Categories
Risk Management

Top 3 Cyber Attack Vectors During the Pandemic

Reading Time: 2 minutes

Cyber-attacks have increased in quantity and sophistication in 2020, but we may not have heard about them in the news. Covid-19 updates have dominated headlines, and our physical health and safety has taken the spotlight over our technology’s health and safety. While news of vaccines and outbreak hotspots will continue to be the most important “news of the day” – it is important to be aware of security breaches that threaten the safety of our data and privacy.

Categories
Risk Management

Protecting Utilities and Infrastructure with PreEmptive’s .NET Solution, Dotfuscator

Reading Time: 3 minutes

Protecting Industrial Internet Applications

Bayshore Network Case Study

Today’s utilities, factories and other infrastructure are exposed to high risk. The software that controls many of these entities is not protected. In the last 20 years, the way industrial environments operate has completely changed. Many industrial systems were designed with permissive set-ups that assume only the “right people” in the “right place” would ever give instructions. Past systems were not built with exposure to the internet in mind, and as a result they relied on this “air gap” to limit access to onlyauthorized personnel within the organization.

Categories
Risk Management

No Contact Normal: Solving the Payment Security Gap

Reading Time: 3 minutes

The coronavirus crisis is changing human behavior. From the persistent need for social distancing to the potentially permanent adoption of work-from-home mandates, the “new normal” is uncharted territory.

Categories
Risk Management

Going the Distance — Remote Work and Effective Cybersecurity in the Age of Coronavirus

Reading Time: 4 minutes

It’s official. COVID-19, more commonly known as the Coronavirus, has been declared a global pandemic by the World Health Organization (WHO) with hundreds of thousands of cases worldwide. In the United States, restrictions are ramping up as case numbers soar — New York governor Andrew Cuomo has ordered all nonessential workers to stay home, and my own state’s governor Mike DeWine has issued a statewide shelter-in-place order.

Categories
Risk Management

Our Commitment to Customers During the COVID-19 Outbreak

Reading Time: 2 minutes

At PreEmptive, we’re closely following the evolving Coronavirus (COVID-19) public health emergency, and our thoughts are with those affected and their families during this difficult time. 

Categories
Risk Management

RSA 2020 San Fransisco Recap

Reading Time: 3 minutes

Evolving Hazards, Emerging Hope and the Expanding Human Element

The theme at the RSA conference this year is the “Human Element” — the critical role of individuals in the efficacy of organizational security measures.

Categories
Risk Management

App Security: It’s a New Year! What’s New About It?

Reading Time: 4 minutes

Unlike Y2K, 2020 was not preceded by waves of doomsday predictions, hype and frenetic IT overhauls. Developers are still under pressure to produce more, in less time, and at a lower cost, enterprises are as committed to their love/hate relationship with software as ever, and app users still expect perfection. 

Categories
Risk Management

Non-Traditional Attack Vectors: Three Questions Every CISO Needs To Ask

Reading Time: 3 minutes

Malicious actors — like any thieves — live by a simple rule: If the front door is locked, break the window.

It’s why threats like fileless malware and crypto-jacking have seen substantial gains over last few years. It’s why — despite increasing employee education and IT training — hackers are still hooking phish by developing more sophisticated and authentic-looking email spoofs. Cybercriminal communities, meanwhile, continue to grow on the dark web, allowing attackers to share info, purchase exploit kits and identify potential targets.

Categories
Risk Management

Q&A with PreEmptive CEO Gabriel Torok

Reading Time: 5 minutes

Gabriel, you have been in the security industry for over 2 decades. You have seen many different tools and services. Why create a company around something as specific as obfuscation and in-app protection? 

Our customers build a lot of really innovative apps that enable their users and customers to do new and cool things. These apps frequently run on untrusted client computers/devices and they control access to customer’s sensitive data or critical devices.

Categories
Risk Management

The Secret to Effective In-App Protection

Reading Time: 4 minutes

Gartner calls In-App Protection “crucial” in their July 2019 Market Guide for In-App Protection. The guide’s summary advises security and risk management leaders to “take due care in protecting their application clients” in order to avoid “security failure.”