Tag: EN

Following in Mitre’s footsteps and malware behavior

The MITRE framework helps all defenders speak the same language regarding attackers’ modus operandi. VirusTotal provides multiple data points where MITRE’s Tactics and Techniques are dynamically extracted from samples when detonated in our sandboxes. In particular, samples’ MITRE mapping can…

Attacker Breakout Time Falls to Just One Hour

It now takes threat actors on average just 62 minutes to move laterally from initial access, Crowdstrike claims This article has been indexed from www.infosecurity-magazine.com Read the original article: Attacker Breakout Time Falls to Just One Hour

Silicon In Focus Podcast: Connectivity in Orbit

Welcome to the Silicon In Focus Podcast, where we bring you the latest insights and discussions at the intersection of technology and innovation. In today’s episode, we’re diving into the fascinating world of 5G satellite communications. This article has been…

A common goal for European cyber security

Complying with the EU’s NIS2 Directive Webinar  It was growing threat levels and an increase in reported cybersecurity attacks since digitalization which pushed the European Union to introduce the original Network and Information Security (NIS) Directive in 2016.… This article…

2024’s Cyber Battleground Unveiled: Escalating Ransomware Epidemic, the Evolution of Cyber Warfare Tactics and strategic use of AI in defense – Insights from Check Point’s Latest Security Report

Key Takeaways: ·        Rising Threats: Cybersecurity landscape faces an unprecedented surge in ransomware attacks, with 1 in every 10 organizations globally being targeted in 2023. ·        Evolution of Tactics: Adversaries exploit zero-day vulnerabilities, employ disruptive wipers, utlise emerging RaaS (Ransomware-as-a-Service)…

Hybrid Mesh and the Check Point Infinity Platform

Gartner has recently recognized Check Point as a Representative Vendor for Hybrid Mesh Firewall Platforms (“Hybrid Mesh”). This blog explores what hybrid mesh is and how the Check Point Infinity Platform delivers on the promise of a cyber security strategy…

Quebec Law 25: All You Need to Know

Quebec Law 25 regulates how companies operating in Quebec manage people’s data. Read here on the law’s key requirements and how to comply. The post Quebec Law 25: All You Need to Know appeared first on Scytale. The post Quebec…

Navigating NIS2 requirements with Microsoft Security solutions

​​NIS2 is the most comprehensive European cybersecurity directive yet, covering 18 sectors and 160,000+ companies. The Zero Trust principles addressed by Microsoft Security solutions can help you protect your organization and meet NIS2 requirements. The post Navigating NIS2 requirements with…