OnPage News: Security Attacks

Security Attacks

OnPage Corporation is the Secure Messaging/Critical Alerts Leader: Learn More… Security attacks? New defenses in 2016 escape compromise. Article Courtesy of:  TechTarget Worried that attackers may know your infrastructure better than you do? Cyberthreats are learning fast from defenses that detect them. New strategies focus on what happens next.   Arden Peterkin has little faith that antivirus software can be effective against today’s cyberthreats. In the past, the security architect deployed antivirus software on 80,000 endpoints in a large Georgia school district’s network to prevent a security attack. While the software reported “all clear,” a quick look at the device logs for the network confirmed infected systems were still communicating with known command-and-control sites. “The actual management console was showing that everything was great, but when we looked at the logs, they showed that the network was totally infected,” says Peterkin, a security contractor with Reamer & Associates. Today, Peterkin […] Read more »

OnPage News: Data Security Analytics

Data Security Analytics

Five factors for evaluating big data security analytics platforms Article Courtesy of:  TechTarget Expert Dan Sullivan outlines criteria for evaluating big data security analytics platforms for collecting, analyzing and managing large volumes of data generated for information security purposes. Increasing risks of cybercrime and other malicious activity on the Internet is prompting enterprises to deploy more security controls and collect more data than ever before. As a result, advances in big data analytics are now being applied to security monitoring for broader and more in-depth analysis to protect valuable company resources. Called big data security analytics, this technology — in part — leverages the scalability of big data and combines it with advanced analytics and security event and incident management systems (SIEM). As we noted in the last article in this series, big data security analytics is appropriate for many, but not all, use cases. Consider the challenges of detecting […] Read more »