Reputation management in the age of cyberattacks against businesses

Credit to Author: Jovi Umawing| Date: Thu, 14 Mar 2019 16:15:59 +0000

A business’s reputation takes years to build. With the current climate of data breaches, unsurprisingly, destroying it could only take seconds. What can businesses do to protect their brands from a fallout following a cybersecurity incident? In this post, we answer these questions and more.

Categories:

Tags:

(Read more…)

The post Reputation management in the age of cyberattacks against businesses appeared first on Malwarebytes Labs.

Read more

Incident Response In The Public Eye

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Mon, 31 Dec 2018 17:00:44 +0000

Cyberattacks happen constantly. Every day organizations are attackers online whether they realize it or not. Most of these attacks are passing affairs. The mere fact that systems are on to the internet makes them a target of opportunity. For the most part, these attacks are non-events. Security software, bugs in attack code, and updated applications…

The post Incident Response In The Public Eye appeared first on .

Read more

Building an incident response program: creating the framework

Credit to Author: Paul Kincaid| Date: Wed, 07 Mar 2018 17:00:32 +0000

An incident response plan does not need to be overly complicated. However, having a solid and tested framework for the program is key in the ability of an organization to respond to and survive a security incident.

Categories:

Tags:

(Read more…)

The post Building an incident response program: creating the framework appeared first on Malwarebytes Labs.

Read more

How to build an incident response program: GDPR guidelines

Credit to Author: Paul Kincaid| Date: Wed, 21 Feb 2018 09:00:00 +0000

With the General Data Protection Regulation (GDPR) going into effect this May, many organizations need to have a robust incident response program to ensure the safety of their customers’ and employees’ data. Here’s part one of our guidelines.

Categories:

Tags:

(Read more…)

The post How to build an incident response program: GDPR guidelines appeared first on Malwarebytes Labs.

Read more

Black Hat USA 2017 Recap

Credit to Author: Malwarebytes Labs| Date: Wed, 02 Aug 2017 21:54:05 +0000

Missed Black Hat USA 2017? Here’s a little recap of the event and the Malwarebytes booth.

Categories:

Tags:

(Read more…)

The post Black Hat USA 2017 Recap appeared first on Malwarebytes Labs.

Read more

Solution Corner: Malwarebytes Endpoint Protection

Credit to Author: Ken Liao| Date: Wed, 28 Jun 2017 15:00:28 +0000

Introducing Malwarebytes Endpoint Protection, our latest endpoint security solution for business. This latest release unifies a number of technologies onto a single agent on the endpoint and adds a new machine learning detection engine into our layered approach to protection.

Categories:

Tags:

(Read more…)

The post Solution Corner: Malwarebytes Endpoint Protection appeared first on Malwarebytes Labs.

Read more

A week in security (June 19 – June 25)

Credit to Author: Malwarebytes Labs| Date: Mon, 26 Jun 2017 15:27:04 +0000

A compilation of security news and blog posts from the 19th to the 25th of June. We touched on topics like Barclays phish, Robux scam, breaking the attack chain and Incident Response.

Categories:

Tags:

(Read more…)

The post A week in security (June 19 – June 25) appeared first on Malwarebytes Labs.

Read more

Solution Corner: Malwarebytes Incident Response

Credit to Author: Dana Torgersen| Date: Thu, 22 Jun 2017 19:40:41 +0000

Unless you’ve been stuck at a fiery music festival, I don’t need to tell you the threat landscape is constantly evolving and that threats have become increasingly sophisticated at evading detection. Recent Malwarebytes Labs reports, including the 2017 State of Malware shine a light on just how fast these threats continue to spread around the…

Categories:

Tags:

(Read more…)

The post Solution Corner: Malwarebytes Incident Response appeared first on Malwarebytes Labs.

Read more