4 Email Security Best Practices for 2021

Email Security Best Practices

We live in an email-centric world. Whether it be an invoice from a vendor or a memo from the CEO, email is typically the preferred means of communication within an organization. Email’s ubiquity – and inherent vulnerability to cyberattacks – makes email security best practices more important than ever. The Verizon Data Breach Investigations Report, […]

Websense Partners with Quadrant, Integrates ThreatSeeker Network Security Intelligence into Sagan

Alliance enhances focus on malicious behavior and potential threats within big data SAN DIEGO, Dec. 13, 2012 /PRNewswire/ — Websense, Inc. (NASDAQ: WBSN) has partnered with Quadrant Information Security to integrate the powerful Websense® ThreatSeeker® Network into Quadrant’s Sagan SIEM to deliver real-time threat intelligence and streamline event analysis and reporting. With Websense, Quadrant customers […]

Quadrant’s Bluedot and Real Malware Detection

Article authored by Adam Hall, Senior Systems Administrator at Quadrant Information Security On August 14 2015, news was released about Russian anti-virus company Kaspersky Labs generating ‘Fake’ Malware files to cause competitors software to classify benign data as malicious (Keane, 2015; Menn, 2015).  Two former Kaspersky employees claim that the company has been attempting to […]

Identifying Different Network Security Types Within Your Environment

Attempting to find all the network security threats and vulnerabilities for your organization can prove to be an arduous task. Network vulnerability scans can help sniff out the most common information security vulnerabilities, while penetration testing can provide additional support to this effort.    These actions provide a good start as vulnerability scans can help […]

7 Major Components of Cyber Security

Build Leadership Capability

Real cybersecurity requires more than technology because there is no “silver bullet” app or software that provides fail-safe protection against all existing and emerging cyber threats. A comprehensive cybersecurity solution requires seven key components: 7 Components of Cyber Security 1. People and Bandwidth Who is managing your network security? Do they have the time, bandwidth, and […]

Incident and Data Breach Response Best Practices

Yes, there is a right way — and a wrong way. What is your organization’s process for responding to a cybersecurity incident? Not sure? Or worse, don’t have a formal process in place? Keep reading. Your organization’s incident response (IR) process is a critical aspect of your security posture because it specifies the actions you […]

Network Security Vulnerabilities and Threats

Identifying and counteracting the most common Network Security Vulnerabilities is an ongoing challenge to any security team. Although new cyber security vulnerabilities keep showing up, the fact is that the basis of the attacks generally remains the same. There are three primary vectors that an attacker can use to compromise the network — the hardware, […]

Sagan Rule Update!

This is a large rule update which is long over due.  This rule update  improves the detection,  accuracy and preformance of Sagan.   For more informatin about Sagan see: https://quadrantsec.com/sagan_log_analysis_engine/ * Sagan Rule ChangeLog – 2018/11/08 * New watchguard.rules!  https://github.com/beave/sagan-rules/commit/590fb11851d7138cf2fcbff7ec1d815090ad625b * New dynamic.rules for AS/400, Zscaler, Oracle, Office 365, Watchguard, Zscaler. https://github.com/beave/sagan-rules/commit/01a962742c867a279c75d4712476934bd6265ca0 * Various minor rule […]

Sagan Version 1.2.1 Released!

Quadrant Information Security is proud to release the Sagan (GPLv2/Open Source) log analysis engine version 1.2.1!   Please keep in mind that if you are upgrading from an older version of Sagan,  you will need to remove old IPC data as 1.2.1 is not compatible with older Sagan IPC data. For more information about Sagan,  see: […]

Quadrant’s public DNS resolver with TLS & HTTPS support.

Quadrant Information Security now offers “DNS over TLS” and “DNS over HTTPS” to the general public. Why is this important? When using services like Google’s public DNS (8.8.8.8 and 8.8.4.4) or your ISP’s DNS servers, the traffic is sent unencrypted.  This means that the requests are subject to DNS hijacking, and eavesdropping. Using a public DNS resolved […]