SPONSORED: WATCH NOW -- Mobile devices like smartphones and tablets have emerged as popular targets for bad actors looking to break into to cloud-based networks, according to Poornima DeBolle,...
Read moreProlonged exposure to poorly managed legacy IT devices proves time and time again the familiar adage: What can go wrong will go wrong.
Read moreIt's all over the news! The bug you can't fix! Fortunately, you don't need to. We explain why.
Read moreSPONSORED: WATCH NOW -- How do SOC professionals build a strategy when they lack basic information about how such threats operate? Advanced threats by their very nature create plenty...
Read moreThe Story of the 2011 RSA Hack
May 27 2021Really good long article about the Chinese hacking of RSA, Inc. They were able to get copies of the seed values to the SecurID authentication token, a harbinger of...
Read moreNew study shows sharp increase in number of endpoint devices with sensitive data on them.
Read moreGoogle Discovers New Rowhammer Attack Technique
May 26 2021Researchers publish the details of a new Rowhammer vulnerability called "Half-Double" that exploits increasingly smaller DRAM chips.
Read moreZscaler Buys Deception Technology Startup
May 26 2021ZScaler's CEO says Smokescreen Technologies' capabilities will be integrated with Zscaler's ZIA and ZPA products.
Read moreSPONSORED: WATCH NOW -- All it took was a global pandemic and a shift to working from home to expose security operations centers' open secret: Too much software, systems,...
Read moreBug Bounties and the Cobra Effect
May 26 2021Are bug bounty programs allowing software companies to skirt their responsibility to make better, more secure products from the get-go?
Read more
Recent Comments