Other Archive
gdpr ready

Is Your Website Ready for GDPR?

The Europe Union (EU) General Data Protection Regulation (GDPR) proposed by Europe Commission becomes active after May 25, 2018. GDPR has very strict rules about collecting, storing, and processing data. Gathering even very small piece of information about an EU citizen requires consent from customer/visitor and very high responsibility for the companies. The fines are […]
Banks or Cryptocurrency Exchange Markets

Which One is More Secure: Banks or Cryptocurrency Exchange Markets?

Banks or Cryptocurrency Exchange Markets? Financial institutions like banks have been facing cyber attacks almost everyday. The cyber security experience obtained by this status quo makes banks more careful and prepared against cyber attacks. However, they are still highly valuable targets and cyber criminals explore new vulnerabilities that sometimes make banks defenseless. It does not […]
machine learning

Machine Learning in Cyber Security Domain – 6: False Alarm Rate Reduction

Machine Learning False Alarm Rate Reduction; In some cases, IDS / IPS Systems may classify an event correctly or falsely. Classified events are evaluated in four categories in literature. True Positives (TP): intrusive and anomalous, False Negatives (FN): Not intrusive and not anomalous, False Positives (FP): not intrusive but anomalous, True Negatives (TN): Intrusive but […]
Botnet Detection, Malicious Javascript Code

Botnet Detection

Botnet Detection; Criminals often use trojans to infect a large number of computers for creating their zombie or bot networks. These bot or zombie computers form a network named botnet. As a keylogger, botnets are being used to steal a wide range of information, including tens of thousands of login credentials, generally for financial accounts, […]
NormShield Threat Vulnerability Orchestration

Unified Vulnerability Management

Unified Vulnerability Management; Security professionals usually apply penetration testing once a year but there are ~13000 new vulnerabilities discovered every year. Besides developers deploy new applications almost every month, 20K+ personally identifiable information (PII) leaks every week, hundreds of hackers scan every single possible port on entire Internet every day! Even a small mistake or […]
Social media Reputation

Social Network Monitoring

Social networking sites can be considered as an innovation in social connectivity. In general, social networking sites are used for good reasons: people keep in touch with loved ones and friends, sharing important moments of their life and marketing for their business etc. However, hackers, criminals, and other dishonest actors are abusing this capability for […]
Normshield Agent

Normshield Integrate with that SIEM

NormShield on-premises is a Unified Vulnerability Management (UVM) tool that helps companies to manage their technical vulnerabilities which is a very complex task in our scarce ITSec professional existing world. Since the SOCs are popular and important to corporate security, one of the slick features that NormShield UVM has is the ability to deferentially communicate […]
Social media Reputation

Monitoring Your Social Reputation

Social media has become the key medium for connecting existing and/or prospective customers. It is imperative for any enterprise to use social media actively and effectively. Hackers, too, are extremely interested in social media and they use social media for fun and profit. They both publish their findings about successful hacks and plus hack into […]
Fraudulent Domains

Catch Fraudulent Domains with NormShield

Fraudulent Domains; Sophisticated, spear or not, phishing attacks include registered domain names similar to yours and leverage these fraudulent domain names in order to better persuade victims who are trusting your company’s brand. It is easy to find unregistered domain names similar to yours with name generator services like NameMesh. Misspellings and typos in domain […]