Latest Blog Posts
Ransomware: Why Hackers Have Taken Aim at City Governments
August 19, 2019 Added by:Sam Bocetta
The only way to stop the trend of ransomware is for municipal organizations to build a reputation of having strong security defenses.
Comments (0)
5 Limitations of Network-Centric Security in the Cloud
August 19, 2019 Added by:Sanjay Kalra
Traditional security solutions aim to identify threats at the perimeter of the enterprise, but threats targeting public clouds require a different level of insight and action.
Comments (0)
1 Million South Korean Credit Card Records Found Online
August 08, 2019 Added by:Ionut Arghire
Over 1 million South Korea-issued Card Present records have been posted for sale on the dark web since the end of May.
Comments (0)
Top Three Cross-Site Scripting Attacks You Need to Know Now
July 31, 2019 Added by:Johnny Rice
Cross-Site scripting or XSS is and will remain to be a major pain for anyone trying to create a secure web application for their end-users.
Comments (0)
Arkose Labs Launches Private Bug Bounty Program
July 29, 2019 Added by:Ionut Arghire
Fraud prevention technology provider Arkose Labs announced the launch of a private bug bounty program on crowdsourced security platform Bugcrowd.
Comments (0)
Eight Steps to Migrate Your SIEM
July 22, 2019 Added by:Trevor Daughney
The migration of a legacy SIEM entails changes to a wide array of people, process and technology within an organization.
Comments (0)
What Call Center Fraud Can Teach Us about Insider Threats
July 22, 2019 Added by:Saryu Nayyar
Detecting and preventing call center fraud embodies many of the same challenges associated with fighting insider threats.
Comments (0)
Best Practices for Remote Workers’ Endpoint Security
July 22, 2019 Added by:Mathivanan Venkatachalam
One of an IT admin’s most important jobs is to secure that data while it’s stored on and accessed by corporate and personal endpoints.
Comments (0)
Cisco Patches Critical Flaw in Vision Dynamic Signage Director
July 20, 2019 Added by:Ionut Arghire
Cisco released a security patch for the Vision Dynamic Signage Director, to address a Critical vulnerability (CVE-2019-1917) that could allow attackers to execute arbitrary actions on the local system.
Comments (0)
Cybersecurity: Drones Will Soon Become Both Predator and Prey
July 19, 2019 Added by:Steve Durbin
Like other IoT devices, drones currently have very poor security controls, making them vulnerable to hijacking.
Comments (0)
The Automotive Industry: Stepping up on Defense
July 19, 2019 Added by:David Barzilai
As the in-vehicle technology continues to innovate, hackers are continuing to learn and find vulnerabilities to exploit.
Comments (0)
Beyond the Endpoint: Fighting Advanced Threats with Network Traffic Analytics
July 19, 2019 Added by:Filip Truta
Safeguarding enterprise assets is no longer just about protecting endpoints from malware, spam and phishing.
Comments (0)
Today’s Top Public Cloud Security Threats …And How to Thwart Them
June 21, 2019 Added by:Michael Koyfman
In order to thwart exposure, companies must have the capability to look at all cloud environments and perform assessments of how such resources are secured.
Comments (0)
Influence Operation Uses Old News of New Purposes
June 18, 2019 Added by:Ionut Arghire
A recently uncovered influence campaign presents old terror news stories as if they were new, likely in an attempt to spread fear and uncertainty, Recorded Future reports.
Comments (0)
Spring Cleaning: Why Companies Must Spring Clean Out Their Social Media Accounts This Season
June 14, 2019 Added by:David Stuart
Tips for cleaning and securing your online data this spring.
Comments (0)
Building Modern Security Awareness with Experiences
June 14, 2019 Added by:Perry Carpenter
Think about your own organization’s culture and then find ways to create immersive, engaging experiences that will resonate with your people.