Press Clippings 2018
Click on thumbnails to view full articles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . … More Press Clippings 2018
Click on thumbnails to view full articles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . … More Press Clippings 2018
I hope you’re reading this at a time when you’re not in the midst of a response to an actual breach, but rather for your own edification, during a time of relative peace and quiet. If people are out there doing internet searches on “what to do after a breach” to learn what to do … More Now is the best time to craft your breach response
Fresh from peering into our crystal ball and outlining some of the trends that we expect to dominate the cyber-landscape in the coming year, we will now offer a snapshot of 2017. In a way, this year may be seen as a ‘year of wake-up calls’. Alarm bells barely stopped ringing as we kept waking up to … More Cybersecurity review of 2017: The year of wake-up calls
The Sednit group — also known as Strontium, APT28, Fancy Bear or Sofacy — is a group of attackers operating since 2004, if not earlier, and whose main objective is to steal confidential information from specific targets. This article is a follow-up to ESET’s presentation at BlueHat in November 2017. Late in 2016 we published a white paper covering Sednit activity … More Sednit update: How Fancy Bear Spent the Year
On Thursday 14 December 2017 the Federal Communications Commission (FCC) voted to repeal the rules, known as Net Neutrality, that regulate Internet Service Providers (ISPs), the companies that connect us to the internet. What is Net Neutrality and why should we care? The principle behind Net Neutrality is simple: it requires ISPs to treat all data on … More Why we should fight for Net Neutrality