<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=176059862897267&amp;ev=PageView&amp;noscript=1">

Most Recent

How to Assess and Manage Cyber Risk for Your Enterprise

Posted by Security Tech Alliance on Aug 22, 2017 8:07:00 AM | Topics: Risk Management, Data Protection, Network Security

In the wake of a phishing scam that victimized internet giants Facebook and Google to the tune of $100 million, it’s clear that CEOs at every level should take steps to protect their organizations from cyber risks. From 2013 to 2015, the companies were fooled into wiring money to a Lithuanian hacker, believing he was a legitimate electronics manufacturer.

Read More


Open-Source Vulnerabilities Continue to Threaten IoT Devices

Posted by Security Tech Alliance on Aug 15, 2017 7:50:00 AM | Topics: IoT

For the idealistic futurist, open-source software is a shining example of what humans can accomplish when we collaborate and share information freely. To the pragmatic realist, open-source software is a double-edged sword − useful and affordable - but a high-risk option. To the nihilist hacker, open-source software is a playground, full of interesting vulnerabilities to exploit.

Read More


Google and Facebook Hit by $100M Phishing Scam

Posted by Security Tech Alliance on Aug 1, 2017 7:54:00 AM | Topics: Risk Management

A Lithuanian man allegedly pulled off an elaborate scheme in which he impersonated a large Taiwanese electronics company and collected millions of dollars in fraudulent payments from internet giants, Google and Facebook.

Read More


SWIFT to Enforce Controls in Wake of International Banking Hacks

Posted by Security Tech Alliance on Jul 18, 2017 8:00:00 AM | Topics: Network Security

On April 1, 2017, the Society for Worldwide Interbank Financial Telecommunication (SWIFT), began enforcing mandatory security controls. This enforcement action is part of an effort to strengthen the network’s security against hacking groups. Globally, hackers have pulled off record-setting exploits in recent months, such as the theft of $81 million from the central bank of Bangladesh.

Read More


Hajime: Infecting IoT Devices to Hide Them From Other Black Hats

Posted by Security Tech Alliance on Jul 4, 2017 8:23:00 AM | Topics: IoT

Technology researchers at Gartner project that there will be 8.4 billion IoT devices in use this year, up 31 percent from 2016. While IoT was first coined in 1999, it wasn’t until nearly 10 years later that it gained steam, when the FCC voted to open the use of the white space frequency spectrum for Internet-connected devices.

Read More


Exponential: How DDoS Attacks Have Scaled

Posted by Security Tech Alliance on Jun 20, 2017 8:00:00 AM | Topics: Risk Management, Cloud Security

A Distributed Denial of Service (DDoS) attack is a bad actor’s attempt to disrupt a company’s web services with a flood of illegitimate traffic. They are impossible to prevent, difficult to mitigate, and financially devastating for their victims.

Read More


How to Make Multifactor Authentication Easier on Your IT Team

Posted by Security Tech Alliance on Jun 13, 2017 8:09:00 AM | Topics: Access Management, Data Protection

The importance of implementing two-factor authentication (2FA) and multifactor authentication is no longer in doubt. Previously, we discussed best practices for implementing multifactor implementation. However, one area that hasn’t garnered as much attention is how multifactor authentication can weigh down your IT staff, particularly if your staff is made up of only a handful of employees.

Read More


Phishing Scam Uses IDN to Spoof Legitimate Websites

Posted by Security Tech Alliance on Jun 6, 2017 7:58:00 AM | Topics: Access Management, Risk Management, Malware

Out on the water, anglers capture their prey by tricking fish with fake lures. Plastic and metal bait manufacturers attempt to perfect these decoys with physical resemblance, like producing tiny flies that look like real insects. Some actually move around and make sounds like living bait. Hackers that develop phishing schemes use the same kind of ingenuity to invent new ways of fooling employees into clicking on infected emails and websites.

Read More


How to Secure the Blind Spots in Your Network

Posted by Security Tech Alliance on May 30, 2017 8:30:00 AM | Topics: Access Management, Firewall, Data Protection, Malware

In a previous blog, we explored the common blind spots in company networks. As networks increase in complexity, cyberattacks become more difficult to detect and prevent. Virtualized infrastructure and mobile endpoints make workplaces more efficient and flexible, but they also reduce network visibility and create opportunities for hackers to infiltrate your system. While encrypting your traffic protects your sensitive data from prying eyes, it can also prevent your security tools from seeing anomalous patterns that signal a breach.

Read More


3 Ways to Protect Your Network From Insecure Edge Devices

Posted by Security Tech Alliance on May 23, 2017 8:05:00 AM | Topics: Access Management, Data Protection, Firewall

Edge devices are crucial entry points to your network. Routers and modems enable users to connect with your system and allow your company’s computers to communicate with each other. Unfortunately, these entry points are like chinks in your armor that allow cybercriminals to gain access.

Read More

Blog Search

 AN INSIDER'S VIEW INTO 2017 CYBERSECURITY

Get this eBook covering three prominent threats faced by six critical industries.

Get Your eBook

SUBSCRIBE FOR A WEEKLY UPDATE OF NEW ARTICLES AND NEWS FROM THE SECURITY TECH ALLIANCE

Stay up-to-date with the latest cyber-security developments and threats facing organizations today. You will receive actionable information to keep your data and applications secure.