Trustwave report shows why security basics matter

trustwave

Following on from last week’s blog post on the Verizon Data Breach Investigations Report (DBIR), here are some thoughts on the latest report from Trustwave. The eight Trustwave Global Security Report analyzes hundreds of data compromise investigations done by the firm across 17 countries. The key takeaways?  Alarmingly, 97% of the applications tested by Trustwave…Read More

Miscommunication between IT and security teams leads to network security gaps

HiRes

If there has ever been a universal law that impacts network security it’s the saying: communication is not what’s said but rather what’s heard. IT and security professionals are often so busy putting out fires that so many things are said in passing often goes in one ear and out the other. Exacerbating the challenge, IT and security are known to have some strong personalities (I was once part of that club!).

Once more unto the breach:  lessons from Verizon’s Data Breach Investigations Report

verizon breach report 2016

In the infosecurity sector, spring is the season of reports, with several leading vendors (AlgoSec included) releasing detailed reports on industry trends and incidents. One of the most established is the Verizon Data Breach Investigations Report (DBIR), which analyzes the types and frequencies of security incidents globally over the previous year and provides security and networking teams with useful information on how to improve their organization’s security posture.

Finding the Right Security Management Solution for Your Organization: Hear from Real Users

Evaluating new security products in today’s world can be tough. Many CISOs and security professionals are seduced by the hype and promises of the shiny new security toys that are popping up like mushrooms. Yet more often than not, you don’t need to invest in these new tools. Just by getting back to basics and…Read More

Security is from Mars, Application Delivery is from Venus

Men are from Mars, Women are from Venus

Men Are from Mars, Women Are from Venus by John Gray was one of the best-selling nonfiction books of the 1990s. It asserts that men and women essentially come from different ‘planets’, and need to seek out greater understanding of each other’s wants, needs and ways of thinking in order to cooperate better in relationships….Read More

Happy World Password Day!

password

Passwords. They’ve been an integral part of information security since the dawn of computers – and they have been the bane of users’ lives for almost as long. We’ve all experienced the difficulties of trying to remember a dozen or more different passwords for different applications and devices, only to have to change them as…Read More

Announcing Our New Website: Take a Tour and Enjoy the New Experience!

algosec homepage

We’re proud to announce the launch of our new website! Our aim is to provide you with new and insightful content to help you make your enterprises more agile, more secure and more compliant. The website also reveals our new corporate identity as well as support for a mobile-optimized experience. To help you navigate the…Read More

Using Geo-IP Data to Tighten Firewall Rulesets

Geo-IP blocking, or denying internet traffic from or to a certain geographical location based off of an IP address can be a very useful tool for preventing cyber attacks, malware, phishing, or spam. One thing to look for when blocking by country is the ability to block by country code – it allows for more…Read More

Are Firewalls Still Relevant to Security?

“The firewall is dead”, “Data is the new perimeter”, “Cloud will make the firewall obsolete” – these are just some of the quotes you hear now and again within the information security community. But I would like to counter them with a quote adapted from (renowned cybersecurity expert) Mark Twain – “The reports of the…Read More

Is Your CIO Your Next Big Security Risk?

Risk_clevel

A few weeks ago we released the findings of our latest survey, examining the State of Automation in Security.  It showed that many companies are struggling. Struggling to rollout new business applications, struggling to migrate to the cloud or enter the software defined data era, struggling with outages, struggling to comply with regulatory requirements, and…Read More

A Typo in Security: The Bangladesh Heist Revealed

This year we have already seen multiple security breaches making headline news, such as the Panama Papers breach we wrote about earlier this week and the Bangladesh heist we are about to cover below. Let’s hope there aren’t any more breaches, but in the meantime learn how you can help protect your organization against cyber-attacks…Read More

The Panama Papers: Security Basics 101

panama papers leaked document money laundering crime vector

There has, unsurprisingly, been a vast amount of speculation as to the origins of the Panama Papers data leak. Initially it was thought to be an insider job, however a partner at Mossack Fonseca has now claimed they were the victim of hack, specifically a ‘spear phishing’ email attack. So far, so ordinary. Spear phishing…Read More