Cybersecurity

You Are Vulnerable Until You Apply Patches — Period.

You Are Vulnerable Until You Apply Patches — Period.

Patch management is a growing problem for IT/Sec-Ops teams. Surveyed cybersecurity professionals reported that attack volumes were up 15 percent and attack severity had increased 24 percent. But in 57 percent of breaches, hackers exploited vulnerabilities for which a patch was available but not applied.

5 Critical Areas All CISOs Should Be Focused On - 1

5 Critical Areas All CISOs Should Be Focused On - 1

Panelists

Moderator: Neal Conlon, AppGuard Inc, VP Business Development

The CISO panel explored the challenges of 2018 and what remedies and priorities they consider important for 2019. Many enterprise cyber symptoms stem from inattention to basic blocking and tackling as well as under-utilization of existing tools. Flawed risk alignment contributes to these and other even greater issues. The panel also explored how the human factor affects cyber programs. They prescribed remedies to these matters that can be pursued in 2019 as well as shared what they expect to see next year.

Authentication: Don't Forget Endpoint Protection

Authentication: Don't Forget Endpoint Protection

Google recently stated that none of its 80,000 employee accounts using their Titan Security Key has been compromised since deployment. This is because this hardware authentication device is a possession factor that cyber criminals cannot electronically steal as they do passwords. But, as great as this and like tools are, they are susceptible when the endpoints using them are compromised. Read on to learn more about how your different authentication mechanisms depend on endpoint protection as well as the one capability you need for this but may have never heard about.

Endpoint Protection: Operations Impact is Just as Important as Blocking Malware

Endpoint Protection: Operations Impact is Just as Important as Blocking Malware

One of today’s most widespread cybersecurity principles seems prudent on the surface but has made the enterprise cyber program a bloated, lumbering beast of burden. Defense in depth is simple to intuit; it is as obvious as two heads are better than one. Reality demands, however, that the enterprise optimize. How many are too many? What combination is best, and so on?  Clearly, finding that sweet spot depends more on just what mitigates the spectrum of prioritized risks. The following anonymous customer story exposes at least two other major dimensions that matter. These other two are the difference between excellence and mediocrity.

"Meltdown" and "Spectre": Antivirus Tools Caught with Their Hands in the Windows Cookie Jar

"Meltdown" and "Spectre": Antivirus Tools Caught with Their Hands in the Windows Cookie Jar

The Meltdown and Spectre vulnerabilities in Intel and other CPU’s are most disturbing because these exist beneath the reach of software-based cyber controls to explicitly intervene. To mitigate risks from the Meltdown and Spectre vulnerabilities in Intel and other CPU’s, AppGuard customers need not do anything other than implement operating system patches, as should be done regardless. No unusual actions are necessary to implement these patches with AppGuard.

AppGuard Customers Protected Against Process Doppelgänging - Fileless Attack

AppGuard Customers Protected Against Process Doppelgänging - Fileless Attack

This week, researchers presented at Black Hat Europe in London information regarding an extremely dangerous new “fileless” attack vector that affects all Windows operating systems. The researchers observed that the attack bypasses many widely used endpoint security tools. AppGuard customers need NOT make any policy adjustments to mitigate risks from such attacks. AppGuard already blocks them.

Cyber Concepts - Categorizing Malicious Code Attacks

Cyber Concepts - Categorizing Malicious Code Attacks

These Categories will Help Simplify Endpoint Security Product Evaluation

The terms, names, and jargon cumulatively found reading cybersecurity articles even confuses and befuddles the people that write them. For years, anti-malware vendors and researchers have gained 15 minutes of fame after naming a malware family or variant they discovered and analyzed.  Now, there are zillions of them. The omnipresent keyword chaos literally complicates endpoint security.