Security as a Service

According to Ernst & Young’s 19th Global Information Security Survey 2016-17, some 57 percent of American businesses have recently experienced a significant cybersecurity incident, with 69 percent saying the budget to address cyber threats is half of what is needed.  According to researchers, many cyber criminals have reacted to the improved defense capabilities of large enterprises, by refocusing their efforts on targeting comparatively easier prey: small and medium-sized businesses. IBM’s Ponemon Institute has reported that 62 percent of all cyber attacks are made against small and medium-sized businesses because they simply do not have the resources necessary to implement a robust…

Read more

Graph Analytics: A Big Data Tool for Analyzing Relationships

Graph analytics is used to study relationships between the nodes of a network. Nodes are graphically depicted as points and can represent individual people, objects, computers, or anything capable of interacting with other nodes. An interaction is represented with an arrow that connects two nodes. The arrow points from the node that initiates the interaction to its recipient. The arrows also indicate the strength of the interaction. Strength is sometimes depicted by the arrow’s thickness. What is meant by strength depends on the nature of the interaction. If the interaction is a force between two magnets, then its strength is the magnitude of the…

Read more

Cyber Defense- How GIP and Cylance Can Help Protect You:

AND YOU THOUGHT IT WAS OVER? The hacker-creators of the WannaCry (a.k.a. WannaCrypt) ransomware virus have evolved their botnet worm without the “kill switch” that a 22 year-old computer researcher stumbled upon late Friday.  The three reported variants as of Monday, May 15, all employ the endpoint exploitation tools of phishing and embedded documents. “We may still see significant impacts on additional networks as these malware attacks morph and change,” said Tom Bossert, the White House Homeland Security advisor, Monday.  He said, “The worm is in the wild,” before raising what could only be characterized as the alarm to batten…

Read more