The Cybersecurity Canon: America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare

We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  […]

Continue Reading

Internet of Things—The Fate We Make for Ourselves

The fantasy once associated with science fiction films is becoming increasingly similar to modern life. The first Terminator movie introduced some cybersecurity concepts. In addition to introducing the topics of social engineering, vulnerability management and computer malware, the latest film in the saga has introduced the topic of the Internet of Things (IoT). These movies […]

Continue Reading

Attack Campaign on the Government of Thailand Delivers Bookworm Trojan

Unit 42 recently published a blog on a newly identified Trojan called Bookworm, which discussed the architecture and capabilities of the malware and alluded to Thailand being the focus of the threat actors’ campaigns. In this blog, we will discuss the current attack campaign along with the associated threat infrastructure and the actor’s tactics, techniques […]

Continue Reading

Customer Spotlight: A More Secure Cloud Means Better Service from Nexon

Nexon Asia Pacific, a Palo Alto Networks Managed Security Service Provider (MSSP), has about 120 staff across offices in Sydney, Melbourne and Brisbane. The Australia-based company covers about 200 enterprise clients, offering managed networking, telephony, and in recent years, cloud and application services. What Nexon sought — and found with Palo Alto Networks — was a way to manage […]

Continue Reading

3 Steps of Cloud Security Adoption

Cloud adoption is trending—and it is an inevitable choice for any enterprise that wants to stay relevant in today’s interconnected world. The security of storing and processing critical data outside of the enterprise’s control is a central factor to the analysis of cloud adoption. So whether your organization employs a cloud-first strategy or is still […]

Continue Reading
1 2 3 11
%d bloggers like this: