Securing Modern Assets in the Digital Transformation Age

By Cayla Baker Tom Parsons discusses digital transformation and its impact on Cyber Exposure. https://www.infosecurity-magazine.com/blogs/assets-digital-transformation-age/ Source:: Tenable News … [Read more...]

GFI OneGuard: The pocketknife of IT tools

Being a sysadmin is hard, we know that! And that is why we recently launched GFI OneGuard – one platform which integrates three solutions which are normally found as stand alone. The three services are: Asset discovery and management, antivirus and, patch management and deployment. This way, GFI OneGuard does away with all complexities of manual installation of components and services. With … [Read more...]

How to tell if your Mac is infected

There are a lot of reasons Mac users don’t sweat getting infected. One: They’ve got a built-in anti-malware system called XProtect that does a decent job of catching known malware. Two: Macs are not plagued by a high number of attacks. (Most cybercriminals are focused on infecting PCs.) And three: There’s just not a lot of Mac malware out there. Read more here … [Read more...]

A Call for Congress to Prioritize Modernizing Government Technology

By Jack Huffard While we've already seen Congress engage in fierce debates over fiscal year 2018 funding, it's important to remember that there are bipartisan issues on the table. Upgrading and modernizing government IT systems is one such area that deserves continued focus. That's why we were pleased to see the Senate pass the 2017 National Defense Authorization Act (NDAA) with the Modernizing … [Read more...]

Maintain Your &%$#* Systems! A Mantra for IT Professionals in the Wake of Equifax

By Amit Yoran Once again, we have a basic failure in cyber hygiene causing a massive data breach. This one affects potentially half of the U.S. population and compromises particularly sensitive personal information that can be used by criminals to wreak havoc on people's bank accounts, credit scores and identities. I'm referring, of course, to the Equifax breach. What I find particularly … [Read more...]

The New Era and Evolution of the Cyber Security Digital Inside Trader

By Joseph Carson The insider threat has been a major risk to all governments and organizations around the world for many years. High profile examples are numerous; Nick Leeson and the collapse of Barings bank, Jeffrey Skilling the former Enron President, to the more recent intelligence leaks from Bradley Manning, Edward Snowden and Reality Winner that disclosed sensitive information that was … [Read more...]

Stories from the Field: Port of New Orleans Streamlines Critical Data Protection

By Yadin Porter de León Organizations that are using legacy data protection models face serious challenges. Legacy systems are inefficient, and IT teams spend hours managing backups, often having to travel between locations to back up or retrieve data. And most legacy systems rely on local infrastructure that's vulnerable to natural disaster, making them less secure than today's cloud-based … [Read more...]

Should I deploy monitoring software on your servers?

By Casper Manes How do you monitor what goes on within your infrastructure? Do you gather logs, use SNMP, query WMI, or do you deploy agents that report in? Source:: GFI TalkTechToMe-All … [Read more...]

Most Companies Worldwide Fail to Measure Cybersecurity Effectiveness and Performance

By Joseph Carson More than half the 400 respondents in a survey from the Thycotic-issued study, “2017 State of Cybersecurity Metrics Report”, scored an F or a D grade after evaluating their organization's efforts to measure their cybersecurity investments and performance against best practices. 58% received an F or D grade Joseph Carson of Thycotic: “It's astonishing to have the results come in … [Read more...]

We Shouldn’t Always Need a “Business Case” to Do the Right Thing

I’ve been a consultant for almost 20 years, advising companies on complex challenges in ethics, risk, and responsibility. Each year several clients raise the same issue: the need to get buy-in from a skeptical senior executive in order to demonstrate a concrete benefit that will follow a proposed investment in an ethical business initiative or function. The executive needs a business case. And so … [Read more...]