Category: Blog

Malware Goes Currency Mining with Your CPU

If you find your CPU spiking while browsing some website, it may be you’ve just loaned your computer resources to a virtual currency mining operation. The Pirate Bay website was caught having deployed such a “miner” on its site in mid-September, which borrows its visitor’s CPU and/or graphics card resources

Survey Finds Security Investment Increasing, But Not Security

The second-annual Cyren-Osterman Research U.S. security survey shows a significant disconnect between rising IT security spending and a low level of confidence in current protection, among many topics covered in the 24-page report, IT Security at SMBs: 2017 Benchmarking Survey, available for free download. Security Budgets Up Sharply On average,

Chris talks Legal Tech with Lawyers Weekly

Chris talks Legal Tech with Lawyers Weekly From Lawyers Weekly: The CEO of a start-up specialsing in enterprise discovery shares the story of how his company has matured on the track to innovation to join the Nextlaw portfolio of companies endorsed by Dentons.Read the article

What Is Data Discovery and Why Should I Use It?

What Is Data Discovery and Why Should I Use It? The brain is an amazing organ. It weighs about 3 ½ pounds and consists of two hemispheres, 100 billion neurons, and 100 trillion synapses: the command and control center for each of us. The brain controls autonomous functions like heartbeats

What Is Data Discovery and Why Should I Use It?

What Is Data Discovery and Why Should I Use It? The brain is an amazing organ. It weighs about 3 ½ pounds and consists of two hemispheres, 100 billion neurons, and 100 trillion synapses: the command and control center for each of us. The brain controls autonomous functions like heartbeats

Corporate Compliance Insights Guest Post

Corporate Compliance Insights Guest Post 3 Hidden Traps Associated With GDPR Avoiding the Challenges to Ensure Compliance From the Corporate Compliance Insights Blog:Many companies aren’t ready for the looming GDPR deadline, and they face real hurdles in getting to “compliant.” FileFacets, an enterprise analytics and privacy compliance platform that makes

Ransomware-as-a-Service Is Making Crime Easy

It shouldn’t surprise anybody to learn that cybercriminals are taking their lead from some established business service models. We wrote about Botnet distribution services here, and the concepts apply equally to other corners of the malware “industry.” In February 2016, the “Cerber” ransomware first appeared in the form of Ransomware-as-a-Service

Best Practices for Stopping Ransomware

With the recent return of Locky and continued growth of ransomware and ransomware-as-a-service, there is a good chance you personally know an individual or company that has experienced such an attack or another similar threat. If you work in the computer or security industry, you might also often be asked

What is PII? What Should We Do About It?

What is PII? What Should We Do About It? Dreams and fantasies are often referred to as “pie in the sky” thinking—nice to ponder, but, realistically speaking, not likely to happen. A generation ago we would have thought the digitization of info would usher in a Utopian paperless age when

New Cyren Threat Report: The Malware Wars

If you want to know what a cyber-war looks like, read the news. And if you want to get up to speed quickly and try to make sense of all that news, I recommend downloading our new special report on malware, with a special nod to the included interview of