Cloud migrations and usage have numerous benefits; as adoption increases, the manageability, specifically security operations, faces numerous challenges. There are a number of factors considered when choosing a cloud service provider. This ‘Trust’ factor is a combination of multiple things such as: compliance certification (HIPAA, PCI-DSS, NIST 800-53, GAPP, COBIT,… Read More
The Cylance team at Emergent provides solutions in both the public and private sectors. Cylance solutions include the core next-generation antivirus CylancePROTECT, as well as add-on offerings ThreatZERO and CylanceOPTICS. We have sold to an independent agency, a department within a significantly larger commercial entity, as well as a growing… Read More
In one of our past blog posts we discussed malware and provided solutions to protect your assets. In this post we will be taking a deeper look at the dangerous features of mutated malware. This year, we have seen an increased use of mutated malware and code injection into… Read More
Be sure to check out Part 1 and Part 2 of this series before you continue. Ransomware and Cryptolocker Ransomware, a type of malware, prevents users from accessing systems. Upon infection, it forces a payment in virtual currency like Bitcoins before access is granted. Cryptolocker, a Ransomware, encrypts… Read More
In Part 1, we saw a few examples with dark web storefronts offering stolen data. In this post, Part 2, we will be discussing malware (software that is intended to damage or disable computer and computer systems), and solutions to protect your assets from one of our partners in cyber security,… Read More
WHAT IS THE DARK WEB? The Internet - an invaluable asset to everyone, a place where you have access to information at your fingertips with just a click of a mouse. But what do we REALLY know about the information we find and post online? There is more to the Internet… Read More