PRODUCTS

Cyber Security Elements by NSS

Uncategorized

CyberArk. Your Greatest Threat Might Already Be Inside Your Network

Insider activity—both malicious and simple error—accounts for a growing share of data breaches. Statistics are difficult to come by because requirements for reporting security incidents are not consistent across sectors. But some studies show they account for more than half of those breaches analyzed. According to the Protenus Breach Barometer for February, a monthly analysis […]

CyberArk. Your Greatest Threat Might Already Be Inside Your Network Read More »

Hunting Privileged Account Vulnerabilities with CyberArk Discovery & Audit (DNA)

It’s widely understood that cyber intruders and internal threat actors seek and exploit privileged accounts to help them achieve their goals. Security experts advise organizations to know what’s on their networks and know it better than any potential adversary. But discovering and locking down all of the privileged accounts within your enterprise is easier said

Hunting Privileged Account Vulnerabilities with CyberArk Discovery & Audit (DNA) Read More »

NSS, Sophos, Cyberark and Sealpath at the 7th Infocom Security Conference, 29-30 March 2017

For one more year, NSS has a strong presence at the 7th Infocom Security congress, along with Sophos, Cyberark and Sealpath. The conference will be held at the Divani Caravel on 29 and 30 of March and it is entitled “On the IT Roadmap – Expect the Unexpected”. The dynamic presence of NSS, Sophos, Cyberark

NSS, Sophos, Cyberark and Sealpath at the 7th Infocom Security Conference, 29-30 March 2017 Read More »

Sophos. Why you should put your staff to the test with phishing drills

When Sophos Phish Threat was released in January, we pointed out that: Email remains one of the most problematic sources of infection; and It’s the ordinary, well-meaning people who often let poisonous emails into their organizations. Phishing is an old problem, but news stories continue to show that people remain easy prey. New attacks, old

Sophos. Why you should put your staff to the test with phishing drills Read More »

Corero: If You Haven’t Already Been DDoS’ed, Assume You Will Be

It’s no secret these days that cyber threats are rampant and varied. Ransomware, malware and distributed denial of service (DDoS) attacks are not frequently mentioned in the mainstream press, but they are everyday news in technology and finance trade publications. Cyberattacks are an everyday occurrence for some companies, a rare occurrence for others. Some companies

Corero: If You Haven’t Already Been DDoS’ed, Assume You Will Be Read More »

Sophos. Anti-malware is imperfect but still necessary. Here’s why.

Doctors sometimes make mistakes that harm the patient. Police often fail to protect and serve. When that happens, people rightly demand the failures be analyzed and fixed. But no one ever calls for the elimination of all doctors and police. Why then, do some call for the end of antivirus and anti-malware when failures happen?

Sophos. Anti-malware is imperfect but still necessary. Here’s why. Read More »

Sophos Endpoint Exploit Prevention. Block Ransomware with the Power of Intercept X

The protection capabilities of Intercept X are now available to Endpoint Protection deployments managing their endpoint policy in Sophos Enterprise Console. Stop malware, prevent exploit vulnerabilities and get a deep clean on any potentially hidden malware using the Endpoint Exploit Prevention add-on. Highlights Stops crypto-ransomware and automatically rolls any impacted files back Exploit Prevention mitigates

Sophos Endpoint Exploit Prevention. Block Ransomware with the Power of Intercept X Read More »