When waves of cyber attacks hit last year, such as WannaCry and Not Petya ransomwares, businesses lost billions of dollars in high-profile breaches. In addition, more than half of the U.S. population’s Social Security information was compromised in the Equifax breach. It was a record-breaking year.

Perhaps the only good that came out of these fiascos is that users became more aware of the importance of cyber security.

FacebookTwitterGoogle+LinkedIn

Today CRN, a brand of The Channel Company, named two SonicWall executives, Chris Auger and Steve Pataky, to its exclusive 2018 list of Channel Chiefs.

CRN’s editorial staff chose the executives on this elite annual list on the basis of their professional accomplishments, industry reputation and dedication to the channel partner community.

FacebookTwitterGoogle+LinkedIn

As Australians return to work after the holiday season, IT teams across the country will be pushing to make sure they are prepared for the implementation of the Notifiable Data Breach (NDB) amendment, which takes effect on 22 February.

It is important to point out that many businesses have had nearly a whole year in which executives and IT teams should have worked together to ensure their business networks are secure.

FacebookTwitterGoogle+LinkedIn

Email is vital to business communications and operations. However, as the volume of email increases, so too does the amount of ransomware, phishing, business email compromise (BEC), spoofing, spam and virus attacks.

What’s more, government regulations (e.g., PCI, HIPAA, GDPR, etc.) now hold your business accountable for protecting confidential data, ensuring it is not leaked and supporting the secure exchange of email that contains sensitive customer data or confidential information.

FacebookTwitterGoogle+LinkedIn
searching for cybercrime

In preparation for the upcoming publication of the 2018 Annual SonicWall Threat Report, we’re busy reviewing and analyzing data trends identified by SonicWall Capture Labs over the course of 2017.

The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from more than 1 million sensors around the world, performs rigorous testing and evaluation, establishes reputation scores for email senders and content, and identifies new threats in real-time.

FacebookTwitterGoogle+LinkedIn

Malware often incorporates advanced techniques to evade analysis and discovery by firewalls and sandboxes. When malware sees evidence that dynamic analysis is occurring, it can invoke different techniques to evade analysis, such as mimicking the behavior of harmless files that are typically ignored by threat detection systems.

Traditional sandboxing approaches that signal their own presence — for example, by instrumenting underlying virtual machines (VM) to intercept malicious function calls — make the analysis environment visible.

FacebookTwitterGoogle+LinkedIn
Smart home automation app on mobile

In a casual conversation with my realtor friend, I learned that many upscale tract builders now include home automation to increase margin. We’ve come a long way since the X10 days.

Home automation is still a splintered industry. No end-to-end solutions exist. There are, of course, the commercial integrators targeting custom estates with project cost measured in the percentage of home values.

FacebookTwitterGoogle+LinkedIn

History is full of people who’ve labored over missed opportunities. Like all other non-bitcoin-owning people, I am one of them.

I first heard of cryptocurrency in early 2013 and scoffed at the idea that something with no intrinsic or collectable value would trade for $20. The concept of owning a portion of a cryptographic code — and it having actual value — is still hard for many to swallow.

FacebookTwitterGoogle+LinkedIn
Security for SMBs

Organizations typically struggle to provide a holistic security posture. There are many security vendors providing exciting and innovative solutions. But from a customer perspective, they often become various point solutions solving several unique problems. This often becomes cumbersome, expensive and unmanageable. Some of the most recent trends in this area are discussed in this blog, which could bring about even further complexity to an organizations security posture.

FacebookTwitterGoogle+LinkedIn

Have you been the victim of cybercrime?  If I asked you that question in 2012, you might have said, “I’m not sure.”  But in 2017, I am sure your answer is, “Yes, I’ve been victimized many times.”  That’s bad news.

I joined SonicWall in 2012 and witnessed firsthand the rise of cybercrime headlines occurring on a monthly, weekly, and now daily basis.

FacebookTwitterGoogle+LinkedIn