents...

Infiltration by Design

Threat actors use several techniques against which we cannot prepare our defenses in advance. I tend to call these techniques “Infiltration by Design”, since attempting to ward off the threat actors using these techniques through...

Cyber-Security in 120 Secs: New Ransomware and Updates to BlackEnergy

It's the first week of 2016 and the industry has already witnessed three newly discovered ransomware and the continuous cyberespionage threat through malware that caused a power outage during Christmas.   

Highlighting the cyber-security...

Cyber Security 2016 Predictions: Amping the Traditional Cyber Kill Chain

I’ve been reading up a lot on 2016 predictions by analysts, peers and other vendors. While I agree with most of these predictions (moving towards a preventive approach, cyber-insurance guidelines will drive security initiatives, addressing...