Post Data Breach News, Articles and Updates

PinkKite: The continuing threat of POS malware

POS systems are unique, typically single-purpose and require limited software to function. Defenders should use this to their advantage, and enable application whitelisting to prevent unwanted or modified processes from running.

Post-breach forensics: Building the trail of evidence

New approaches to user monitoring and behavioural analytics enable firms to analyse all user activity, allowing tracking and visualising of user activity in real-time to understand what is really happening on the network says Balázs Scheidler.