PRODUCTS

Cyber Security Elements by NSS

Uncategorized

Trustwave. 5 Perfect Occasions to Carry Out a Proactive Threat Hunt

As organizations learn that sophisticated attackers are dwelling unnoticed on their networks for months – or even years – on end, you may be seeing the need to move beyond basic threat prevention and become more proactive in identifying and eradicating threats. With 83 days the median time between when attackers gain unauthorized access to […]

Trustwave. 5 Perfect Occasions to Carry Out a Proactive Threat Hunt Read More »

SC Labs awards Sophos XG Firewall five stars

SC Media recently reviewed XG Firewall and awarded it their top 5-star rating across all areas including features, documentation, performance, support, ease of use, and value. In the course of the review, they highlighted many of XG Firewall’s advantages over competing firewall products. The SC Labs Review team examined key areas of the product including

SC Labs awards Sophos XG Firewall five stars Read More »

Sophos. How Intercept X stops MegaCortex ransomware

This month, SophosLabs has been examining a new ransomware attack called MegaCortex that uses layers of automation, obfuscation, and a variety of other techniques to infect victims and spread throughout an environment without detection. Fortunately for Sophos customers, Intercept X leverages multiple layers of defense to stop MegaCortex, including: Blocking PsExec from executing the batch

Sophos. How Intercept X stops MegaCortex ransomware Read More »

Boldon James. Accountability the Next Step in Data Protection

The UK’s Information Commissioner stressed in a speech that nearly one year into GDPR, the regulation is at a critical stage. There have been tremendous strides in data protection since the implementation of the General Data Protection Regulation last May but there’s still plenty more to be done from an accountability perspective, according to the

Boldon James. Accountability the Next Step in Data Protection Read More »

Boldon James. How much does the average employee know about data privacy?

With the impacts and repercussions of the looming California Consumer Privacy Act (CCPA) on the minds of many privacy professionals, new research from MediaPRO shows more work is needed to train U.S. employees of this first-of-its-kind privacy regulation. MediaPRO’s 2019 Eye on Privacy Report reveals 46 percent of U.S. employees have never heard of CCPA,

Boldon James. How much does the average employee know about data privacy? Read More »

Boldon James. Enterprises Must Take Insider Threats More Seriously

Security teams need to consider the possibility of internal as well as external threats While high-profile cybersecurity breaches originating from malicious insiders are on the rise, many cybersecurity professionals continue to focus exclusively on external threats, forgetting that a threat could be sat right beside them. It’s easy to put the notion of an insider

Boldon James. Enterprises Must Take Insider Threats More Seriously Read More »

CyberArk. GDPR Breach Notification By Country: 59,000 Incidents Reported

In May, it will be a year since the enforcement of the EU GDPR began. In the midst of continued and ever growing confusion within the EU caused by the Brexit process, a recent report around another high profile EU issue may have gone unnoticed. DLA Piper recently released a paper looking into incidents reported

CyberArk. GDPR Breach Notification By Country: 59,000 Incidents Reported Read More »

CyberArk Named a 5-Star Security Vendor in 2019 CRN Partner Program Guide

CyberArk is honored to be named a 5-Star Security Vendor – the highest rating in CRN’s 2019 Partner Program Guide. This marks the second consecutive year that CyberArk has received this prestigious designation. This recognition highlights the importance of privileged access management (PAM) as a top security control and enterprise priority. Organizations that are extending

CyberArk Named a 5-Star Security Vendor in 2019 CRN Partner Program Guide Read More »

Sophos. Searching for malicious PowerShell executions with Intercept X

Is PowerShell bad? Not necessarily. In fact, most PowerShell executions are not malicious, but PowerShell can be (and often is) taken advantage of. The new Sophos EDR capabilities offer the ability to track down malicious executions that otherwise may remain hidden. For example, executions which use the encoded command argument are more likely to be

Sophos. Searching for malicious PowerShell executions with Intercept X Read More »