To attract attackers, decoys are made to resemble the target systems as
closely as possible. They have the look and feel of systems that an attacker
seeks. Intelligent deception solutions actively lure attackers to the decoys
once they have penetrated the perimeter. These lures, or breadcrumbs, e …
READ MORE
This report, conducted by SC Media and sponsored Fidelis asked security
leaders, decision makers and influencers what they were most concerned about,
what their C-Suite was most concerned about, and what they’re doing (or
planning to do) about it. As we start off 2018 it is clear that cybersecu …
READ MORE
Deception is becoming a critical part of organisations' security
infrastructure. According to Gartner, the need for better detection and
response is creating new opportunities for security stack automation,
integration, consolidation and orchestration, while also driving the
emergence of new seg …
READ MORE
Update:
Fidelis has released a script for Fidelis Endpoint customers that allows
users to quickly query their environment to check for the existence of the OS
patches in addition to the hardware mitigations and optimizations in relation
to Spectre/Meltdown. This allows for quick reporting across …
READ MORE
Cybercrime is a growing threat in today’s hyper-connected age. Breaches
grew 15% between 2016 and 2017 (ITRC 2016, ITRC 2017). Meanwhile he average
cost of a data breach blossomed to over $7 million according to a new Ponemon
study and cybercrime damages are slated to cost the world $6 trillion …
READ MORE
Faster Detection and Response Is a Priority
In security, there is an emphasis on getting it right, but less so on the
importance of speed. Similar to an aeroplane cockpit, where there are
simulations from multiple screens, flashing lights and beeping noises,
Security Operations Centres (SOC) ofte …
READ MORE
This article originally appeared in October on Clutch.co
https://clutch.co/it-services/cybersecurity/resources/how-to-improve-cybersecurity-for-business
Cybersecurity occupies a dark place in the public conscious. There are rarely
(read: never) news stories that celebrate the strength of a company …
READ MORE
Lessons we can learn from UBER on Incident Response and the implications of
GDPR.
The technology world could refer to the last Decade as “10 years of the
breach”. At first, they were monthly, then fortnightly, weekly and now
almost daily – with companies who have come out with their hands …
READ MORE
In June 2017, Fidelis Cybersecurity was alerted to a new banking trojan that
appeared to be doing very small delivery campaigns for testing purposes. This
malware has since been named IcedID by IBM(1), and remains alive in an
ongoing development cycle. IBM’s own report provides a good overview …
READ MORE