2016 Prediction #14: Six Cybersecurity Predictions for Asia-Pacific

This is the fourteenth, and final, in our series of cybersecurity predictions for 2016. Stay tuned for more through the end of the year. 1. Ransomware Ransomware will continue to evolve its methods of propagation and evasion techniques, hiding its communication and the targets it seeks. As reported by the Cyber Threat Alliance, ransomware has […]

Continue Reading

ProxyBack Malware Turns User Systems Into Proxies Without Consent

Anonymous proxies play an important role in protecting one’s privacy while on the Internet; however, when unsuspecting individuals have their systems turned into proxies without their consent, it can create a dangerous situation. Palo Alto Networks researchers recently discovered a family of malware, designated ProxyBack, and observed over 20 versions that have been used to […]

Continue Reading

The Cybersecurity Canon: Information Warfare: Chaos on the Electronic Superhighway

We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  […]

Continue Reading

2016 Predictions #13: Security with Agility for Firewalls and Applications

This is the thirteenth in our series of cybersecurity predictions for 2016. Stay tuned for more through the end of the year. Addressing the evolving threat landscape is a key factor in security, but organizations also want security that can keep up with the new, distributed and dynamic environments that they are building and adopting. […]

Continue Reading

Recruiting For Diversity: How IT Can Welcome New Leaders in 2016

It’s a great year for those with IT skills with the demand booming, but hiring managers are finding themselves up against a wall when it comes to the supply side of the equation – there just isn’t enough talent to go around. Or so it seems. So while those who fit the normal IT profile […]

Continue Reading
1 2 3 9
%d bloggers like this: