Don’t Drive on Bald Tires; Include Application Execution Control in your toolbox

To reliably block malware executables, scripts, and libraries, including Ransomware, you must add some form of Application Execution Control to your toolbox. One of my colleagues recently used one of the best analogies I’ve heard when he said “Not using ‘application execution control’ as a means of securing your computers is like driving on bald[…]

Modern security is a myth

The trillion dollar myth of Endpoint Security

Thus far in our series we have reviewed a sophisticated ransomware utilizing stealth and lateral movement techniques, an infamous case of wiperware masquerading as ransomware spread by hacked nation-state tools and an ever-changing swiss army knife which exists as a tool run by one criminal organization offering services to many.   Today, in 2019, the[…]

scary kitty

Let’s dish about that ugly, nasty Scranos

No, not that guy! *Scranos*.     Scranos, the data-stealing malware which, according to ZDnet in an article dated June 13, 2019 claims, “…has returned with new attacks and nasty upgraded features”. It’s not quite as scary as a being capable of erasing half the population of earth, but you would not know that when reading[…]

Perfect Storm For Cybersecurity Risk

Greg Masters, Managing Editor of SC Media does a great job painting a clear picture of cybersecurity this year from the statistics recently published in ISACA’s “State of Cyber Security Study 2017”.  It is clearly a“Perfect storm: Not only is the volume and complexity of cyberattacks increasing, but there’s also a lack of resources necessary to[…]

Better Cybersecurity Starts With Mindset Change

Your Mindset is STILL the key element to better cybersecurity. Your understanding of the newest threats and defense technologies, and your willingness to make changes are what improve your cybersecurity. There will always be discussion and buzz on new tools and tactics, but the essential element is your cybersecurity mindset.   If you fail to grow[…]

Prevention Beats Remediation

$10 Million in Remediation and Counting!! For those that have been following the Yahoo breaches, news reports today are stating the investigation and remediation costs are $10 million and STILL COUNTING! And that is NOT total losses. What will be the agreed upon value of Yahoo for the Verizon acquisition that is still pending? Hmmm.[…]

What is Application Control?

What is Application Control? Apparently, Application Control is whatever the salesperson says it is!   NOT! 2017 is going to be another big year of change for Cybersecurity professionals as hackers continue their successful campaigns to phish, breach, and collect ransom money. And vendors will continue to add new “Application Control” products to their portfolios, and market each of[…]