Categories
Risk Management

No Contact Normal: Solving the Payment Security Gap

Reading Time: 3 minutes

The coronavirus crisis is changing human behavior. From the persistent need for social distancing to the potentially permanent adoption of work-from-home mandates, the “new normal” is uncharted territory.

Categories
Risk Management

Going the Distance — Remote Work and Effective Cybersecurity in the Age of Coronavirus

Reading Time: 4 minutes

It’s official. COVID-19, more commonly known as the Coronavirus, has been declared a global pandemic by the World Health Organization (WHO) with hundreds of thousands of cases worldwide. In the United States, restrictions are ramping up as case numbers soar — New York governor Andrew Cuomo has ordered all nonessential workers to stay home, and my own state’s governor Mike DeWine has issued a statewide shelter-in-place order.

Categories
Risk Management

Our Commitment to Customers During the COVID-19 Outbreak

Reading Time: 2 minutes

At PreEmptive, we’re closely following the evolving Coronavirus (COVID-19) public health emergency, and our thoughts are with those affected and their families during this difficult time. 

Categories
Risk Management

RSA 2020 San Fransisco Recap

Reading Time: 3 minutes

Evolving Hazards, Emerging Hope and the Expanding Human Element

The theme at the RSA conference this year is the “Human Element” — the critical role of individuals in the efficacy of organizational security measures.

Categories
Risk Management

Non-Traditional Attack Vectors: Three Questions Every CISO Needs To Ask

Reading Time: 3 minutes

Malicious actors — like any thieves — live by a simple rule: If the front door is locked, break the window.

It’s why threats like fileless malware and crypto-jacking have seen substantial gains over last few years. It’s why — despite increasing employee education and IT training — hackers are still hooking phish by developing more sophisticated and authentic-looking email spoofs. Cybercriminal communities, meanwhile, continue to grow on the dark web, allowing attackers to share info, purchase exploit kits and identify potential targets.

Categories
Risk Management

No Beans About It: Why You Need JavaScript Obfuscation

Reading Time: 4 minutes

JavaScript is everywhere. It’s currently the world’s most popular programming language; as noted by GitHub, JavaScript has the highest number of contributors and repositories, handily outpacing other alternatives such as Python, PHP and Ruby.

Categories
Risk Management

Application Protection Rule #1: Why In-House App Obfuscation & Defense Doesn’t Measure Up

Reading Time: 3 minutes

Organizations can’t afford to leave apps unprotected. Attackers are growing more sophisticated, leveraging targeted malware campaigns and advanced evasion tactics to compromise applications and cause long-term damage.

Categories
Dotfuscator CE

Deliver on Digital Transformation Potential with App Protection-Forward Strategies

Reading Time: 4 minutes

Currently charging up the hype cycle slope? The rush to become a “technology-forward” organization.

But delivering on digital transformation potential demands more than buzzwords — along with C-suite support, end-user buy in and robust data defense, companies must develop “protection-forward” strategies to secure the IT front line: Applications.

Categories
Risk Management

Put the Protection in the App

Reading Time: 4 minutes

Untrusted Environments, Valuable Apps? Put the Protection in the App.

IT environments are evolving. Disappearing are the days of in-house, fixed-endpoint, limited access server stacks — replaced instead by a combination of private and public cloud solutions, mobile applications and IoT devices.

As noted by research firm IDC, public cloud spending now outpaces all other IT infrastructure with a growth rate topping 10 percent year-over-year, while Statista reports that users downloaded more than 178 billion apps in 2017 alone — and are on track to break 250 billion over the next few years.

Categories
Risk Management

Fly in Amber: What’s Bugging Infosec Architects?

Reading Time: 3 minutes

The life of a security architect is rarely simple. Assessing, defending and improving corporate networks requires thorough knowledge of industry best practices designed to secure critical data, combined with real-world understanding of hacker tricks and tactics meant to undermine this purpose.