cybersecurity

Big Data Analytics for Cyber? Combating the Zero Day Threat

Avoiding a surprise attack from an opponent is difficult and nearly impossible to counter, as we’ve seen throughout history in examples of sports, chess, and warfare. In the cyber domain, this holds true for zero-day attacks or "surprise moves" as well. As cyber attackers refine their tactics and employ both evasive attack avenues and [...]

2019-10-08T14:32:16-04:00October 8th, 2019|Categories: Data Analytics, Security|Tags: , , |

MIDMRKT Local – Event Summary

In the new series MIDMRKT Local, Symantec and MIDMRKT Suite partner to bring together local IT executives for interactive discussions on cybersecurity. Thus far, we’ve met with nearly 100 executives in the following cities: Alexandria, Virginia Salt Lake City, UT Minneapolis, MN Milwaukie, WI Here’s a recap of what we’ve learned thus far! There [...]

2019-10-01T17:03:13-04:00March 18th, 2019|Categories: MIDMRKT Local, Security|Tags: |

Keeping Pace with Network Security and Compliance

In the next five to ten years, we can safely predict that industry and our daily lives will be further affected by game-changing innovations in technology. AI, machine-learning, virtual reality, IOT – all of these have and will continue to change the way we interact with customers, business partners, and even our close friends. [...]

2019-10-01T17:03:22-04:00March 4th, 2019|Categories: Networking, Security|Tags: , , |

Safeguarding against social engineering attacks

Social engineering attacks have been on the rise in the last year, and staying a step ahead of cyber criminals continues to tax the resources of midmarket IT teams. These specialized phishing attacks with a high rate of success continue to catch users off guard. The risks Social engineering attacks, most commonly distributed via email, [...]

2018-05-11T06:21:18-04:00May 11th, 2018|Categories: Blog|Tags: , , |

Two KPIs Essential for Measuring Security Tools

Last month I discussed cybersecurity effectiveness, particularly in regards to the growing threat of fileless attacks. But effectiveness is only one piece of the equation. First and foremost businesses still need to go about their business. Unfortunately, it has long been the case that the more effective a cybersecurity tool is, the slower and more [...]

2017-09-26T13:33:05-04:00September 26th, 2017|Categories: Blog, Security|Tags: , , |

The Question of Advanced Attack Protection – Reframed

Arthur Braunstein is VP US Sales at Morphisec Getting good answers and outcomes often depends on asking the right question. The following question recently crossed my desk: “What is the best tool for detecting advanced cyberattacks, including fileless attacks?” Asked like this, the question suggests the only way to protect yourself from advanced [...]

2017-09-28T13:34:06-04:00August 29th, 2017|Categories: Blog, Security|Tags: , , |

Top 5 cybersecurity challenges for the midmarket

For years, midmarket companies had the luxury of not being the primary target of cyberattacks. Recent events, like the rapid spread of the WannaCry ransomware, show that SMBs can no longer rely on larger targets attracting the attention of hackers. Network security costs $178,000 a year for a typical mid-tier business, and this average budget [...]

2017-08-17T11:32:24-04:00August 17th, 2017|Categories: Security|Tags: , , , , |