|
Blog
|
Cyber Attack

Why Phishing Campaigns Succeed - And How to Fight Back

Arraya Insights Arraya Insights| September 25, 2019

Here’s an encouraging stat: Nearly all (99%) of email-based threats like phishing are totally harmless in and of themselves. In order to become dangerous, they require some type of user interaction, whether that’s clicking on a link, opening an attachment, etc. Yet, email remains a highly popular and lucrative attack vector. In fact, phishing ranks […]

Read More >

Worse than Ransomware? CISOs Share their Biggest 2018 Concern

Arraya Insights Arraya Insights| February 1, 2018

Data breaches, cyber attacks, ransomware – these things undoubtedly weigh heavily on the minds of modern day CISOs, but not as heavily as one might think. All three of those perennial hot button issues fell short of the top spot in a recent study by The Ponemon Institute of the biggest concerns security and technology […]

How to Overcome the Panic Behind Meltdown and Spectre

Tom Clerici Tom Clerici| January 5, 2018

It’s not uncommon for news agencies to sensationalize stories around major cyber security vulnerabilities and potential hacks that could occur. The latest craze is around Meltdown and Spectre.  Heck the names even sound cool and dangerous. The complexities and mystique around what hackers are doing can often times worry those that don’t necessarily have a […]

Read More >

All CEOs Should Pay Attention to Equifax Firings – They May Be Next

Tom Clerici Tom Clerici| September 19, 2017

Nobody was surprised when it was announced this weekend that the chief information officer and chief security officer were both out at Equifax. We all knew that was going to happen because those two roles always get terminated after a major breach. Clearly, it’s always the CIO and CSO’s fault, right…or is it? I’ve never […]

Read More >

Combating Malware: Advanced Threats Call for an Advanced Solution

Arraya Insights Arraya Insights| September 4, 2015

Malware is everywhere. In fact, take the number of malware events from 2014 – roughly 170 million, according to the 2015 Data Breach Investigations Report by Verizon – and divide that by the number of seconds in a year and the result is an average of five malware events per second. Of course, as the study points […]

End-of-Support Announced for Popular Cisco Security Offering

Arraya Insights Arraya Insights| August 26, 2015

Windows Server 2003’s July 14 end of life wasn’t the only deadline IT pros were keeping an eye on this past summer. Also on the radar was July 25, which was when Cisco’s Intrusion Prevention System (IPS) was shipped for the last time. That date was just the latest in a long line of “lasts” […]

Read More >

'Venom' Bug Puts VMs in Hackers' Crosshairs

Arraya Insights Arraya Insights| May 21, 2015

There’s a new vulnerability with a scary name in town and it’s causing some in IT to question the security of their virtual machines (VMs). This new bug, which has been dubbed “Venom” (short for “Virtualized Environment Neglected Operations Manipulation”), could allow attackers to roam freely among all of the VMs running on a server. […]

Read More >

Hackers Find Way to Bypass Windows Security Feature

Arraya Insights Arraya Insights| January 21, 2015

Typically the saying “everything old is new again” gives a person a reason to hang on to possibly embarrassing old clothes or CDs. Unfortunately, that saying also has implications in other areas, such as digital security. For example, pros who take their eyes off a threat they thought they’d bested may just have it come […]

Read More >