Meet Ellen. As CISO for a regional bank, she spends her time spreading security awareness, coaching her managers, and supporting the selection of security tools. Ellen doesn’t know that her bank has been compromised, or that a nation-state has been funneling data out of her network with impunity. After three years of pleasant ignorance, Ellen […]
Corporate network breaches are happening all the time, but finding out about them can be difficult for anyone outside of the company. This lack of transparency poses a significant problem for many interested parties, but it’s particularly challenging for the compliance industry.
ESET has analyzed the operations of Evilnum, the APT group behind the Evilnum malware previously seen in attacks against financial technology companies. While said malware has been seen in the wild since at least 2018 and documented previously, little has been published about the group behind it and how it operates.
When conducting an audit of your cybersecurity plans, it’s important to reassess risk and evaluate whether established policies and procedures are both effective and actionable. To aid in cyber compliance, CSO Online said the updated compliance guidelines issued by the Department of Justice, “has particular relevance to the cybersecurity practices of organizations when it comes […]
Introduction For quite some time we at Prevailion have been speaking publicly to the nature of the differences between Prevailion and other vendors in the threat intelligence market, and for good reason. There are two key concepts at the forefront of every discussion that I and my peers have when discussing who we are, what […]
With the new world of widespread remote work, you might be especially eager to consider a job offer or listing that promises that you can work from home. But you should be especially cautious, too.