2017

Five Ways to Outsmart the Hacker Mindset

July 5, 2017 · steveverbanic · · Comments

In our previous blog, “Think Like a Hacker to Stop Cyber Crime,” we addressed the hacker mindset and how by gaining an understanding of cyber criminals’ motives and tactics, organizations can stop threats at any point in the attack cycle. Beyond just applying hackers’ tactics to technical infosec activities, organizations need to develop a holistic […]

Read More

Think Like a Hacker to Stop Cyber Crime

July 5, 2017 · steveverbanic · · Comments

As the saying implies, it takes a thief to catch a thief. The same goes with cybersecurity. To stop hackers from compromising or stealing digital assets, you have to think like one—which involves anticipating their moves and identifying their targets. Profile of the Modern Hacker The profile of people who break into computer systems has […]

Read More

WannaCry Microsoft Vulnerability Attack – What Happened and How to Protect Your Organization?

May 15, 2017 · steveverbanic · · Comments

Last week the largest ransomware campaign in history was launched. The “WannaCry” malware targets a known vulnerability in Windows. However, what sets this malware apart is that it is spread with no interaction with users (a worm). As a result, over 200,000 users were victimized in about 150 countries. Despite the discovery and execution of […]

Read More

Choosing the Right SIEM Solution

April 11, 2017 · steveverbanic · · Comments

Concurrent with the ongoing digitization of organizations large and small, cybercrime is on the rise. Consider the following statistics: According to the 2016 Verizon Data Breach Investigations Report, more than 100,000 security incidents were reported in 2015. Approximately 3,000 were confirmed as data breaches. A report released in January 2017 showed that in 2016, the […]

Read More

The Essential NetApp Manager’s Toolkit

April 11, 2017 · steveverbanic · · Comments

The impressive growth of data combined with migration to the cloud and increasing virtualization all require dedicated resources and centralized planning further challenging today’s DBAs to upgrade and modernize data storage infrastructures and provide peak performance. NetApp’s newly integrated tools including the NetApp OnCommand Performance Manager (OCPM) and OnCommand Unified Manager (OCUM), enable better management […]

Read More

5 Building Blocks for Effective Intent-based Network Security

March 27, 2017 · steveverbanic · · Comments

The Internet of Things (IoT) is here, and it’s driving big changes in enterprise networks. Gartner finds that nearly half (43%) of businesses worldwide planned to have some kind of IoT implementation by the end of 2017, with average deployment sizes in the billions. How can IT effectively keep the network secure and up and […]

Read More

Building A Culture of Security In Business

February 13, 2017 · steveverbanic · · Comments

One of the biggest risks to business network security is the everyday behavior of the people that interact with it. The growing acceptance of this reality has made cybersecurity awareness — a core component of any network protection strategy. As you take steps to build a more cohesive culture of security at your organization, it […]

Read More

3-Point Endpoint Protection Primer

January 25, 2017 · steveverbanic · · Comments

Attackers always take the path of least resistance. Today that path is clearly through the endpoint. As recent SANS research shows, user actions at the endpoint represent the most common way threats enter organizations today, with 75% entering via a malicious email attachment, 46% executed by users clicking malicious links in email, and 41% involving […]

Read More

Reality Check: # 2017 Cybersecurity Predictions

January 25, 2017 · steveverbanic · · Comments

Ransomware, attacks from sovereign nations, botnets taking down sites on two continents – the cybersecurity industry saw dramatic changes in the landscape in 2016. Now that we’re almost a month into 2017, it’s time to get real about what’s coming. Trends that shaped 2016 It’s hard to look at the year past and pick out […]

Read More

Higher Education and Cloud: What Are the Challenges?

January 3, 2017 · steveverbanic · · Comments

A complex mix of funding schemes, applications, users, devices and more all conspire to make managing IT in today’s higher education environments more of an art than a science. Faced with the need to provide more services, to more constituencies more securely and cost-effectively, institutions increasingly turning to cloud solutions. Higher education is quickly migrating […]

Read More