We Live Data Security

Nerd Out On Our Latest Thoughts

What is GDPR and How Does it Affect American Businesses?

silly-christopher-columbus_o_790384.jpg

John Donne said in Meditation XVII that "no man is an island." Each of us is part of the larger whole. Because we are so interwoven or connected, the actions of one can or does, affect the rest.

Read more…

A New Flash Exploit Has Been Seen in the Wild. Protect Yourselves.

 

Flash_Gordon

(Flash! Aaaaaaaah-aaaaaah! He'll save every one of us! - Queen)

Okay, okay. This article isn't about Flash Gordon. I just couldn't resist using the picture. It's about Adobe Flash Vers. 28.0.0.137, a Zero-Day exploit, and a Phishing campaign recently discovered by the South Korean Computer Emergency Response Team (KR-CERT).

Read more…

What's the Deal with Meltdown and Spectre?

It's not even a full week into the new year, and we've got two brand spanking new security threats knocking on our door. They're named Meltdown and Spectre, and they're here to ruin not just your day but everybody who's bought a device with a microprocessor in it.

Read more…

7 Simple Security Tips for 2018

 

Read more…

So Yesterday You Were Breached...

There is something pathetically optimistic about cybersafety. There is something quietly unsettling about cybersecurity. There’s something nauseously helpless about being breached.

Read more…

Fireside Chat with Security7: How this MSSP is Enhancing Security Through the Cloud While Reducing Customer Costs

As organizations embrace the cloud, whether public, private, or a hybrid, multi-cloud environment, their IT team is not only required to architect new networking platforms or infrastructures, but also figure out how to secure this new environment. Unfortunately, many of the tools these organizations currently have in place don’t always scale into a cloud or virtualized environment. And even if they do, they actually result in increased complexity because they often function as separate and isolated security devices, which can severely hamper such things as unified visibility and control.

Read more…

Fileless Malware 101: Understanding Non-Malware Attacks

POST BY: FRED O'CONNOR

What is fileless malware?

Unlike attacks carried out using traditional malware, fileless malware attacks don’t entail attackers installing software on a victim’s machine. Instead, tools that are built-in to Windows are hijacked by adversaries and used to carry out attacks. Essentially, Windows is turned against itself.

Read more…