John Breeden II

Author Archives: John Breeden II

New weapons offer hope against advanced cyber-attacks

One of the most frightening things about modern cyber-attacks is that a breach can remain undetected within networks for weeks, months or even years. This time gives hackers the luxury of lateral movement within a network, meaning they can acquire better credentials, compromise more systems and search for the most profitable and most damaging information. And perimeter defense tools are almost worthless once hackers are quietly rampaging behind the lines. But malware has to communicate back to the hackers somehow, and new monitoring tools have emerged that can identify that traffic. As such, traffic monitoring tools could very well be the next big thing in network security, protecting networks against cyber-attacks and helping even if a breach has already happened.To read this article in full or to leave a comment, please click here(Insider Story)

Encrypting sensitive data is a must; new key management tools make it easy

Encryption is one of the best ways to prevent the type of terrible headaches that many high-profile companies have experienced with stolen data. Even if experienced hackers are able to penetrate a system, having the data encrypted can mean that nothing useful is taken.But encryption can place a high burden on a network and its users. It's not too difficult to encrypt data, but providing access to protected files for authorized users while keeping everyone else away is extremely complicated. Small organizations may be able to manage encryption schemes manually, but for anything beyond a few dozen users, the task of doing that without help becomes monumentally difficult.To read this article in full or to leave a comment, please click here(Insider Story)