Lessons Learned from the Verizon Data Breach

By Eric Watkins, Senior Malicious Detection Researcher at zvelo Earlier this week, over 14 million Verizon customers had sensitive user data associated with their Verizon accounts released into the wild.  A third-party vendor had stored the database on an improperly secured cloud server. While this unsecured server was located in the Amazon Web Services (AWS)…

Details

Top 4 Takeaways for Guarding Against Ransomware Attacks After WannaCry

By Eric Watkins, Senior Malicious Detection Researcher at zvelo Earlier this month WannaCry was named the world’s biggest cyberattack which hit at over 150 countries and infected over 300,000 machines across hospitals, universities, manufacturers, government agencies and other important centers. This nasty ransomware encrypted files on a victim’s hard drive and then popped up a…

Details

zvelo’s CEO, Jeff Finn, offers his opinion on the future of IoT security in InfoSecurity Magazine

Users Can Secure Their IoT Devices; But Will They? *****The following article, by Jeff Finn, appears within the Opinion section of InfoSecurity Magazine’s web site and was originally published on February 15, 2017. On an increasingly massive scale, cybercriminals are repurposing connected Internet of Things (IoT) devices installed within our homes. These hackers use malware…

Details

zvelo now provides Cloud and Local Integration Options for Ultra-fast and Secure Access to Content and Device Datasets with zveloAPI™

zvelo Unveils zveloAPI™  to Power High-speed Access to Datasets zvelo, the leading provider of website and device categorization, unveils zveloAPI™, an ultra-fast, secure API, for accessing the zveloDP datasets through cloud-based queries and streaming data feeds. zveloAPI was designed to support a broad range of integration and deployment requirements, including: Cloud-based queries of any of…

The Convergence of Data Analytics and Security

Thumbnail photo of big data, web traffic and an analytics solution or applicationA renewed sense of urgency to secure information, networks and electronic devices in order to thwart advanced hacking techniques loomed over the 2013 RSA conference floor in San Francisco. The harsh realization that traditional security measures simply don’t cut it anymore was confirmed by various keynotes and casual hallway conversations between peers. The biggest takeaway, besides the toy katanas and light sabers that were handed out, was that 2013 may be the year that big data, security and analytics converge on a massive scale.