Cybercrime

Cybercrime / Industry Updates

Cloud and IaaS DLP Woes: Is Additional Threat Intelligence a Solution?

Cloud-based technologies are effective means to gain visibility into the IT challenges faced by organizations. Adopting them enabled infrastructure-as-a-service (IaaS) providers to increase client uptime, security, and compliance, all the while giving more flexibility to scale up or down to respond to opportunities and challenges on time. more

Carpet-Bombing Attacks: A Rising Threat to ISPs

News of a South African ISP's two-day outage sent the industry abuzz last month, highlighting the need for improved distributed denial-of-service (DDoS) attack mitigation. more

How Threat Intelligence Prevents Nameserver Takeovers and Their Far-Reaching Damage

In an ideal world, administrators should never run across threats to their web properties. However, human errors and vulnerabilities inevitably get in the way of cybersafety. Managed Domain Name System (DNS) providers, registrars, and services can sometimes put users at immense risk as well. more

Can Network and Threat Data Correlation Improve SIEM Solutions?

More and more businesses contend with rising cybersecurity threats. The mounting numbers are pressuring managed service providers (MSPs) to employ sophisticated tools to secure each of their client's systems, network architectures, and confidential information. more

Information Rights Management or User Access Management, Which One Is Better?

The current security landscape calls for intensive monitoring and analysis to effectively identify possible threats to applications, systems, and infrastructure. With millions of threats discovered monthly, security experts must revamp and update their cybersecurity measures and tools. more

Can Security Operations Centers (SOC) Benefit from Third-Party Threat Intelligence?

Businesses today have to deal with cybersecurity issues daily. Recent trends show an ever-increasing number of hacked networks and breached data. Studies also show that those victimized often have weak cybersecurity measures in place, forcing them to spend more on resources to combat oncoming attacks. more

4 Challenges in Digital Rights Management to Reflect On

Digital rights management (DRM) is undoubtedly a hot topic in today's connected environment. As over-the-top (OTT) media distribution channels fortify month after month, so do the risks that come with their use. Data theft, billion-dollar revenue losses, and compliance issues are just a few of these risks. As the year draws to a close, let's examine the persistent challenges in the DRM space and how IP geolocation can help in some cases. more

The More Threat Intelligence Integrated Into Security Solutions, the Better?

Today's sophisticated threats present enormous risks for any business. The more connected a company is, the more prone it is to cyber attacks. Enterprises need to devise ways to protect the integrity of their data and ensure that their systems are safe from cyberthreats. more

How to Stay Safe Against DNS-Based Attacks

The Domain Name System (DNS) plays an essential role in resolving IP addresses and hostnames. For organizations, it ensures that users reach the proper sites, servers, and applications. While it's a fundamental base for a functioning Web, the problem is that this system can easily be abused. more

More than Ever: Why Organizations Need Proactive Defense in 2019

In the first half of 2019 alone, several data breaches have already exposed as many as 4.1 billion personal records. We've seen even industry giants and low-key players alike succumb to all kinds of data compromise. more