Apple OS X: Now With Red Canary Threat Detection Coverage

While Apple OS X has seen increasing market share in many enterprises, the security market has so far failed to provide a corresponding expansion in OS X coverage. Similarly, the once-held and thoroughly misguided concept that “Apple doesn’t get malware” is finally starting to die with the release of several families of malware targeting OS X users. Combined, […]

People as the Weak Link in Cybersecurity: Deep Dive Edition

People, it is often said, are the weak link in computer security. Its people falling victim to myriad social engineering techniques that help evil doers overcome technical defenses that lead to data breaches. Yes and no. It is true that stupid human tricks lead to a disturbing number of system compromises, but as Veracode points […]

Point of Sale Compromises: Security at the Speed of Business

Getting your credit card data pilfered at a point-of-sale system (e.g. cash register) is something that happens to someone else. YOU don’t go to dingy restaurants staffed with shifty wait staff and dodgy card-swipe machines; you go to reputable establishments that use systems built by people who know what they’re doing, right?  Consider this: A remote-access attack […]