‘Tis the Season to Confront Third-Party Risk
December 11 2020On any given day it's hard to ensure that outside companies and individuals adhere to an organization's security practices and policies. But when it's the holidays and, oh, a...
Read moreOn any given day it's hard to ensure that outside companies and individuals adhere to an organization's security practices and policies. But when it's the holidays and, oh, a...
Read moreAs cybersecurity incidents gain sophistication, to ensure we are assessing security postures effectively, it is critical to copy real-world adversaries' tools, tactics, and procedures during testing activities.
Read moreThink like an attacker if you want to understand your attack surface, says security researcher at Black Hat Europe.
Read moreMirai botnet was used to target Sony in an attack that took down DynDNS and a number of its notable customers.
Read moreOf nearly 100 apps tested, 40% have significant security issues, using either GPS locations or bespoke Bluetooth proximity detection to determine exposure.
Read moreResearchers explore fingerprint-jacking, a user interface-based attack that targets fingerprints scanned into Android apps.
Read moreAftermath of the FireEye breach by Russia's foreign service agency raises concerns over what the attackers could do next - and how to defend against it.
Read moreHere's where enterprises encounter challenges with cloud IAM and the best practices they should follow to correct these mistakes.
Read moreDemands of the "new normal" won't stop the majority of poll-takers from mastering new skills.
Read more
Recent Comments