Latest Posts

8e45a76b01e10a6a710858234986963e

Black Hat, DEFCON and the Summer of Our Discontent

July 21, 2016 Added by:Paul Shomo

I see wisdom behind the instinct to resist information authority. Human hierarchy tends to pyramid into increasingly fewer numbers up top. If you're going to fight for rights, there are more individuals at the bottom and more power to abuse from above.

Comments  (0)

Adc7bc93d49867e98bdd5ec1617f4e32

Tor Veteran Leaves, Shuts Down Core Node

July 19, 2016 Added by:Ionut Arghire

Lucky Green, one of the people who has been with the Tor project for years before it was even called Tor, is leaving the project and has already announced plans to shut down a core node in the process.

Comments  (0)

536eb4d14b8450497be0d514a2991f3a

Security Is from Mars, Application Delivery Is from Venus

July 14, 2016 Added by:Nimmy Reichenberg

Now, more than ever then, it’s vital that organizations work to bring security and application delivery closer together.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

A View from the Top: The C-Suite Steps Up as Cyber Security Threats Surge

July 13, 2016 Added by:Steve Durbin

When it comes to cyber security, it’s more important than ever for board members and core executives—especially those not directly involved with deploying security programs—to fully participate and contribute on a continuous basis.

Comments  (0)

F5a99fda189e83ed3f4ce79415910cee

From Production Slumps to Industrial Espionage: Why the Manufacturing Sector Must Be Better Prepared for Cyber Attacks

July 12, 2016 Added by:Mirko Brandner

In a connected world, where digitization progresses rapidly and finds its way into our factories, we are inevitably faced with an ever-increasing level of vulnerabilities that lead to security breaches.

Comments  (0)

Adc7bc93d49867e98bdd5ec1617f4e32

European Businesses Fear DDoS Extortion Attacks: Survey

July 07, 2016 Added by:Ionut Arghire

Cyber-extortion is becoming a booming business, at least for criminals who threaten companies with distributed denial of service (DDoS) attacks, a recent survey from DDoS protection company Corero reveals.

Comments  (0)

0133c663c244df033c2eeb2248dfee32

Fighting Alert Fatigue

July 06, 2016 Added by:Mike Paquette

By augmenting their efforts with behavioral analytics and machine learning, teams can be sure they reduce alert noise and fatigue while quickly identifying and addressing the issues that actually matter before they hurt their customers or the bottom line.

Comments  (0)

Adc7bc93d49867e98bdd5ec1617f4e32

Spyware Targets Office, Mail, and Accounting Applications

June 30, 2016 Added by:Ionut Arghire

A new spyware Trojan aimed at Russian users exclusively was recently observed targeting various accounting applications, as well as instant messaging, email, and Microsoft Office programs, in an attempt to exfiltrate sensitive data.

Comments  (0)

3149cfd3449309d3982042756d81a157

Why Passwords Are the New Exploits

June 28, 2016 Added by:Nick Bilogorskiy

In the age of stolen passwords, compromised credentials are the easiest way in, simpler than phishing, malware or exploits. “Password confirmation” tools are now readily available to find reused passwords matching any website.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

What a Risk-Based Approach to Security Means for Your Business

June 20, 2016 Added by:Steve Durbin

Executives are familiar with the benefits of cyberspace and how the Internet, and today’s usage of connected devices, increases innovation, collaboration, efficiency, competitiveness and commitment to customers, but many struggle with assessing the risks versus the rewards.

Comments  (0)