NormShield Blog

Data Leakage

Data Leakage Primer

Data Leakage; There are various cyber threat intelligence venues and NormShield has started its exploration for some time now. One of the features it offers is to search paste portals for specific criteria (keywords, emails, domains, cc numbers, etc.) with of course a notification end.

cms vulnerability

Smart Solution, Smart Aggregation

Smart Solution, Smart Aggregation; Think of the vast amount patch related of vulnerabilities you get after an automatic scan; for example insecure Apache httpd version. Frequently, these issues can be grouped since they are related to Apache httpd and instead of using different names one can show all these vulnerabilities using a single name. This […]

Social media Reputation

Monitoring Your Social Reputation

Social media has become the key medium for connecting existing and/or prospective customers. It is imperative for any enterprise to use social media actively and effectively. Hackers, too, are extremely interested in social media and they use social media for fun and profit. They both publish their findings about successful hacks and plus hack into […]

Ecosystem Cyber Risk Manager

Passive Vulnerability Scan & Early Notice for Non Remotely Scannables

Passive Vulnerability Scan; Vulnerabilities such as MS15-034 are big deal for information security specialists who have to keep up with the critical security patches on high pressure business environments. In one hand they know that the cat is out of bag and they have to find out their vulnerable servers, however, on the other hand […]

Steep Increase in Discovered Vulnerabilities in 2014

Vulnerabilities in 2014; According to the Secunia, a total of 15,435 vulnerabilities were discovered in 3,870 products during 2014. This is a 55% increase compared to the previous 5 year long discovered vulnerability trend. Another important piece of information is that of those 15,435 vulnerabilities 60% of them are triggered remotely. Yet another proof that […]

NormShield Threat Vulnerability Orchestration

All Features Are Equal

All Features Are Equal… But Security Is More Equal Than The Others… Security is built in form the head start in NormShield. It contains secure features as well as security features. The software is designed and developed and tested by seasoned application penetration testers, senior developers and software security professionals for whom coding is part […]

Fraudulent Domains

Catch Fraudulent Domains with NormShield

Fraudulent Domains; Sophisticated, spear or not, phishing attacks include registered domain names similar to yours and leverage these fraudulent domain names in order to better persuade victims who are trusting your company’s brand. It is easy to find unregistered domain names similar to yours with name generator services like NameMesh. Misspellings and typos in domain […]

Graphics Needs Satisfied

Graphics Needs Satisfied

Graphics Needs Satisfied; One of the most important yet difficult areas of information security is to show the value of it. Upon an incident the information security awareness is on crest. On the other hand when everything goes smooth and there isn’t any known incidents the awareness slope approaches to, well, not zero maybe but […]

Rapid Cyber Risk Scorecard

Express Yourself by Comparing Vulnerabilities

Express Yourself by Comparing Vulnerabilities; Penetration tests result in reports, that’s the usual output. But when having more than one penetration tests, it’s not that frequent to have a report comparing vulnerabilities found previously/after. In NormShied you can easily produce comparison reports aiming exactly this in seconds. The idea is to see newly found vulnerabilities […]

NormShield Threat Vulnerability Orchestration

Vulnerability One Stop Shop

Vulnerability; What would you expect to see when confronted with a vulnerability in a vulnerability management service? The answers vary of course. However, there are fundamental data and knowledge that shouldn’t be missed when representing a vulnerability; Vulnerability The vulnerability name Generic knowledge defining the vulnerability category in detail The severity of the vulnerability The […]