Let’s face it, users should never be the last line of defense in cybersecurity
Making employees responsible for security simply isn’t practical. Even after all the training and education, human beings will make mistakes and expose the company to risk. Even the most security-conscious employees get tired, overworked, busy or distracted.
Equifax breach still fuzzy in the rear-view mirror
It’s been just over a year ago that American credit consumers fell victims to one of the largest data hacks in the country’s history and were victimized a second time as a result of corporate negligence and indifference at Equifax.
Until now, Bromium – which spins up a tiny virtual machine (VM) for every application – was ahead of its time and the world’s hardware is only just catching up. Has the world (and its hardware) smartened up?
Virtualization tool helps protect critical IP and high value assets
Bromium has announced a new product called Protected App, which allows organizations to establish robust, end-to-end protection around their critical intellectual property (IP) and high value assets (HVAs).
Application isolation and control – a modern defence for new threat
Virtualisation allows applications to open and carry out each task in its own self-contained virtual environment so any threat caused by an action in this environment won’t have access to anywhere else.
Cyber attacks bought ‘as easily as online shopping’
The platform economy — connecting buyers with sellers via the internet — has enabled companies such as Amazon, eBay, Uber and Airbnb to build vast global businesses. Now cyber criminals are using the same technique, and even the same platforms, to buy and sell their tools.
GUEST ESSAY: Theft of MQ-9 Reaper docs highlights need to better protect ‘high-value assets’
It’s important that the government and private companies find solutions for consolidating and protecting HVAs. The goal should be to ensure isolation and integrity, thwarting attempts to access and/or laterally move data from HVAs remotely.
Hacker Compromises Air Force Captain to Steal Sensitive Drone Info
A hacker has penetrated an Air Force captain’s computer to steal sensitive information about U.S. military drones and other state secrets, according to a cybersecurity firm’s investigation of dark web activities.
Don’t get owned – what to consider when investing in security tools
While it is important to invest in layered defenses and protect against opportunistic, known threats, investing in these tools alone will never provide the protection needed to defend against today’s advanced threats.
Bromium Revamps Endpoint Security Strategy to Focus on Channel
Bromium announces updates to its Partner Network that add dedicated sales, marketing, and technical support to channel partners. Bromium also announces it is now committed to a 100 percent indirect sales model.
Bromium Go-To-Market restructured to better support mid-market enterprise
Bromium has announced the release of Bromium Secure Platform 4.1. The release provides out-of-the-box use case support to address key organisational pain points, including email attachment protection; spear phishing protection and malicious download protection.
Europol Smacks Down World’s Largest DDoS-for-Hire Market
A multi-national investigation led by Europol has led to the arrest of the administrators of the DDoS-for-hire site, which sold the capability to knock websites offline and take down domains for as little as $18 per month.
A joint report between Surrey University and researchers at security vendor Bromium estimates that the proceeds of cyber crime make up to 8-10% of total illegal profits laundered globally, believed to be valued at up to $200 billion.
The value of the number one digital currency, bitcoin, has lately been on a punishing tailspin, falling by approximately 40 percent in 2018 and over 70 percent from the time when it was at the peak in December 2017.
Podcast Episode 88: Inside Russia’s DragonFly Group and How Cyber Crooks Launder Money
In this week’s Security Ledger Podcast (#88) we do a deep dive with researcher Vikram Thakur of the firm Symantec on “Dragonfly,” the Russian hacking group whose actions prompted the U.S. Department of Homeland Security and the FBI to issue a joint statement last week warning of intrusions into critical infrastructure in the US.
Your personal data may be on the dark web: What you need to know
Major data breaches at banks and sites like Yahoo – where about 3 billion accounts were compromised – mean that your personal data can travel to the dark web, networks of encrypted, often shadowy, websites that are not indexed by common search engines. In fact, the dark web is so different that you typically need special software to use it.
The global cyber war is heating up: Why businesses should be worried
From NotPetya’s global disruption to North Korea’s digital plundering of financial institutions, state-sponsored cyber attacks should be top of mind for business leaders. Here’s how to defend against them.
£12m pa – the hidden costs of maintaining endpoint security solutions
Enterprises across the globe are now investing heavily in licensing and deployment of endpoint security solutions to protect their IT systems but fail to spot hidden costs of human skills and effort required.
Despite an overall decrease in fraud and computer misuse in 2017, the latest Office for National Statistics (ONS) reports show that incidents involving computer misuse and malware against business are way up
Widespread usage of admin rights leaving organisations vulnerable to cyber attacks
Organisations are allowing too many employees to enjoy admin rights to promote efficiency and convenience, but are, in the process, making themselves vulnerable to insider threats, phishing attacks, and ransomware infections.