PRODUCTS

Cyber Security Elements by NSS

Uncategorized

Sophos. The security of machine learning

Artificial intelligence and machine learning are persistently in the headlines with rich debate over its next advances. Will cybercriminals further leverage machine learning to craft attacks? Can defenders build a machine learning model capable of detecting all malware? We believe machine learning is an essential and critical piece of cybersecurity, but it must be only […]

Sophos. The security of machine learning Read More »

CyberArk Docs: Privileged Access Security Documentation for All

Not long ago on the CyberArk Conjur blog, our DevOps community manager and evangelist John Walsh explored the history and evolution of open source software. It’s a great read that highlights the clear relationship between open source adoption and DevOps success in the enterprise, along with the power of community engagement and information sharing. We’ve

CyberArk Docs: Privileged Access Security Documentation for All Read More »

CyberArk. Where Security Accountability Stops and Starts in the Public Cloud

For years, security was cited as a prime reason not to put sensitive data or valuable workloads into the public cloud. It’s safe to say that situation has changed. In fact, the CyberArk Global Advanced Threat Landscape Report 2019: Focus on Cloud found that the vast majority (94 percent) of the 1,000 global organizations surveyed

CyberArk. Where Security Accountability Stops and Starts in the Public Cloud Read More »

CyberArk. Privileged Access Key to China’s Attack on Telecoms

The recent attack by China on Cellular companies – called Operation Soft Cell – is part of an espionage campaign that leverages privileged access in privileged accounts. Compromising credentials remains the weapon of choice for attackers and a top attack pattern. We first encountered this pattern when Edward Snowden revealed Operation Socialist, a CIA and

CyberArk. Privileged Access Key to China’s Attack on Telecoms Read More »

Sophos. 7 best practices for securing the public cloud

Given the simplicity and cost-effectiveness of the public cloud, it’s no surprise that more and more organizations are turning to Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). You can spin up a new instance in minutes, scale resources up and down whenever you need while only paying for what you use,

Sophos. 7 best practices for securing the public cloud Read More »

How Intercept X Advanced can help you avoid becoming a ransomware victim

Tourists aren’t the only ones looking at Florida this summer. As the Sunshine State ramps up to greet a flock of vacationers, it’s also facing some far less welcome visitors. Over the last few weeks, cybercriminals have targeted Florida with advanced ransomware attacks requesting heavy payments in return for restoring data. In one example, the

How Intercept X Advanced can help you avoid becoming a ransomware victim Read More »

Sophos Mobile Security earns full marks in AV-Test Android malware review

Since September 2014 (that makes 29 tests in a row!), Sophos Mobile Security has achieved the highest possible score in the AV-Test for Android malware detection, earning maximum scores across all categories. In the May test we scored 6.0 for protection – the highest possible score – and had no false positive detections. Our intuitive

Sophos Mobile Security earns full marks in AV-Test Android malware review Read More »