Blog

AWN blog Krack wifi

Protect Your Systems from KRACK

Protect Your Systems from KRACK Yesterday’s disclosed WiFi exploit, known as “KRACK” to security researchers, targets password-protect WiFi networks that use the WPA2 standard—which is to say, it targets every secure WiFi network out there. KRACK is short for “Key Reinstallation Attack”, which describes a method whereby attackers can install a new encryption key thatRead more

Blade Runner security engineer blog part 2

Send In the Blade Runner: Human Cybersecurity in the Age of Machines

Send In the Blade Runner: Human Cybersecurity in the Age of Machines I need ya, Deck. This is a bad one, the worst yet. I need the old blade runner, I need your magic. – Harry Bryant to Rick Deckard I’ve always felt there was something a little weird about the plot of Blade Runner.Read more

Cloud security is the subject of many myths.

Four Common Myths About Cloud Security

Let’s dispel some myths about cloud security.

Blade Runner replicants and today's malware

Blade Runner is Coming. Is Your Network Ready for Replicants?

Blade Runner is Coming. Is Your Network Ready for Replicants? With the upcoming release of Blade Runner 2049, it’s a good time to reflect back on the first film and its grim vision of the future. The original Blade Runner came out in 1982, set in the then-distant year of 2019. And many elements ofRead more

The Equifax situation has gone from bad to worse.

What Equifax Teaches Us About Threat Detection and Response

The Equifax hack underscores the importance of strong threat detection and response.

How can you secure your hybrid cloud?

Hybrid Cloud Security Challenges: What’s the Answer?

There are significant security hurdles to get over when moving to hybrid cloud. Let’s look at possible solutions.

To SIEM or not to SIEM mid-market perspective

To SIEM or not to SIEM: A mid-market perspective

Is SIEM all that it seems? Read on to find out. 

Locky, Locky, go away and don't come back another day.

Locky Is Back With a Vengeance

An infamous strain of ransomware is making the rounds again. 

Financial Regulations

Ransomware of Things: Companies Unprepared for Next Big Cybersecurity Threat

Ransomware of Things: Companies Unprepared for Next Big Cybersecurity Threat The WannaCry and Petya attacks have shown that they can do damage on a global scale.  New vulnerabilities are constantly discovered, and cybercriminals are quick to exploit these for financial gain.  They are also adept at adding new capabilities to make the malware more dangerous. Read more

Circumnavigate Skills Deficit

What Is EDR and How Does It Fit into Your Security Strategy?

Let’s take a step back and assess EDR’s place in your overall cybersecurity strategy, as well as the gaps that it cannot fill by itself.