<img src="https://ws.zoominfo.com/pixel/JrRu3vUM8j33QSR7Bwxw" width="1" height="1" style="display: none;">

Security Operations

January 24, 2020

Hunting for Ransomware

Many ransomware families have changed their tactics and victim-targeting in recent years. Rather than indiscriminate attacks against anyone they’re able to infect, they have moved to a process called “big game hunting”.
October 25, 2019

Why You Need to Prioritize Software Development and Supply Chain Security

Enterprise software development graduated from the “waterfall” framework of development and operations - and became less linear, more complex and, in several ways, more difficult to secure.
August 9, 2019

How Detecting High Priority Malware will Accelerate Quality App Development and Release

When it comes to malware's persistent threat to your business, we typically discuss risk in context to failed compliance with regulations, or we talk about data loss, or we focus on fears around business continuity. But internal application quality and the software supply chain are often left out of the conversation — likely because the risk remains somewhat ambiguous.
August 7, 2019

What Are Supply Chain Attacks? How to Protect Your Software Lifecycle

Traditional supply chain attacks impact the production of physical goods. Your supply chain might include partners delivering raw materials, component parts used in manufacturing, as well as distribution of finished goods.Disruption of that supply chain could result in production shutdowns, aging inventory, degraded partner relations, and financial loss.
July 3, 2019

7 Common Mistakes to Avoid in Choosing a File Reputation Service

File reputation services check the reputation of files against extensive, up-to-date malware databases to identify threats and assess potential harm.
June 6, 2019

How to Stop the 30% of Phishing Attacks Being Missed

The ReversingLabs Titanium platform processes all objects in all incoming email instantly using automated static analysis.