article thumbnail

Mitigating Advanced Threats with Scalable and Automated Malware Analysis: An interview of Chad Loeven and Mike Hylton

CTOvision

Scalable automated malware analysis has become a critical component of enterprise defense. When properly implemented it can be key to mitigating malware threats that otherwise bypass perimeter defenses. It is based on an […].

Malware 322
article thumbnail

Quick Glossary: Malware

Tech Republic Security

Malware is an insidious infection that will steal productivity from your enterprise and potentially wreak havoc on your network. To prevent and counteract malware, it’s important to know the terminology surrounding it.

Malware 124
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Raspberry Robin Malware Evolves with Sophisticated Evasion Tactics

SecureWorld News

The Raspberry Robin malware, a heavily obfuscated Windows worm first identified in late 2021, has become one of the most prevalent threats facing enterprises today. Jason Soroko, Senior Vice President of Product at Sectigo, discussed the sophistication of this malware.

Malware 82
article thumbnail

More connected, less secure: Addressing IoT and OT threats to the enterprise

CIO Business Intelligence

The Internet of Things (IoT) is a permanent fixture for consumers and enterprises as the world becomes more and more interconnected. It also introduces new security challenges that demand our attention, especially as IoT is integrated into operational technology (OT) environments. billion devices reported in 2023.

article thumbnail

Palo Alto launches an enterprise-grade security pack for remote workers

Network World

Palo Alto Networks has rolled out a Wi-Fi based package that the company says provides remote workers with enterprise-class security features. The package also offers malware and ransomware prevention, phishing protection, infected device detection, and suspicious-activity monitoring and control, the company said.

article thumbnail

Web browsers: Reimagining remote work needs at the enterprise level

CIO Business Intelligence

As organizations transition to hybrid work models and embrace cloud-based operations, the very fabric of how we work has transformed – opening doors to more security risks. In fact, according to Verizon’s Data Breach Investigation Report , over 80% of security incidents originated from web applications in 2023.

article thumbnail

New Video: Automating Your Cyber Defenses Including Malware Removal

CTOvision

The video at this link and embedded below provides an overview of conclusions from CTOvision research into ways to automate the removal of cyber threats (including malware) from your enterprise. It highlights ten requirements CTOs, CIOs, CISOs and CFOs should articulate as critical to success in automating security response.

Malware 276