latest insights

seculert blog

Unsplashed background img 1

Seculert Emphasizes Visibility for Security Executives [Product Update]

Through a new dashboard, IT executives can gain visibility into the cyber threats successfully targeting their organization and benchmark effectiveness of their response processes.

read more
Nov 10, 2015 12:11:56 PM

What to Look for in Machine Learning Based Security Solutions

After a relentless stream of high profile data breaches, the spotlight is on corporations to improve their security operations. As the recent disclosure from Experian demonstrated, even enterprises with the most sophisticated prevention layers are vulnerable. Most CISOs are now searching for “post-prevention” systems that can provide visibility on active attacks that have defeated their prevention systems.

read more

DGA.Changer Playing The Imitation Game With Sandboxes

Seculert researchers closely follow the evolution of major malware families while examining the behavioral malware profiles that are a core part of our breach analytics platform. Back in 2013 I wrote about the enhancements to the DGA.Changer malware that allowed it to change its seed which in turn allowed  it to connect to a different stream of domain names.

read more

Network Breached? Ask Yourself these 3 Questions within the First 48 Hours

In an article for Bankingtech.com, Peter Cheney, the director of cybersecurity at independent global risk and strategic consulting firm Control Risks, has identified three essential questions that he believes enterprises must ask within the first 48 hours after a network breach:

read more

Network Breached? Ask Yourself these Key Questions within the First 48 Hours

In an article for Bankingtech.com, Peter Cheney, the director of cybersecurity at independent global risk and strategic consulting firm Control Risks, has identified three essential questions that he believes enterprises must ask within the first 48 hours after a network breach:

read more

Cybersecurity’s Weakest Link? Employees

About 15 years ago, a game show took public humiliation to new heights (or depths, depending on one’s perspective) by branding unsuccessful contestants as the weakest link in the group. They were then ushered offstage to the tune of the most soul-crushing “goodbye” in television history by the host.

read more

Cyber Attacks Beating 54% of Organizations Says Survey

A survey of 500 IT decision-makers in UK enterprises (250+ employees) has revealed that 54% lack the knowledge and capacity required to thwart sophisticated cyber attacks.

read more

Cybersecurity’s Weakest Link? Employees

About 15 years ago, a game show took public humiliation to new heights (or depths, depending on one’s perspective) by branding unsuccessful contestants as the weakest link in the group. They were then ushered offstage to the tune of the most soul-crushing “goodbye” in television history by the host.

read more

Cyber Attacks Beating 54% of Organizations Says Survey

A survey of 500 IT decision-makers in UK enterprises (250+ employees) has revealed that 54% lack the knowledge and capacity required to thwart sophisticated cyber attacks.

read more

Malware Slips by Prevention-Based Security Software

An automated and independent malware testing service has taken a quick break from analyzing malware such as worms, information stealers, and rootkits so that it can crunch some numbers — and the news isn’t good for enterprises that rely exclusively on prevention-based security software packages.

read more

Subscribe to Email Updates

Contact Us

Unsplashed background img 2