In the News: ADAPTURE and The Centrics Group Announce MergerRead More

Close

Defeating the Cyber Kill Chain

What is the Kill Chain? Cyber-attackers executing advanced threats against organizations utilize what’s known as the cyber kill chain. The kill chain is the “high-level framework or workflow that advanced threat actors employ in their efforts to compromise the target,” according to Dell SecureWorks. “Actors behind advanced threats have a toolbox of exploit techniques at [...]

February 10th, 2016|Categories: Cybersecurity, Security|Tags: , , , |

FireEye and F5 Partnership Takes Aim at Evolving Cyberthreats

In this post: Read about the newly formed FireEye and F5 partnership and its impact on defense against evolving cyberthreats.  Cybersecurity firm FireEye and application delivery provider F5 recently announced a partnership aimed at defending against evolving cyberthreats targeting companies around the world. Enterprises today are faced with the challenges of supporting cloud-based applications and [...]

Senate Passes Cybersecurity Information Sharing Act: What You Need to Know

The U.S. Senate recently passed the Cybersecurity Information Sharing Act (CISA), a bill that would increase cyberthreat information sharing between the government and the private sector. CISA requires the Director of National Intelligence, the Department of Homeland Security, the Department of Defense and the Department of Justice to develop procedures to promote the timely sharing [...]

Disrupting the Cyber-Attack Kill Chain

Cybercriminals today are utilizing increasingly complex techniques to infiltrate corporate networks—while evading detection—in an effort to steal intellectual property and other sensitive information. Knowing the techniques cyber-attackers use and how to defend against them is paramount to an organization’s success in disrupting the cyber-attack kill chain. The Onslaught of Malware Attackers are constantly bombarding networks [...]

November 9th, 2015|Categories: Cybersecurity, Security|Tags: , , , , , |