As companies "shift left" -- pushing more responsibility for security onto developers -- the tools that are available are falling short, usability researchers say.
Read moreSymmetry Systems Emerges from Stealth
August 11 2020Company behind Data Store and Object Security (DSOS) becomes public knowledge following a $3 million seed round of funding.
Read moreZoom Vulnerabilities Demonstrated in DEF CON Talk
August 11 2020A security researcher demonstrated multiple vulnerabilities, two of which could let an attacker read and steal user data.
Read moreIs Edtech the Greatest APT?
August 11 2020Educational technology is critical but can come at huge costs to student and teacher privacy and security. Are those costs too high?
Read moreEU-US Privacy Shield Dissolution: What Happens Next?
August 11 2020In a world that isn't private by design, security and liability implications for US-based cloud companies are huge.
Read moreCOOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker Module
August 11 2020During a recent investigation at a telecommunications company led by Mandiant Managed Defense, our team was tasked with rapidly identifying systems that...
Read moreCOOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker Module
August 11 2020During a recent investigation at a telecommunications company led by Mandiant Managed Defense, our team was tasked with rapidly identifying systems that...
Read moreCOOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker Module
August 11 2020During a recent investigation at a telecommunications company led by Mandiant Managed Defense, our team was tasked with rapidly identifying systems that...
Read moreCOOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker Module
August 11 2020During a recent investigation at a telecommunications company led by Mandiant Managed Defense, our team was tasked with rapidly identifying systems that...
Read more
Recent Comments