Modern security is a myth

The trillion dollar myth of Endpoint Security

Thus far in our series we have reviewed a sophisticated ransomware utilizing stealth and lateral movement techniques, an infamous case of wiperware masquerading as ransomware spread by hacked nation-state tools and an ever-changing swiss army knife which exists as a tool run by one criminal organization offering services to many.   Today, in 2019, the[…]

scary kitty

Let’s dish about that ugly, nasty Scranos

No, not that guy! *Scranos*.     Scranos, the data-stealing malware which, according to ZDnet in an article dated June 13, 2019 claims, “…has returned with new attacks and nasty upgraded features”. It’s not quite as scary as a being capable of erasing half the population of earth, but you would not know that when reading[…]

Prevention STILL Beats Detection in Cybersecurity

The concept of Prevention before Detection is very easy to understand in most industries, except cybersecurity. Breach after breach in today’s news give us plenty of examples of cybersecurity professionals depending too much on Detection, and not enough on Prevention. But is that what you the business owner or consumer expect? I’m sure there are a[…]

Perfect Storm For Cybersecurity Risk

Greg Masters, Managing Editor of SC Media does a great job painting a clear picture of cybersecurity this year from the statistics recently published in ISACA’s “State of Cyber Security Study 2017”.  It is clearly a“Perfect storm: Not only is the volume and complexity of cyberattacks increasing, but there’s also a lack of resources necessary to[…]

Better Cybersecurity Starts With Mindset Change

Your Mindset is STILL the key element to better cybersecurity. Your understanding of the newest threats and defense technologies, and your willingness to make changes are what improve your cybersecurity. There will always be discussion and buzz on new tools and tactics, but the essential element is your cybersecurity mindset.   If you fail to grow[…]

Smart Business vs Great Sport

For all those that witnessed the Chicago Cubs victory over the Cleveland Indians in the 2016 World Series, I’m sure you agree it will be a VERY LONG TIME before we see another spectacular battle for a title. A series that ran through all 7 games complete with home-field upsets and more heart played by both[…]

Jim McLendon now COO of White Cloud Security!

WHITE CLOUD SECURITY, INC. PROMOTES FORMER SYMANTEC EXECUTIVE TO ROLE OF CHIEF OPERATING OFFICER Austin, Texas – December 1, 2016 White Cloud Security is pleased to announce the promotion of Jim McLendon to the role of Chief Operating Officer for White Cloud Security, Inc. Jim McLendon, USAF Colonel (Retired), retired from a distinguished career in[…]

DDoS Attacks – Making Sense Of It

Cybersecurity has certainly had an interesting few days with the massive DDoS attacks across the USA. The cause, the method, and the massive reach of this DDoS attack truly underscores another dimension of the importance of cybersecurity: making sure your network is not participating in an attack like this. Breaking down the DDoS attack to[…]

Application control, ransomware, computer security

Application Control – Prevent Ransomware

Begin protecting your computer today by using advanced application control. Given the volume of unknown malware, new variants, zero-day exploits, and hackers that are stealing and/or posting your data online, what good is any software that cannot stop the hack?  The second your data is stolen, you’re done!  There is no remediation.  Except to pay fines and eat the[…]