• img April 24, 2018

Whitepaper: DNS Threat Intelligence vs. AI Network Security

The Domain Name System (DNS) turns a user-friendly domain name into an IP address that computers use to identify each other. DNS is unencrypted by default. Most security vendors still heavily rely on signature-based detection, such as DNS firewalls and DNS blacklisting. It essentially performs DNS query checks of known bad domains. Soon all DNS […]

Read More
  • img April 24, 2018

How many threats hit the mainframe? No one really knows

Mainframes are the definition of mission-critical for countless businesses. Mainframes can run 1.1 million transactions per second and are at the core of the technology strategies within the worldwide financial markets. In 2017, IBM launched a new mainframe capable of running 12 billion encrypted transactions a day. Why, despite the fact that businesses can’t afford […]

Read More
  • img April 24, 2018

Solving the dark endpoint problem with increased visibility and control

In this podcast recorded at RSA Conference 2018, Richard Henderson, Global Security Strategist at Absolute Software, and Todd Wakerley, EVP of Product Development at Absolute Software, talk about endpoint visibility and control, RSAC happenings, and what’s hot with Absolute right now. Here’s a transcript of the podcast for your convenience. Todd: And I’m Tood Wakerley, […]

Read More
  • img April 24, 2018

Effective intrusion detection for the Internet of Things

A group of researchers have devised a self-learning system for detecting compromised IoT devices that does not require prior knowledge about device types or labeled training data to operate. “We propose a novel approach that combines automated device-type identification and subsequent device-type-specific anomaly detection by making use of machine learning techniques. Using this approach, we […]

Read More
  • img April 24, 2018

Orangeworm hackers target healthcare corporations

A hacking group dubbed Orangeworm has been targeting, either directly or indirectly, international corporations operating within the healthcare sector, Symantec researchers have shared. Custom malware The Orangeworm attackers use a custom backdoor called Trojan.Kwampirs to compromise systems and gain remote access to them. The attackers collect as much information as possible from the back-doored system, […]

Read More