Uncategorized

February 13, 2018

Over the last couple of years, we have seen the emergence and rapid rise of ransomware as an extremely potent cyber attack. We have observed, and written about attacks like Bad Rabbit, NotPetya, and WannaCry. As businesses increasingly rely on digital systems, networks, and data for operations, the value of... Read More

January 31, 2018

The General Data Protection Regulation (GDPR) is around the corner. Here is what you need to know before the compliance deadline. 1. GDPR is a result of the European Commission's effort to revamp how businesses protect data in order to make Europe ready for the digital age. The exercise took... Read More

January 11, 2018

By Oleg Kolesnikov, Securonix Threat Research Team Introduction Securonix Threat Research Team (STR) has been actively investigating the details of the Spectre and Meltdown Side-Channel Information Disclosure Vulnerabilities since last week to help our customers mitigate/respond to the vulnerabilities. Below is a summary of what we currently know about the... Read More

October 05, 2017

Our society is blazing towards automating what seems like every aspect of our lives –self-driving cars, home automation, wearable devices, entertainment, medicine, manufacturing, finance/payments, energy – no industry has managed to remain untouched by internet-connected sensors and actuators. However, this explosive adoption of online devices has far-reaching implications for the... Read More

September 21, 2017

Authors: Securonix Labs Current State of Data and Threats Today, we see organizations face extraordinary challenges related to the safety of their information. With a majority of it stored and transferred in digital form, there is an important need to secure this data. Different types of stored data include personal... Read More

September 14, 2017

There is a lot of hype, confusion and misinformation regarding the use of machine learning, data sciences and AI for advanced threat detection. While it is true that many security solution vendors across the various disciplines of security have incorporated elements of data sciences for security detection, complete explanation, and... Read More

July 20, 2017

Written By David O'Hara, Security Engineer at Securonix Many organizations today are faced with a common challenge when handling potential threats within their environments, and that is the time to execute various security management steps from detection to resolution. The security management process in most organizations involves at least 3... Read More

June 24, 2017

Like it or not, your SIEM deployment is actually preventing you from succeeding in your daily cyber security battle. You adversaries are using techniques your SIEM can’t detect, across device types that SIEMs weren’t built to handle, and most importantly the greatest threat actor already has access to organizational IT... Read More