4 Important Azure IaaS features Webinar – Q & A Follow-Up

By Andy Syrewicze If you missed the webinar '4 Important Azure IaaS features', you can find the session recording along with the slide deck plus more questions answered here.Read the post here: 4 Important Azure IaaS features Webinar – Q & A Follow-Up Source:: altaro … [Read more...]

Top 5 privileged account security reports CISOs must have: What computers in Active Directory no longer exist?

By RJ Gazarek When you know which computers in Active Directory no longer exist or have been decommissioned, you can quickly take action to protect your organization from the multitude of risks presented by unknown or unmanaged systems and accounts. Hackers target your privileged account credentials for good reason. Once they gain access, they can escalate their privileges and move through your … [Read more...]

Bye, bye Petya! Decryptor for old versions released.

By Malwarebytes Labs Following the outbreak of the Petya-based malware in Ukraine, the author of the original version, Janus, decided to release his master key, probably closing the project. You can read the full story here. Based on the released key, we prepared a decryptor that is capable of unlocking all the legitimate versions of Petya (read more about identifying Petyas): Red Petya Green … [Read more...]

A week in security (July 17 – July 23)

By Malwarebytes Labs Over the last week, we have covered Play Protect, android's new security system and how the Dutch police ran Hansa Market after the take down of Alpha Bay, both major players on the Dark Web. We also provided some tips on how to stay cyber safe this summer. We also saw how the Terror exploit kit started dabbling in ad fraud, more specifically URL shortener fraud. And last … [Read more...]

Tenable Delivers Record Results in Q2 and the First Half of 2017

By Cayla Baker Explosive global demand fuels over 50 percent billings growth Tenable Network Security®, Inc., the Cyber Exposure company, today announced record second quarter results with over $50 million in billings, which represents over 50 percent growth year-over-year. Tenable's record results make it one of the world's largest and fastest-growing private cybersecurity companies and … [Read more...]

Advanced threat prevention with Malwarebytes Endpoint Protection

The most effective protection strategy starts with proactive prevention, but the best prevention approach won’t be found with a silver bullet. In fact, security experts advise against relying solely on a single technology or technique to protect business endpoints. Effective prevention requires a layered approach capable of addressing not only today’s threats, but preventing tomorrow’s as … [Read more...]

How to Deal with a Boss Who Stresses You Out

Discussions of leadership tend to focus on its positive outcomes, such as innovation, employee engagement or organizational performance. However, for the majority of employees, the leaders in their organizations are a source of stress rather than inspiration. Indeed, for every transformational leader and emotionally intelligent manager out there, there are dozens of toxic bosses, and they come in … [Read more...]

Cyber Exposure: The Next Frontier for Security

By Jennifer Johnson The stakes have never been higher when it comes to cybersecurity. Global cyber attacks such as the recent WannaCry ransomware attack is a sobering reminder that cybersecurity is the existential threat of this generation. A new report from Lloyd's of London estimates a serious cyber attack could cost the global economy more than $120 billion - as much as catastrophic natural … [Read more...]

Play Protect: Android’s new security system is now available

By Malwarebytes Labs Play Protect, a security suite for Android devices, was originally introduced in mid-May of this year during the Google I/O conference. And in just a couple of months, the tech giant has made it available for all their mobile users. Play Protect is the amalgamation of Google's Android security features, such as Verify Apps and Bouncer, and it's integrated into the Google … [Read more...]

Black Hat Sneak Preview: New Vulnerabilities Exposed in Docker Hub

By Anthony Bettini Community ecosystems with vibrant member support have been the catalyst for faster innovation and shorter software development lifecycles in DevOps. Whether it is downloading code or contributing back to the community, organizations today rely heavily on open source software to drive their business. In fact, modern application development is more about assembling existing … [Read more...]