• img May 24, 2017

CIOs increasingly focus on innovation

Two-thirds of organizations are adapting their technology strategies in the midst of global political and economic uncertainty, with 89 percent maintaining or ramping up investment in innovation, including in digital labor, and 52 percent investing in more nimble technology platforms, according to the 2017 Harvey Nash/KPMG CIO Survey. It is clear digital strategies have infiltrated […]

Read More
  • img May 24, 2017

WannaCry Shows World the Need for Endpoint Security

Computers all around the world were hit with one of the worst ransomware viruses in history earlier this month. The virus, dubbed “WannaCry,” hit over 200 thousand computers in 150 countries. The virus was able to attack hospital systems in the U.K. and a telecom company in Spain. WannaCry has also hit universities and companies […]

Read More
  • img May 24, 2017

The Administrative Credentials Security Hole

Here’s the problem: the existence of administrative credentials stored on machines throughout the network. What could happen if some of these credentials become known to an unauthorized user? That user would have partial or complete administrative access to the entire domain. IT administrators have a significant challenge on their hands if their organization’s security requirements […]

Read More
  • img May 24, 2017

Reducing Identity-related Risks: The Complete Package or a One-Man Show?

When it comes to reducing risk before an issue occurs, do organizations need the unequivocal strength of The Avengers or could they hedge their bets on just Iron Man? While cybersecurity threats like ransomware and botnets are increasingly making headlines, for most organizations, internal employees are their biggest risks. Studies show that internal employees account […]

Read More
  • img May 23, 2017

Subtitle Hack Leaves 200 Million Vulnerable to Remote Code Execution

A proof of concept attack using malicious video subtitle files reveals how adversaries can execute remote code on PCs, Smart TVs and mobile devices using popular video players and services such as VLC Media Player, Kodi, Stremio and Popcorn Time. “This is a brand new attack vector. We haven’t seen this type of attack yet […]

Read More