How security orchestration improves detection and response

Credit to Author: Pieter Arntz| Date: Wed, 02 Oct 2019 19:20:10 +0000

Security orchestration is a regulator that makes sure security solutions, often from different vendors, work well together to automate response and keep organizations safe.

Categories:

Tags:

(Read more…)

The post How security orchestration improves detection and response appeared first on Malwarebytes Labs.

Read more

Explained: how security orchestration improves protection and response

Credit to Author: Pieter Arntz| Date: Wed, 02 Oct 2019 19:20:10 +0000

Security orchestration is a regulator that makes sure security solutions, often from different vendors, work well together to automate response and keep organizations safe.

Categories:

Tags:

(Read more…)

The post Explained: how security orchestration improves protection and response appeared first on Malwarebytes Labs.

Read more

Explained: war shipping

Credit to Author: Pieter Arntz| Date: Tue, 08 Oct 2019 19:15:46 +0000

War shipping is a tactic already in use by Red teams, and is a growing opportunity for cybercriminals to compromise business networks. Learn how war shipping works and how to protect your organization from it.

Categories:

Tags:

(Read more…)

The post Explained: war shipping appeared first on Malwarebytes Labs.

Read more

Explained: security orchestration

Credit to Author: Pieter Arntz| Date: Wed, 02 Oct 2019 19:20:10 +0000

Security orchestration is a regulator that makes sure security solutions, often from different vendors, work well together to automate response and keep organizations safe.

Categories:

Tags:

(Read more…)

The post Explained: security orchestration appeared first on Malwarebytes Labs.

Read more

Knowing when it’s worth the risk: riskware explained

Credit to Author: Jovi Umawing| Date: Thu, 23 May 2019 19:22:47 +0000

Riskware is a type of software that, while considered legitimate, can still put users at risk in some way. Learn why anti-malware vendors detect it, and how to tell whether the apps you use are riskware or not.

Categories:

Tags:

(Read more…)

The post Knowing when it’s worth the risk: riskware explained appeared first on Malwarebytes Labs.

Read more

Stop telephoning me-eh-eh-eh-eh: robocalls explained

Credit to Author: Jovi Umawing| Date: Thu, 01 Feb 2018 19:11:47 +0000

The Federal Communications Commission (FCC) has identified robocalls as the number one complaint from the public. In this post, we tell you what you need to know to protect against the nasty ones.

Categories:

Tags:

(Read more…)

The post Stop telephoning me-eh-eh-eh-eh: robocalls explained appeared first on Malwarebytes Labs.

Read more

Explained: the cloud

Credit to Author: Pieter Arntz| Date: Tue, 14 Nov 2017 18:24:53 +0000

The cloud. What is it? What are the pros and cons, and how can we make it as safe as possible? This post covers the basics.

Categories:

Tags:

(Read more…)

The post Explained: the cloud appeared first on Malwarebytes Labs.

Read more

Out of character: Homograph attacks explained

Credit to Author: Malwarebytes Labs| Date: Fri, 06 Oct 2017 15:00:10 +0000

Online and on traditional media, we hear and read about different kinds of cybersecurity attacks that sometimes we get overwhelmed with the terminologies. Most of us grasp what phishing attacks and denial of service (DoS) attacks are, but how familiar are we wit

Categories:

Tags:

(Read more…)

The post Out of character: Homograph attacks explained appeared first on Malwarebytes Labs.

Read more