View Post

Getting a bad reputation? IP reputation is the answer

In Blog post by Sam Coleman0 Comments

As Clavister launches its new IP reputation feed, powered by Webroot®, we caught up with Chad Bacher, SVP of Product Strategy and Technology Alliances at Webroot to get his views on the new cyber realities and why keeping a healthy network starts from the outside as much as inside. DeCrypted News: You’ve mentioned that the threat from cyberthreats— for the first time in years — is decreasing. Can you elaborate on the reasons why it’s decreasing and is it temporary?  Chad Bacher: For the first time, we witnessed a minor year-over-year decrease in the volume of malware. In part, the decline can be attributed to the increased security awareness, but …

View Post

The end is just the beginning

In Blog post by Sam Coleman0 Comments

The global attack of Wannacry ransomware last week was unprecedented. But that was just the opening salvo for this ShadowBrokers cyber weapon as new variants are already worming their destructive paths into systems. How did we get here and what happens next? The toll we know of is devastating enough. Over the weekend of May 12-14, when the ransomware know known as WannaCry (with others calling it Wana, WanaCrypt etc) was awoken, 200,000 machines across 150 countries had been hit. Its chilling message of pay €300 in bitcoins or lose all data on the now encrypted machine a textbook example of how ransomware behaves, pushing the term into the global vocabulary …

View Post

The NFV revolution kicks into high gear

In Blog post by Sam Coleman0 Comments

As the benefits of SDN/NFV take the market by storm, a recent Red Hat Telco Partner Summit points to the groundwork that still needs laying, with security concerns a major aspect. What had started as a slow whispering of a compelling technology and its solutions for telecom operators has now – after the initial analysis of business impact for first tier operators – is getting commitments from most of the companies surveyed according to Red Hat market research. According to Red Hat, a leader in the DevOps, Linux and OpenStack Platform (OSP) space, tier one operators reported the following. 50% of the Communications Service Providers (CSPs) already execute a NFV …

View Post

Are we still in denial about DDoS attacks?

In Blog post by Clavister Blog Staff0 Comments

$2.5 million:  that’s the average loss of revenue experienced by an organization hit with a DDoS attack, according to the latest DDoS and Cyber Security Insights Report from Neustar.  84% of the 100)+ organisations surveyed reported that they were targeted by DDoS attacks in the past year, that the number of DDoS attacks increased 15% over the past 12 months, across all industry sectors. The report found that the proportion of attacks greater than 10 gigabits per second (Gbps) was up 11% on the previous year to 45%, and that 45% of organisations targeted by DDoS attacks said they had been hit more than five times. DDoS attacks haven’t just ramped up …

View Post

Could election season mean phishing season?

In Blog post by Clavister Blog Staff0 Comments

With the first round of the 2017 French presidential election to be held on 23 April, and the British Government recently announcing a general election for June, it’s worth re-examining one of the most controversial events in the run-up to the 2016 U.S. presidential election – the publishing by Wikileaks of several thousand emails related to Hillary Clinton’s election campaign activities.  The emails were stolen in March 2016 when the personal Gmail account of John Podesta, chairman of Hillary Clinton’s 2016 U.S. presidential campaign, was hacked following a spear-phishing attack. As we blogged previously, the impact of the breach on the election’s outcome is uncertain.  But it was certainly a damaging breach …

View Post

Poor password practice: a professional problem

In Blog post by Clavister Blog Staff0 Comments

We all like to assume that IT security professionals practice what they preach when it comes to good practices.  Wariness when clicking on links or downloading attachments from unknown senders – obviously.  Keeping software up-to-date and deploying the latest versions of antivirus and other protections – sure thing.  Regularly changing passwords – um, not so much. A recent survey of almost 300 IT security professionals at the RSA Conference in San Francisco found that 33% had not changed their social network passwords in over a year, while another 20% claimed never to have changed these passwords. OK, but surely these cybersecurity pros were at least constructing strong, hard-to-guess passwords? Again, …

View Post

How much is your security worth? About $250 – unless you use multi-factor authentication

In Blog post by Clavister Blog Staff0 Comments

Organizations invest tens of thousands of dollars in their network IT security and data protection strategies. From technical solutions and training, to writing policy documents and mapping processes, vast sums of business resource is invested in ensuring that their most precious assets – i.e. their data – is behind a ring of steel, safe from the rapidly evolving threat posed by cyber-criminals. As a result the cyber-security market is expected to be worth more than $200 billion annually by 2021. Organizations spend this money and invest time in protecting their data because they understand  –  or believe it to be – of extremely high value, either to cyber-criminals who can …

View Post

Lessons from the Vault 7 breach

In Blog post by Clavister Blog Staff0 Comments

The recent Vault 7 leak  has been described as the biggest disclosure of classified information on backdoors, and espionage tools and techniques since the documents released by former CIA employee Edward Snowden appeared in 2013. Some believe the new leak may be bigger still. In any case, here are four important points to note from the leak, together with their implications for security. Zero-day flaws are a problem – but not your main challenge A large proportion of the leaked CIA exploits are focused on unknown vulnerabilities in products from major technology companies – so-called ‘zero-day flaws’. These are a major concern for IT security teams, precisely because they usually remain …

View Post

Free webinar: leveraging Deep Packet Inspection for cybersecurity, Tuesday 21 March

In Blog post by Clavister Blog Staff0 Comments

Deep Packet Inspection (DPI) is one of the cornerstones of an effective cybersecurity strategy.  Whereas basic firewalls and gateways use Stateful Packet Inspection (SPI) to determine if network traffic packets should be allowed or blocked by simply examining the packet header and footer, more advanced security appliances using DPI also scrutinize the packet’s contents before deciding whether to allow the packet through. Simply put, it’s the difference between examining only outside of a parcel before deciding it’s safe, and opening the parcel to see what’s inside to be truly certain it has no malicious contents.  So how does DPI play a fundamental role to strengthening cybersecurity solutions like next-gen firewalls, …

View Post

Pure jean-ius: Clavister’s next-generation firewalls deliver security for MUSTANG

In Blog post by Clavister Blog Staff0 Comments

MUSTANG is one of the largest jeans and casual clothing manufacturers in Europe. Founded in the 1930s in Germany as a denim and lifestyle brand, it was the first European provider of jeans. It has grown into a Europe-wide business, with around 80 shops and 15 showrooms and offices in Germany, Austria, Switzerland, Russia, Belgium, the Netherlands, Luxembourg, Poland and Hungary. Now, Clavister is delighted to announce that MUSTANG relies on our security appliances to secure connections and communications between its head office in Künzelsau, Germany, and almost 100 shops and branch office locations across Europe. To keep MUSTANG’s operations running smoothly, all of its disparate branches need to be …