Blog

Insights on Data Security & Threat Intelligence

Trust, security and privacy in IoT

I attended two workshops in February, IEEE End-to-End Trust and Security Workshop for the Internet of Things; and IEEE Experts in Technology and Policy (ETAP) Forum on Internet Governance, Cybersecurity and Privacy. I gave a brief presentation at the IoT workshop on how what we’re doing at Resilient relates to the emerging IoT space.

Read More >

Introducing CYREN’s 2016 Cyberthreat Report

Detection is NOT the New Prevention There is a false perception that sophisticated attacks are too difficult to prevent and the only alternative is detection. But detection is NOT the new prevention. Cybersecurity professionals must make it their mission to STOP attacks, not just become proficient at detecting them. It’s

Read More >

NCRIC Achieves Mission Critical Information Sharing

NCRIC centralizes the intake, analysis, and distribution of criminal and homeland security intelligence for approximately 300 organizations, encompassing 15,000 users. Providing their users with on-demand, real-time, secure access to sensitive information is the core of their mission, and also their biggest challenge. “Resilient helped us achieve our mission critical goal of

Read More >

How to Target Security in Your ECM

How to Target Security in Your ECM Role-Based Access Can Simplify and Strengthen ECM Security Congratulations—your organization has adopted a much-needed, corporate-wide mandate to implement an Enterprise Content Management (ECM) system. Your mission, which you are happy to undertake, is to deal with all the issues that you face everyday

Read More >

Protecting Privacy: Easy as PII?

Protecting Privacy: Easy as PII? Psssst! Can you keep a secret? This simple childhood whisper magnifies an importance in the growing awareness of how organizations maintain the confidentiality of information they receive from individuals. The electronic world overflows with countless bytes of personal information. Online, people input all types of

Read More >

You Got Crypto Mail

In a spam campaign that we have been seeing at the end of the year, malware actors were sending out Courier Delivery Notification themed e-mails to lure users into falling prey to the infamous CryptoWall ransomware.  These attached zip files in these e-mails contained malicious javascript files, which were lamely

Read More >

Law Enforcement Information Sharing Panel at IJIS Symposium with Resilient, Regional Information Sharing Systems and Symantec

We are very excited to be part of an expert panel at the IJIS Institute’s National Symposium. Title: Balancing security, convenience and mission success: A path forward for information safeguards and sharing through Identity ManagementWhen: January 20th, 2016Where: Crystal Gateway Marriott in Arlington, VATime: 4:20-5:20pm, Salon J, Track 2 Creating the right safeguards to be

Read More >