Our application whitelisting and ringfencing technology has been growing by leaps and bounds lately, and we have been seeing adoption of this approach to security in Australia as well. We thought it was worth the effort to do a quick breakdown on how ThreatLocker can enable this critical strategy for Australian Businesses.
The latest “oops” moment for Microsoft is the discovery that an attacker can infect a connecting machine with malware from a Remote Desktop Session. Every few months a new vulnerability is discovered in Windows. Generally, by the time the vulnerability is public knowledge, Microsoft has released a security patch in Windows Update.
I read almost everything the CDC publishes and I am a fanatic for the NIH publications on disease and medical innovations. I personally just think it’s amazing the things that such brilliant people can dedicate research and ultimately find either a cure or a way to treat the condition.
Most people think ransomware is some new attack that has only recently come to the forefront of the cyber defense space. Not so. In truth, ransomware dates back to an original piece of malicious code, known as AIDS, written in 1989 by Joseph Popp. That’s right, 1989. 30 years ago.
Quite often we hear about how bad USB storage devices are, and how we should block access to them. More often than not, corporations have the policy to block USB drives for a significant part of their organization. While USB drives can be bad, and access to them should be limited, quite often these policies […]
Today I walked the exhibit hall at the RSA conference and spoke to numerous endpoint security vendors to ask them how they were dealing with new or unknown malware. While the specific answer varied depending on the vendor, all of the answers revolved around a similar strategy.
After nearly 20 years working in cybersecurity, I am still asked the age-old question by business owners: “How can I make myself unhackable?” Seldom do they understand when I try to explain that there is no such thing as unhackable. The purpose of this guide is to help business owners better understand cyber risks and […]
ThreatLocker, C.E.O talks about how socially engineered text message encourages users to download software that could pose a risk. https://www.clickorlando.com/news/text-compliments-part-of-app-marketing-plan-not-sex-trafficking
As computer games evolve, gaming businesses are no longer just focusing on better graphics. Game manufacturers are turning to the internet for better collaboration, game rooms, multi-person battles, and even a marketplace to buy and sell items in a virtual world.
In the last 12 months, we have seen a growing number of people citing that Apple computers are more secure than Windows computers. We have also seen an increasing number of Macintosh computers with viruses. We often hear that Macintosh computers are secure and cannot be hacked.
Businesses spend billions of dollars every year on cyber security products. firewalls, antivirus, IDS, dual factor authentication, Web and e-mail security are just some of the areas that billions of dollars are poured. Despite the enormous amounts of money and resources that are spent on cyber security, businesses are still hacked and infected with various […]
ThreatLocker CEO and Head of Business Development Attended the 2nd Annual Cyber Investing Summit at New York Stock Exchange
ThreatLocker attended the 2nd Annual Cyber Investing Summit at the New York Stock Exchange yesterday. During our visit, we found that the investment outlook on Cyber Security is growing, with a great belief that the market is a huge market and a stable investment.