Tips & Advice

Cyber Security Reviews – Tips and Advice is a great place to learn about the current happenings and what you can do to prevent it.

0 Comments
Much has been said about the power of AI and how tomorrow’s CISO won’t be able to provide efficient cybersecurity without it. The hype surrounding AI is based on both the quickening pace of natural language capability development and the current deficiency of capable and competent cybersecurity professionals. A quick clarification of what AI is
0 Comments
Authored by Anand Ramanathan McAfee recently announced MVISION Insights designed to help customers proactively detect, rank and respond quickly and accurately to threats. On top of having to respond to threats that persistently target their companies, security professionals also face another huge challenge – prioritizing what threat information is relevant from the huge volume of
0 Comments
Security architecture is like the ocean: no one owns it, and it is constantly affected by change. New technologies are introduced, staff changes occur, and as a result, communication suffers. I often see environments where ownership is placed into silos across teams in the enterprise, meaning IT administrators preventing threats may not get the insights
0 Comments
With 2019’s headlines of ransomware, malware, and RDP attacks almost behind us, we shift our focus to the cybercrime threats ahead. Cybercriminals are increasing the complexity and volume of their attacks and campaigns, always looking for ways to stay one step ahead of cybersecurity practices – and more often using the world’s evolving technology against
0 Comments
I recently had the honor of testifying before the House Financial Services Committee’s Taskforce on Artificial Intelligence about two critical emerging issues in the financial services sector – cloud and artificial intelligence (AI). Both have incredible potential for energizing the financial sector, but they also raise important security concerns. Financial services organizations are migrating to
0 Comments
A cost-effective way to detect targeted attacks in your enterprise While it is easy to get caught up in the many waves of new and exciting protection strategies, we have recently discovered an interesting approach to detect a targeted attack and the related actor(s). Quite surprisingly, a big part of the solution already exists in
0 Comments
With the introduction of TLS 1.3 in 2018, IETF’s goal was (and is) to make the Internet a safer and more secure place. Legacy technologies such as the RSA key exchange have been phased out now. Replacing it is a much safer Diffie-Hellman key exchange. There are two main benefits to this method: not only