Search
Close this search box.

Blog

Insights on Data Security & Threat Intelligence

What Is Data Discovery and Why Should I Use It?

What Is Data Discovery and Why Should I Use It? The brain is an amazing organ. It weighs about 3 ½ pounds and consists of two hemispheres, 100 billion neurons, and 100 trillion synapses: the command and control center for each of us. The brain controls autonomous functions like heartbeats

Read More >

What Is Data Discovery and Why Should I Use It?

What Is Data Discovery and Why Should I Use It? The brain is an amazing organ. It weighs about 3 ½ pounds and consists of two hemispheres, 100 billion neurons, and 100 trillion synapses: the command and control center for each of us. The brain controls autonomous functions like heartbeats

Read More >

Corporate Compliance Insights Guest Post

Corporate Compliance Insights Guest Post 3 Hidden Traps Associated With GDPR Avoiding the Challenges to Ensure Compliance From the Corporate Compliance Insights Blog:Many companies aren’t ready for the looming GDPR deadline, and they face real hurdles in getting to “compliant.” FileFacets, an enterprise analytics and privacy compliance platform that makes

Read More >

Ransomware-as-a-Service Is Making Crime Easy

It shouldn’t surprise anybody to learn that cybercriminals are taking their lead from some established business service models. We wrote about Botnet distribution services here, and the concepts apply equally to other corners of the malware “industry.” In February 2016, the “Cerber” ransomware first appeared in the form of Ransomware-as-a-Service

Read More >

Best Practices for Stopping Ransomware

With the recent return of Locky and continued growth of ransomware and ransomware-as-a-service, there is a good chance you personally know an individual or company that has experienced such an attack or another similar threat. If you work in the computer or security industry, you might also often be asked

Read More >

What is PII? What Should We Do About It?

What is PII? What Should We Do About It? Dreams and fantasies are often referred to as “pie in the sky” thinking—nice to ponder, but, realistically speaking, not likely to happen. A generation ago we would have thought the digitization of info would usher in a Utopian paperless age when

Read More >

New Cyren Threat Report: The Malware Wars

If you want to know what a cyber-war looks like, read the news. And if you want to get up to speed quickly and try to make sense of all that news, I recommend downloading our new special report on malware, with a special nod to the included interview of

Read More >

Trickbot Banking Trojan Making Phishing More Real

Trickbot is back, new and improved, and was found targeting customers of Lloyds Bank of the UK last week in a renewed phishing campaign intended to steal online banking users’ security codes. The updated version of the malware, which first appeared last year, uses new techniques to make it even

Read More >

What is a Botnet Attack? 6 Ways to Identify and Prevent It

  Botnets have become a trend in 2022 and will likely continue to be a threat in 2023. According to Spamhaus’s Q4 2021 Botnet Threat Update, they reported there was a 23% increase in botnet C&C attacks from Q3 to Q4 in 2021. Additionally, there were 300,000 instances of Emotet

Read More >