Security as a Service

According to Ernst & Young’s 19th Global Information Security Survey 2016-17, some 57 percent of American businesses have recently experienced a significant cybersecurity incident, with 69 percent saying the budget to address cyber threats is half of what is needed.  According to researchers, many cyber criminals have reacted to the improved defense capabilities of large enterprises, […]

Graph Analytics: A Big Data Tool for Analyzing Relationships

Graph analytics is used to study relationships between the nodes of a network. Nodes are graphically depicted as points and can represent individual people, objects, computers, or anything capable of interacting with other nodes. An interaction is represented with an arrow that connects two nodes. The arrow points from the node that initiates the interaction to its recipient. The […]

Cyber Defense- How GIP and Cylance Can Help Protect You:

AND YOU THOUGHT IT WAS OVER? The hacker-creators of the WannaCry (a.k.a. WannaCrypt) ransomware virus have evolved their botnet worm without the “kill switch” that a 22 year-old computer researcher stumbled upon late Friday.  The three reported variants as of Monday, May 15, all employ the endpoint exploitation tools of phishing and embedded documents. “We […]