This Blog has Moved!

This blog is moving to


Thank you for visiting! Content will remain here for archival purposes.

Space Weather Outlook April 30, 2017 at 08:27PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #17-18 2017 April 30 at 6:13 p.m. MDT (2017 May 1 0013 UTC) **** SPACE WEATHER OUTLOOK **** Summary For April 24-30 No significant space weather storms were observed during the summary period. Outlook For May 1-7 No significant space weather storms are expected during the outlook period. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

Internet of Things (IoT) Security in Smart Home Devices

The following is external content provided as a free resource for blog readers.

The Internet of Things (IoT) refers to devices that can send or receive data automatically, without being prompted by human interaction. Examples are cars that notify drivers of low tire pressure, a security system notifying the home owner, or smart thermostats maintaining optimum home temperature based on outside weather.

These devices have very low security protocols. While attackers or hackers have not found a way to profit from taking control of devices yet, it is only a matter of time. The most common access points are through the cloud or the home Wi-Fi Ethernet network. Device owners can protect themselves by:

  • Ensuring strong security protocols and encryption on the home network
  • Changing default passwords
  • Disabling unneeded features or features not in use
  • Avoid secondhand (and therefore potentially compromised) devices
  • Install updates as they become available.


Request Free!

Opportunities and Threats of 5G on IT

The following is external content provided as a free resource for blog readers.

The sheer scale of the 5G mobile network project to define the next generation of mobile networks is ambitious and hugely innovative. But with this comes considerable uncertainty about its rollout, level of investment required and rival technologies, not to mention the often conflicting interests of stakeholders that include governments and mobile service operators.

The impact of 5G on IT and non-IT sectors will be considerable and this Executive Brief summarises some of the key points from the extensive research undertaken in this area by 451 Research.

Intended audience:  Technology business managers and investors working both within and outside the mobile sector.



Request Free!

Healthcare Privacy and Security Primer

The following is external content provided as a free resource for blog readers.

The Patient Privacy Primer details the eight stages of privacy programs from basic to full-strength. While not every organization is ready from day one to put into place a full Proactive Patient Privacy Analytics platform, knowing where you stand today is a good start. This primer defines vocabulary and briefly describes the continuum of approaches to patient privacy:

  1. Nothing
  2. Random Audits
  3. Regular Algorithmic Audits
  4. Random Audits + Regular Algorithmic Audits
  5. Traditional Patient Privacy Monitoring
  6. Patient Privacy Intelligence
  7. User Behavior Analysis/Machine Learning
  8. Proactive Patient Privacy Analytics Platform


Request Free!

Computer Security Handbook, 6th Edition ($130 Value) FREE For a Limited Time

The following is external content provided as a free resource for blog readers.

Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly-regarded reference maintains timeless lessons and is fully revised and updated with current information on security issues for social networks, cloud computing, virtualization, and more.

Free offer expires 5/10/17



Request Free!

The Need for a New IT Security Architecture: Global Study on the Risk of Outdated Technologies

The following is external content provided as a free resource for blog readers.
The report reveals:
  • What’s top of mind when designing a new IT security framework
  • The top things that make organizations vulnerable
  • How outdated security technologies put businesses at risk


Request Free!

How to Train Your Machine

The following is external content provided as a free resource for blog readers.

Right now, signature-based detection tools and human experts are the bread and butter of most organizations’ cybersecurity systems—and these systems are failing. Malware is growing and diversifying at an unprecedented rate, with roughly a third of all malware ever created having been made in just the last two years.

Where traditional solutions can’t keep up with the growth of malware, however, machine learning solutions powered by machine learning can. Learning software can analyze more data than any human could possibly hope to examine, and do it faster and more accurately. In this paper, we’re going to break down for you exactly See how a machine learning cybersecurity system works, from training to feature extraction to model building.



Request Free!

DeepArmor: A Cognitive Approach to Anti-Malware

The following is external content provided as a free resource for blog readers.

Cybercrime is an exponentially growing threat to the world’s businesses, governments and citizens making sophisticated anti-malware more vital to security than ever. SparkCognition’s DeepArmorA, a signature-free, cloud-based solution, is morethe new approach to anti-malware that cybersecurity desperately needs. efficient way to prevent malware is emerging through SparkCognition’s cognitive approach, DeepArmor.

DeepArmor is a signature-free cloud-based security solution.  DeepArmor’s approach to anti-malware is efficient and lightweight, requiring no updates and significantly reducing administrative burden while still catching even the most advanced threats. DeepArmor also improves visibility with its natural language processing-powered threat research and remediation techniques.



Request Free!

Space Weather Outlook April 23, 2017 at 10:11PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #17-17 2017 April 23 at 7:56 p.m. MDT (2017 April 24 0156 UTC) **** SPACE WEATHER OUTLOOK **** Summary For April 17-23 G2 (Moderate) geomagnetic storms were observed on 20, 22-23 Apr. G1 (Minor) geomagnetic storms were observed on 19-23 Apr. No other space weather storms were observed during the summary period. Outlook For April 24-30 G1 (Minor) geomagnetic storms are likely on 24-27 Apr. No other space weather storms are expected during the outlook period. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

The Lack of Real-Time Visibility Into Mainframe Events and Security

The following is external content provided as a free resource for blog readers.

You must know everything that happens—what’s coming in from outside and what’s happening from within—at all times. But there is a lack of real-time visibility to what is happening on today’s mainframes. Because most of the IT world still holds the notion that mainframes are rubber stamped as secure, it’s uncommon for an organization to monitor its mainframes with the same vigilance as the rest of the infrastructure, not to mention that most mainframe events are also monitored separately from the open system technology.

In this paper, we will discuss the role that real-time monitoring can play in an effective plan to secure your entire IT infrastructure, why having a reactive versus proactive event monitoring plan can make or break your potential for creating a truly secure mainframe, and what you can do to better protect your mainframes at all times.



Request Free!

Eight Key Pressures on Security Operations

The following is external content provided as a free resource for blog readers.
Security operations have come under increasing pressure from well-funded attackers armed with news tactics, tools and skills. As a result of this, there is additional scrutiny, micromanagement and oversight as IT security climbs the business agenda of many organizations. It’s vital to have the right information at your disposal to describe your challenges and suggest solutions. These forces can be categorized as those from external sources, and those which your business places on you. In this whitepaper, we explore in detail the external and internal forces applying pressure to your security operations, and how Managed Security Services (MSS) can help you release pressure and regain control.

Request Free!

Understanding AIOps & Probable Root Cause Analysis

The following is external content provided as a free resource for blog readers.
Leading analysts like Gartner agree that Root Cause Analysis is still a people-dependent process. Furthermore, they recommend that ITOps leaders leverage machine learning technology to provide contextualized information across the production stack, understand similarity in events from the past, and accommodate human interaction so that the algorithms can learn from human behavior over time.

Moogsoft’s unique Probable Root Cause is the first technique that can understand causality in unpredictable IT environments with a significant degree of certainty, and without reliance on a model.

In this webinar recording, Moogsoft executives Richard Whitehead and Robert Harper discuss this innovative approach to Root Cause Analysis, and how it can change the way your operations teams address IT incidents.

Request Free!

OilRig Malware Analysis by LogRhythm Labs

The following is external content provided as a free resource for blog readers.
The LogRhythm Labs team provides actionable intelligence detailing the Tools, Techniques, and Procedures (TTPs) threat actors use in this in-depth report.

Use this information—combined with mitigation and remediation strategies presented in this report—to respond to network attacks by this threat actor. In addition, LogRhythm SmartResponse™ plug-ins will assist in your response efforts if an infected host is detected.

Download this in-depth campaign analysis report to learn about TTPs of the OilRig malware campaign and how you can remediate it.

Request Free!

LogRhythm Building and Instrumenting the Next Gen SOC Webinar 2016

The following is external content provided as a free resource for blog readers.
In this webinar, Chris Petersen, co-founder & CTO of LogRhythm, and Roselle Safran, co-founder & CEO of Up-level Security, discuss best practices for building and staffing today’s SOC. The duo also touch on the essential security operations center tools needed to make your operation effective.

In this webinar you’ll learn:
  • The purpose of a SOC
  • The key characteristics of a next-generation SOC
  • A SOC’s role in accelerating threat detection and response capabilities
  • The security operations center tools that enable a successful and functioning security program


Request Free!

CISOs Investigate: User Behavior Analytics (UBA)

The following is external content provided as a free resource for blog readers.
There’s a tremendous amount of value that you could gain from its implementation, but it also must be implemented methodically and simply or it can be overwhelming.

But done right, UBA can result in a more efficient allocation of scarce information security resources via the automation of the analysis of user behavior information via UBA.

By quickly providing actionable intelligence, CISOs and their staff can reduce loss to the organization by identifying and stopping an attack sooner—therefore minimizing damage.

In CISOs Investigate User Behavior Analytics, you’ll learn:
  • The history of UBA
  • A technology overview of UBA
  • How to sell UBA to the C-suite
  • A market assessment of UBA
  • When UBA doesn’t work
Download the report to learn how visibility into user behavior elements can help you to manage one of the biggest risks to information security—the user credential.

Request Free!

Security Intelligence and Analytics in the Public Sector

The following is external content provided as a free resource for blog readers.
In the public sector, two pervasive issues contribute to complexity of effective cybersecurity. The first is that security tools are often deployed in silos, and the second is a lack of trained InfoSec professionals in the workforce.

Discover how your agency can spend less time and money upskilling your OPSEC team. Download the whitepaper to see why your team can use security intelligence to do the heavy lifting in terms of surfacing and qualifying the most serious threats that require investigation.

In this paper, you’ll learn how security intelligence can help you:
  • Increase the value of your investments in existing security technology
  • Discover and alert on threats quickly so they can be stopped
  • Accelerate your security maturity
  • Meet compliance requirements for applicable standards and regulations
Download the white paper to learn how security intelligence can help you tackle cybersecurity obstacles specific to the public sector.

Request Free!

Space Weather Outlook April 16, 2017 at 10:26PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #17-16 2017 April 16 at 8:13 p.m. MDT (2017 April 17 0213 UTC) **** SPACE WEATHER OUTLOOK **** Summary For April 10-16 No space weather storms were observed during the summary period. Outlook For April 17-23 G2 (Moderate) geomagnetic storms are likely on 23 Apr and G1 (Minor) storms are likely on 17 Apr due to the influence of recurrent coronal hole high speed streams. No solar radiation storms or radio blackouts are expected during the outlook period. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

Threat Lifecycle Framework | Prevent Major Data Breaches by Reducing Time to Detect and Respond to Threats

The following is external content provided as a free resource for blog readers.
A new approach is required. Traditionally, prevention-centric strategies have been employed to block attacks. However, many of today’s advanced, motivated threat actors are circumventing these defenses.

This paper introduces the concept of Threat Lifecycle Management (TLM)—a fundamental end-to-end detection and response workflow for Security Operations Centers (SOCs).

TLM is a series of aligned SecOps capabilities and processes that begins with the ability to see broadly and deeply across your entire IT environment and ends with the ability to quickly mitigate and recover from a security incident.

In this paper, you’ll learn a new approach to defending against cyber threats, including:
  • The five phases of the cyber-attack lifecycle
  • How to prevent high-impact cyber incidents through optimized threat lifecycle management
  • The phases of threat lifecycle management
  • 10 ways LogRhythm expedites the delivery of threat lifecycle management
Download the white paper to learn how you can empower your SOC to enable effective TLM at any size and scale.

Request Free!

How Ransomware Works Infographic

The following is external content provided as a free resource for blog readers.
Your organization’s success in defending against a ransomware attack is largely dependent on your level of preparation and the tools you deploy to monitor your systems to detect, respond to and neutralize suspicious activity.

Request Free!

Freedom and Flexibility in an Accounting World Gone Mobile

The following is external content provided as a free resource for blog readers.
Don’t fight the change, embrace it: a mobile workforce can pay huge dividends for productivity and employee satisfaction. Download this e-book to learn:
  • How giving your employees the choice to work from home can save $11,000 per year
  • What tool you can give your employees to boost creative innovation by 250%
  • Why organizations embracing mobility claim 320 hours more work per employee


Request Free!

Space Weather Outlook April 09, 2017 at 11:06PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #17-15 2017 April 9 at 8:52 p.m. MDT (2017 April 10 0252 UTC) **** SPACE WEATHER OUTLOOK **** Summary For April 3-9 G1 (Minor) geomagnetic storm levels were observed on 04 and 09 April due to negative polarity coronal hole influence. R1-R2 (Minor-Moderate) radio blackouts were observed on 03 April due to M-class flare activity from Region 2644. Outlook For April 10-16 No space weather storms are expected. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

Mitigating the DDoS Threat

The following is external content provided as a free resource for blog readers.
This white paper covers:
  • Likelihood of attacks for different industries
  • Top business concerns of DoS/DDoS attacks
  • Notable attack vectors and landscape
  • DoS/DDoS protection best practices


Request Free!

Holistic Security Architecture Designed to Fight Emerging Cyber Attacks

The following is external content provided as a free resource for blog readers.
A holistic security architecture - Attack Mitigation Network (AMN) - addresses these emerging security challenges offering the widest attack coverage and shortest time to mitigate. Download this white paper NOW to learn how to:
  • Maintain business continuity even when under attack
  • Interface with emerging security applications
  • Protect against all types of availability-based threats
  • Reduce operational costs and save on enterprise infrastructure expenses


Request Free!

Protecting Critical DNS Infrastructure Against Attack

The following is external content provided as a free resource for blog readers.
This paper outlines the recent DDoS attacks on DNS services and challenges of mitigating those attacks.

Learn how:
  • DNS DDoS attacks take advantage of weaknesses in the DNS protocol
  • Attackers launch a high bandwidth sophisticated attack on their victim
  • Attackers use amplification effect
Securing DNS service requires rethinking on perimeter security with dedicated tools to identify and mitigate these new breed of attacks on DNS services.

DOWNLOAD NOW to stop DNS DDoS Attacks!

Request Free!

Automating Defenses Against Increasingly Sophisticated DDoS Attacks

The following is external content provided as a free resource for blog readers.
Find out about the changing landscape from volumetric to application-focused attacks, and the need for a fast and fine-grained automatic mitigation solution.

This white paper covers:
  • How DDoS attacks threaten our digital lifestyle.
  • Defenses for new application-layer attacks.
  • How DDoS attacks are getting more sophisticated.
  • How to protect against application-layer attacks.
  • How to align with SDN & NFV software trends.
DOWNLOAD NOW!

Request Free!

Agile Security: What Does It Look Like?

The following is external content provided as a free resource for blog readers.
They’re going mobile and adopting cloud-based apps to satisfy consumers. The result is that security is made more complicated in a world where computing is now everywhere. Enterprise architects and IT leaders must create an adaptive security architecture to mitigate risk.

Read Agile Security: What Does It Look Like, and learn:
  • How the digital transformation increases customer’s expectations of security
  • Why adaptive security architecture is a top 10 technology trend
  • Why adaptive application protection is crucial in today’s digitized world
  • How DevOps and agile development creates a security blind spot
  • How IoT mega attacks are forcing new mitigation strategies


Request Free!

Preparing for Business Email Compromise Attacks in 2017

The following is external content provided as a free resource for blog readers.

Investment in enterprise security is increasing, yet cyber threats are continually evolving and adapting to the most sophisticated defenses.

In particular, Business Email Compromise (BEC) and imposter fraud present an ever growing threat to organizations in 2017 and beyond.

In this Executive Brief, you will glean insights on:

  • How to defend against an evolving threat landscape
  • The top resources to help support your security efforts
  • Key actions you can take to prepare

Summarizing key insights from a Proofpoint webinar, this briefing document provides the busy professional with a quick, easy-to-read and share format.



Request Free!

Security Challenges,Threats and Opportunities -- C-Suite Insights

The following is external content provided as a free resource for blog readers.

Radware interviewed 200 IT executives in the U.S. and U.K. to understand to understand what cyber security threats concern C-level executives the most and identify opportunities for improving defenses.

In this Executive Brief, you will glean insights on:

  • How C-level executives are grappling with a new breed of cyber-attacks
  • Key challenges they have in responding to ransom-based threats
  • Identify opportunities for improving defenses

Summarizing key insights from a Radware report, this briefing document provides the busy professional with a quick, easy-to-read and share format.



Request Free!

Cyber Defense Magazine - 2017 Predictions

The following is external content provided as a free resource for blog readers.

Cyber Defense Magazine is all about continuing to focus on best practices and solutions for you. Our 5th Annual Edition of Cyber Defense Magazine, from RSA Conference, contains some of the most informative articles and awards for products and solutions that will help you find the solution you need. RSA Conference is the world's leading information security conference and exposition, gathering leaders from around the world to share best practices, challenge each other, and discover new products to keep our organizations safe from cyber attacks. 

Take  a  peek  inside  our  annual  edition  and  you'll  see we're covering  some  of the  most  interesting  'hot'  topics including Adaptive Security, Endpoint Protection, Security Automation, our Editor's Cybersecurity Predictions for 2017 and so much more. 



Request Free!

Cyber Warnings E-Magazine - February 2017 Edition

The following is external content provided as a free resource for blog readers.

Cyber Defense Magazine is all about continuing to focus on best practices and solutions for you. Our mission is to share cutting edge knowledge, real world stories and awards on the best ideas, products and services in the information technology industry. Our monthly Cyber Warnings E-Magazines cover hot INFOSEC topics with some of the best advice from experts. 

This edition covers hot topics such as Ransomware, Password Audits, Risks in Compromized Credentials, Vulnerabilities including in the Supply Chain and much more. 



Request Free!

Cyber Warnings E-Magazine - March 2017 Edition

The following is external content provided as a free resource for blog readers.

Cyber Defense Magazine is all about continuing to focus on best practices and solutions for you. Our mission is to share cutting edge knowledge, real world stories and awards on the best ideas, products and services in the information technology industry. Our monthly Cyber Warnings E-Magazines cover hot INFOSEC topics with some of the best advice from experts. 

This edition digs into the vulnerabilities of The Internet of Things (IoT), Fileless Ransomware, Backup Strategy, DDoS Attack Protection and so much more. 



Request Free!

Network Security Report 2016-2017

The following is external content provided as a free resource for blog readers.
Attackers want to steal it and companies must secure it. Cyber criminals use ransomware to lock up data or DDoS attacks that act as a smoke screen to deceive security teams and steal this digital bounty. With IoT botnets opening the 1TBps floodgates and new risks from Mirai rewriting the rules, preparing for ‘common’ attacks is no longer enough. The chasm between company preparedness and cyber-attacks has never been greater because security strategies evolve more slowly than they should.

Read the 2016–2017 Global Application & Network Security Report by Radware’s Emergency Response Team to learn:
  • The real cost of attacks and how to build a cyber-resilient business
  • 4 clever ways hackers steal data and how to stop them
  • How to prepare for ransom attacks
  • 5 steps to enterprise readiness: What it takes to protect from top threats
  • What’s on the horizon? 4 predictions for 2017


Request Free!

Space Weather Outlook April 03, 2017 at 03:27AM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #17-14 2017 April 3 at 1:14 a.m. MDT (2017 April 3 0714 UTC) **** SPACE WEATHER OUTLOOK **** Summary For March 27-April 2 G1 (Minor) geomagnetic storm levels were observed on 28, 30-31 March and G2 (Moderate) storm levels were observed on 27 March due to negative polarity coronal hole influence. R1 (Minor) radio blackouts were observed on 01 April and R1-R2 (Minor-Moderate) radio blackouts were observed on 02 April due to M-class flare activity from Region 2644. Outlook For April 3-9 R1-R2 (Minor-Moderate) radio blackouts are likely with a slight chance for R3 (Strong) radio blackouts on 03-04 April due to flare potential in Region 2644. There is a chance for R1-R2 (Minor-Moderate) radio blackouts with a slight chance for R3 (Strong) radio blackouts on 05-08 April due to flare potential in Region 2645. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.