Author: Brian Laing

Infected PDF files continue to plague security personnel responsible for detecting and containing malicious email attachments. Cybercriminals use many different tactics to breach an organization’s network defenses, and delivering infected PDF files, typically via email, remains a very common and dangerous threat. Unfortunately, Secure Email Gateways...

Corporations take extensive measures to monitor, detect, and stop malicious code from entering the enterprise via the Internet. But what about detecting malware that walks through your enterprise's front door and into your network—hidden in the devices that your employees, contractors, or delivery personnel are...

There’s a lot of buzz these days about cyberattack prediction. The U.S. federal government is keen to develop technologies that will not just detect but accurately predict cyberthreats. But they aren’t alone. The commercial sector is also ramping up their interest in cyberattack prediction. Although it...

Prediction, during a data breach or cyber attack would be extremely beneficial if security defenders knew their attacker’s next move. Armed with such information, administrators could take proactive measures to protect sensitive data, patch or update vulnerable software, bolster security settings, and block the attacker’s access and...

Home Depot agrees to pay $25 Million more as a result of their 2014 data breach. Earlier this month Home Depot reached an agreement to pay $25 million more to banks and credit unions as a result of the company’s massive 2014 data breach.  The $25...

Evidence continues to mount that most enterprises need to dramatically improve their cybersecurity. During the last few years, the majority of data breaches were first discovered by entities other than the affected organization—a clear indication that something is wrong. In 2015, research conducted by Intel1 found...