Skilled adversaries can deceive detection and often employ new measures in their tradecraft. Keeping a stringent focus on the lifecycle and evolution of adversaries allows ...
Read more
Senator Ron Wyden asked, and the NSA didn’t answer:
The NSA has long sought agreements with technology companies under which they would build special access for the spy agency...
Read more
Physical Security Has a Lot of Catching Up to Do
October 28 2020The transformation we need: merging the network operations center with the physical security operations center.
Read moreSurvey Uncovers High Level of Concern Over Firewalls
October 27 2020More than half of respondents are planning to reduce their network firewall footprint because of what they see as limitations in the technology.
Read moreFollowing the NSA's list of 25 security flaws often weaponized by Chinese attackers, researchers evaluated how they're used around the world.
Read moreThe role that these technologies play in the MITRE Shield matrix is a clear indicator that they are an essential part of today's security landscape.
Read moreWatch out for "Facebook copyright violation" emails - even if they link straight back to Facebook.com
Read moreAkamai Acquires Asavie
October 27 2020Asavie's mobile, IoT, and security products and services will become part of the Akamai Security and Personalization Services product line.
Read morePoll: Always Learning
October 27 2020Cybersecurity certifications remain as popular as ever. Any interest in expanding your skill set?
Read moreAn analysis of more than 130,000 active applications found more with at least one high-severity flaw compared with 2019.
Read more
Recent Comments