Derrick Helms Archives

Recent WordPress Vulnerability Hacks 1.5 Million Pages—Here’s the Lesson

Vulnerabilities within third-party software might be your greatest risk, because you can’t control or influence the code. And once the the fix is out, the cat’s out of the bag. It becomes a “known vulnerability”. Known to the manufacturer/developer, known to its customers and most significantly, known to attackers.

[Webinar] Perspective From The World’s Most Famous Hacker: Ransomware And Email Encryption

The struggle to secure sensitive data is real. And Kevin Mitnick, the world’s most famous hacker, is here to tell you all about how skilled and motivated hackers can exploit and monetize any data that is stored, used and transmitted online.

Join Kevin as he discusses the evolving threat landscape and two of the greatest security risks facing your organization today – ransomware and email vulnerabilit

CYBERSECURITY: Game Planning for Success Event [SlideShare]

To everyone that attended the event,

I’d like to say thank you! I hope you found the information useful and left with some valuable takeaways as well!

If you weren’t able to join us, then I especially hope you find this event content useful.

Cybersecurity is a very serious and growing problem that costs companies BILLIONS in damages each year. Only knowledge and proactiveness can protect your company, employees and customers. Read more and download the event slide deck!

10 Things You Should Know About Cybersecurity

It seems you can’t turn on the news lately without hearing about some serious cyber attack or vulnerability. Today’s cyber threat landscape costs companies BILLIONS in damages each year! Here are 10 things you should know about cybersecurity.

Your Mac is No Longer Impervious to Malware

Claud Xiao and Jin Chen of Palo Alto Networks reported on the threat noting that attackers infected two installers of Transmission version 2.90 with KeRanger on the morning of March 4.

The malware came bundled with an update to Transmission—a popular open-source bittorrent client.

Upon installing the app, the ransomware “begins encrypting certain types of document and data files on the system.”