April 2017

April 2017

Apr 252017

Facing The Shadow Brokers (TSB) Exploit Dump – Best practices to help protect IT infrastructure

Christmas has come early for hackers around the world as they pour through the treasure trove of previously unseen exploits released by The Shadow Brokers (TSB). The tools were reportedly developed and utilized by the National Security Agency and are currently permeating underground criminal online forums. While the hackers are working to reverse engineer and […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Apr 242017

Staying Safe on the Homefront: How to Protect Connected Devices

While most organized criminal gangs and botnets are now targeting businesses and online servers, your home still presents a lucrative target for cyber threat actors.  Criminals continue to pursue your bank credentials and have even resorted to orchestrating socially engineered attacks to deceive victims over the phone while posing as Microsoft technical support, tricking victims […]

Apr 202017

Is Your Cloud Totally Secure?

What does it take to be secure in the cloud? Learn the six most important elements of Totally Secure you should demand from your cloud security provider.

Apr 112017

Sound the Alarms – Hacker Owns Dallas’ Emergency Management Systems

In the early morning hours approximately 156 outdoor weather/emergency sirens wailed horns across Dallas neighborhoods, thanks to a culprit who possibly gained physical access to a centralized broadcast system or, via remote access through phone lines sending signals to individual siren towers. Ordinarily used to alert residence to dangerous weather activity, the horn blasts cast […]