PRODUCTS

Cyber Security Elements by NSS

Uncategorized

Sophos. Anti-malware is imperfect but still necessary. Here’s why.

Doctors sometimes make mistakes that harm the patient. Police often fail to protect and serve. When that happens, people rightly demand the failures be analyzed and fixed. But no one ever calls for the elimination of all doctors and police. Why then, do some call for the end of antivirus and anti-malware when failures happen? […]

Sophos. Anti-malware is imperfect but still necessary. Here’s why. Read More »

Sophos Endpoint Exploit Prevention. Block Ransomware with the Power of Intercept X

The protection capabilities of Intercept X are now available to Endpoint Protection deployments managing their endpoint policy in Sophos Enterprise Console. Stop malware, prevent exploit vulnerabilities and get a deep clean on any potentially hidden malware using the Endpoint Exploit Prevention add-on. Highlights Stops crypto-ransomware and automatically rolls any impacted files back Exploit Prevention mitigates

Sophos Endpoint Exploit Prevention. Block Ransomware with the Power of Intercept X Read More »

Corero: The Importance of DDoS Attack Visibility

The field of cyber forensics is getting much more attention lately, mostly because of the keen debate over Russia’s hacking of U.S. political party networks. The public, media and politicians all demand “evidence” of the hacking. Fortunately, sophisticated cyber-security forensics tools are available to assist with this. We cannot pretend to know what evidence the

Corero: The Importance of DDoS Attack Visibility Read More »

Corero: Nearly 40% of Companies Lack Skills and Technology to Handle DDoS Attacks

A recent TripWire study highlights the growing problem of cyberattacks, and whether IT staff feel that their companies have the right combination of skills and technology to cope with various types of cyber threats. Top concerns were (in order of importance) ransomware, distributed denial of service (DDoS) attacks, malicious insiders, phishing and vulnerability exploits. According

Corero: Nearly 40% of Companies Lack Skills and Technology to Handle DDoS Attacks Read More »

SophosLabs malware forecast points to rising IoT threats, more ransomware

SophosLabs has released a malware forecast to coincide with the start of RSA Conference 2017. Typically, our research papers focus on Windows, which has traditionally been the largest battleground. While some of the report does indeed look at Microsoft-specific challenges, we decided to focus more on the increasing malware threats directed at platforms where the

SophosLabs malware forecast points to rising IoT threats, more ransomware Read More »

Sophos Adds Advanced Machine Learning to Its Next-Generation Endpoint Protection Portfolio with Acquisition of Invincea

Sophos, a global leader in network and endpoint security, today announced it has entered into an agreement to acquire Invincea, a visionary provider of next-generation malware protection. Invincea’s endpoint security portfolio is designed to detect and prevent unknown malware and sophisticated attacks via its patented deep learning neural-network algorithms. It has been consistently ranked as

Sophos Adds Advanced Machine Learning to Its Next-Generation Endpoint Protection Portfolio with Acquisition of Invincea Read More »

CyberArk: Don’t Analyze Everything – Analyze the Right Thing to Detect and Respond to Insider Threats

In 2013, organizations worldwide started to take insider threats seriously, thanks to a man named Edward Snowden. Yet, his is just one of many cases of authorized insiders who have caused damage – both intentionally and accidentally – to the organizations that trusted them.  From the Sage Group incident in the UK to the case

CyberArk: Don’t Analyze Everything – Analyze the Right Thing to Detect and Respond to Insider Threats Read More »

Corero: DDoS Attacks Won’t Be Blocked by Black Holing/Null Routing

Distributed denial of service (DDoS) attacks have been around since the early 2000’s, and the technology solutions for mitigating such attacks have evolved dramatically over the past few years. Hackers are more sophisticated, and the attacks are increasing, so the old solutions— which never worked perfectly—are even less effective in today’s cyber threat landscape. Therefore,

Corero: DDoS Attacks Won’t Be Blocked by Black Holing/Null Routing Read More »