article thumbnail

Cybersecurity Automation: Leveling the Playing Field

CIO

By Leonard Kleinman, Field Chief Technology Officer (CTO) ) Cortex for Palo Alto Networks JAPAC Many things challenge how we practice cybersecurity these days. The result is a more efficient, cost-effective, and productive cyber workforce. Even threat actors are themselves using automation to facilitate their attacks.

CTO 214
article thumbnail

White Paper: Automating Your Cyber Defenses Including Malware Removal

CTOvision

With changes in technology, enterprise cyber security professionals can now leverage automated in-line response and recovery to enhance security. We believe this is the only way to reduce the impact of malware and breaches in a cost effective way. This approach has been proven to significantly improve enterprise defenses. This paper.

Malware 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FBI?s router reboot call reminds us why to check for updates

The Parallax

On May 25, the FBI issued a clarion call to a broad swath of Wi-Fi router owners: To clear out a potential botnet malware infection, reboot your router. The malware, VPNFilter, allowed hackers to snoop on all traffic passing through the router, including stealing website log-ins, as well as disable the device.

Malware 188
article thumbnail

Register for 12 Jun 2014 Webinar: Automated Removal of Advanced Threats

CTOvision

Understand benefits of automated malware removal, not just remediation. Following retirement from the Navy Bob was an executive with TRW and Northrop Grumman, and then returned to government service as the Chief Technology Officer (CTO) of the Defense Intelligence Agency (DIA). Register here.

article thumbnail

New Video: Automating Your Cyber Defenses Including Malware Removal

CTOvision

The video at this link and embedded below provides an overview of conclusions from CTOvision research into ways to automate the removal of cyber threats (including malware) from your enterprise. It highlights ten requirements CTOs, CIOs, CISOs and CFOs should articulate as critical to success in automating security response.

Malware 110
article thumbnail

Interview on Automated Malware Removal

CTOvision

Three Questions on Automated Malware Removal with Bob Gourley, Cognitio Corp and CTOVision. While there’s still an emphasis – and related spending – on malware detection, most incident response teams are actually overwhelmed by vast number of security alerts they receive. Another day, another data breach. Bob Gourley: That’s simple.

Malware 102
article thumbnail

What Can You Do About Malware In The Cloud?

CTOvision

Malware exists even there - and it spreads fast. And like any system with a physical backend, the cloud can easily be subject to a wide range of vulnerabilities - including malware. And like any system with a physical backend, the cloud can easily be subject to a wide range of vulnerabilities - including malware.

Malware 101