Contains All System Components in One Enclosure

click photo for more information
Contains All System Components in One Enclosure
The SNE Series security enclosure line from Middle Atlantic Products now includes the End Cable Chase – a full-height, slim enclosure option. . .
0
132

Favorite! Would you like to add notes/tags?

Product Spotlight on SOC Technology and Furnishings

click photo for more information
Product Spotlight on SOC Technology and Furnishings
The security operations center is the central nervous system of a security department. From that one room, enterprise security leaders can monitor worldwide risks, address ongoing incidents, track system health and sustain operations across the business.
0
128

Favorite! Would you like to add notes/tags?

Combines Ergonomics and Operator Comfort

click photo for more information
Combines Ergonomics and Operator Comfort
The new Impulse Dual Sit/Stand consoles from Winsted provide two independently adjustable, ergonomically curved work surfaces for security operators.
0
122

Favorite! Would you like to add notes/tags?

The Intersection of Cybersecurity and Physical Security Is More Critical Than Ever

click photo for more information
The Intersection of Cybersecurity and Physical Security Is More Critical Than Ever
Was your physical security system designed, by default, to be cyber secure? That is a question we all need to ask as we evaluate security for an IoT world.
0
133

Favorite! Would you like to add notes/tags?

Understanding Cybersecurity and Its Relationship with Physical Security To Reduce Risk

click photo for more information
Understanding Cybersecurity and Its Relationship with Physical Security To Reduce Risk
Based off a recent survey, 40% of security professionals believe their systems are only somewhat secure.
0
125

Favorite! Would you like to add notes/tags?

Cybersecurity Buzzwords Explained

click photo for more information
Cybersecurity Buzzwords Explained
Cybersecurity, particularly in the physical security space, is a hot topic. Brivo is focusing on educating security professionals on the intersection of cybersecurity and physical security.
0
136

Favorite! Would you like to add notes/tags?

Reduce IT Operational Cost – Join The Cloud Revolution

click photo for more information
Reduce IT Operational Cost – Join The Cloud Revolution
On-premise systems are quickly becoming outdated for current physical security needs.
0
123

Favorite! Would you like to add notes/tags?

The GDPR and Privacy: What Security Leaders Need to Know

click photo for more information
The GDPR and Privacy: What Security Leaders Need to Know
The European Union’s new General Data Protection Regulation (GDPR) came into effect in May of this year. While many in North America believe that since they are not located within the European Union the regulation does not apply to their operations, the territorial scope of the GDPR is well and truly global. Many of these […]
0
137

Favorite! Would you like to add notes/tags?

Is Payment Card Security Slipping?

click photo for more information
Is Payment Card Security Slipping?
A new report shows that only 52.4 percent of organizations maintained full PCI DSS compliance in 2017, compared to 55.4 percent in 2016.
0
122

Favorite! Would you like to add notes/tags?

Sakula Malware Family

click photo for more information
Sakula Malware Family
Type: Threat Analysis Category: CTU Research CTU researchers analyzed the Sakula Malware Family which enables an adversary to run interactive commands to download and execute additional components.
0
99

Favorite! Would you like to add notes/tags?

TeslaCrypt Ransomware

click photo for more information
TeslaCrypt Ransomware
Type: Threat Analysis Category: CTU Research CTU researchers investigated a new file-encrypting ransomware family named TeslaCrypt, which was distributed by the popular Angler browser exploit kit.
0
99

Favorite! Would you like to add notes/tags?

Banking Botnets Persist Despite Takedowns

click photo for more information
Banking Botnets Persist Despite Takedowns
Type: Threat Analysis Category: CTU Research Threats to banks and financial institutions continue to grow and mature as cybercriminals become far more creative and increasingly organized.
0
101

Favorite! Would you like to add notes/tags?

Skeleton Key Malware Analysis

click photo for more information
Skeleton Key Malware Analysis
Type: Threat Analysis Category: CTU Research SecureWorks Counter Threat Unit™ researchers discovered malware that bypasses authentication on Active Directory systems.
0
105

Favorite! Would you like to add notes/tags?

CryptoWall Ransomware Threat Analysis

click photo for more information
CryptoWall Ransomware Threat Analysis
Type: Threat Analysis Category: CTU Research Read why CTU researchers consider CryptoWall to be the largest and most destructive ransomware threat on the Internet as of this publication.
0
112

Favorite! Would you like to add notes/tags?

Malware Analysis of the Lurk Downloader

click photo for more information
Malware Analysis of the Lurk Downloader
Type: Threat Analysis Category: CTU Research Take a deeper look at Lurk, a malware downloader that uses digital steganography: the art of hiding secret information within a digital format.
0
90

Favorite! Would you like to add notes/tags?

Dridex (Bugat v5) Botnet Takeover Operation

click photo for more information
Dridex (Bugat v5) Botnet Takeover Operation
Type: Threat Analysis Category: CTU Research The CTU research team collaborated with the UK NCA, the U.S. FBI, and the Shadowserver Foundation to take over the Dridex Bugat v5 banking trojan.
0
119

Favorite! Would you like to add notes/tags?

Hacker Group Creates Network of Fake LinkedIn Profiles

click photo for more information
Hacker Group Creates Network of Fake LinkedIn Profiles
Type: Threat Analysis Category: CTU Research While tracking a suspected Iran-based Threat Group-2889, SecureWorks CTU researchers uncovered a network of fake LinkedIn profiles.
0
105

Favorite! Would you like to add notes/tags?

Threat Group 3390 Cyberespionage

click photo for more information
Threat Group 3390 Cyberespionage
Type: Threat Analysis Dell SecureWorks Counter Threat UnitTM (CTU) Investigated Activities Associated with Threat Group-3390 Category: CTU Research Analysis of TG-3390’s operations, targeting, and tools led CTU researchers to assess with moderate confidence the group is located in China.
0
98

Favorite! Would you like to add notes/tags?

10 Tips for Managing Security in the Cloud

click photo for more information
10 Tips for Managing Security in the Cloud
Businesses Concerned About Data Security in the Cloud Should Consider These Recommendations Category: Cloud Security This paper offers 10 tips that businesses should implement in order to reduce the security risks in the cloud.
0
101

Favorite! Would you like to add notes/tags?