Many businesses are altering their normal business functions due to COVID-19, and the change to remote work adds more strain to network administrators and IT security teams everywhere. Cyber-criminals, nation-state actors, and others are more than willing to adapt their tactics, techniques, and procedures to exploit vulnerable organizations during this time of transition. In fact, malicious cyber actors have already made several attempts to use this pandemic to target organizations with malicious schemes.
Cloud services leader, anxious to protect infrastructure against growing threat landscape, turns to SOD’s Threat Watch monitoring solution, for real-time discovery of suspicious activity and the ability to react decisively to avert damage to reputation and data February 20, 2020; San Diego, CA, United States; Tel Aviv, Israel Security On-Demand (SOD), a global leader in […]
The Insider Threat continues to be among the most critical and dangerous threats that face organizations. Our very own Director of Security Operations, Steven Bay, lived through such a threat first hand as he was Edward Snowden’s manager at the time Snowden revealed himself to be the man behind the NSA leaks in 2013. He […]
Major security breaches are ubiquitous in 2019. New breach stories are written every week – state-owned petroleum companies, major healthcare providers, police and intelligence agencies. And they aren’t going anywhere. As we work tirelessly to enhance our capabilities, theirs get even more sophisticated. We’d like to shine a light on three significant breaches from 2019, […]
The security landscape continues to change, and vendors are making choices in response to emerging threats in the global threat landscape. Recently, Mozilla decided that they would be rolling out a planned security feature for their popular Firefox web browser that would make DNS over HTTPS the default protocol for DNS traffic. Being a […]
Network and system scanning by external 3rd parties are as common as weeds growing in a garden, and it is about as useful too. Scanning occurs for a variety of reasons: it could be a search engine attempting to index your public environment and website, an ISP evaluating their autonomous system, universities conducting research, […]