AppGuard Blog

Cybersecurity Enterprise

Posted on Jul 14, 2021

Industry analysts say that enterprises rely solely or mostly on detection-based cyber defense technologies. Their reports also demonstrate why detection-based tools alone are not enough. Breach volume increased 33% from 2019 to 2020 to 5,258, following a 96% increase from 2018 to 2019, per the Verizon DBIR. Mandiant’s 2020 cyber incident investigations found that 65% of the organizations attached did NOT discover the attack within the first week. Machine learning did not magically fill these costly detection gaps. The remainder of this blog focuses conceptually at why detection is missing the mark. It concludes with a brief introduction of what the enterprise needs and the steps to get it.

Read More ›
Cybersecurity Enterprise

Posted on Jul 6, 2021

From the vendor: “Kaseya’s VSA product has unfortunately been the victim of a sophisticated cyberattack.” Hackers believed to be associated with the Russian threat group known as “REvil” exploited a SQL vulnerability and an authentication bypass to hijack the on-premise deployments of Kaseya VSA.

Read More ›
Cybersecurity Enterprise

Posted on Jun 28, 2021

Everybody seems to be buying into the concept of doing more with less, but, how can we apply that to endpoint security? Apply zero trust principles WITHIN endpoints.

Read More ›

Applying zero-trust principles WITHIN endpoints will help enterprise cybersecurity programs shift their priorities to conform to the new realities of COVID-19.

Read More ›
Enterprise Server Trustica

Posted on Dec 2, 2019

Emotet is an advanced Trojan malware that first appeared in 2014.The malware mostly spreads by spam and phishing emails via infected attachments and embedded malicious URLs. Everyone is susceptible to Emotet, from individuals to major enterprises and organizations around the world.   According to an alert from the U.S. Department of Homeland Security, the advanced […]

Read More ›
Enterprise Small & Medium Business

Posted on Aug 13, 2019

In the digital world, it can be easy to lose sight of the emotional dimension of the operations we perform. This will only increase as AI becomes more dominant. Too many experts are expecting AI to address the risks that other cybersecurity tools have failed to fully vanquish. But as long as the human element remains, emotional intelligence will be an important part of an effective cybersecurity strategy.

Read More ›
Small & Medium Business

Posted on Feb 5, 2019

Like antibiotic-resistant strains of bacteria give nightmares to medical epidemiologists, modular malware systems are doing the same to cyber defenders. New variations of modular malware are appearing weekly, if not daily. They are designed to target Linux and Windows Servers. Xbash, AdvisorsBot, and Marap are a few examples of a modular malware that doubled in […]

Read More ›

Posted on Sep 12, 2018

Google recently stated that none of its 80,000 employee accounts using their Titan Security Key has been compromised since deployment. This is because this hardware authentication device is a possession factor that cyber criminals cannot electronically steal as they do passwords. But, as great as this and like tools are, they are susceptible when the […]

Read More ›

Posted on Aug 27, 2018

There’s a pervasive, false perception in contemporary politics. The candidate that advocates spending the most on something cares most about solving the problem. Today’s endpoint protection suites are similarly ranked. Those with the longer list of features are ranked higher. Similarly, like features are seldom compared one-to-one but are presumed little different among different suites. […]

Read More ›

Posted on Aug 15, 2018

One of today’s most widespread cybersecurity principles seems prudent on the surface but has made the enterprise cyber program a bloated, lumbering beast of burden. Defense in depth is simple to intuit; it is as obvious as two heads are better than one. Reality demands, however, that the enterprise optimize. How many are too many? […]

Read More ›

Topics

Subscribe

Subscribe to our blog to receive email notifications when new posts are added!