In the days following revelations last September that big-three consumer credit bureau Equifax had been hacked and relieved of personal data on nearly 150 million people, many Americans no...
Read moreDDoS Amped Up: DNS, Memcached Attacks Rise
June 14 2018China and the US are the world’s leading sources of distributed denial-of-service botnet attacks. Record-breaking distributed denial-of-service (DDoS) attacks are on a tear this year, and new data shows...
Read moreIncident response is like investigating a real burglary. You look for evidence of the intruder at the crime scene, find his targets and his getaway car, and repair any...
Read moreIt takes an aggressive, swarming approach to overcome the most dangerous threats today. If LeBron James didn’t play basketball, he’d be just as menacing as a hacker. And if...
Read more8 ways to manage an internet or security crisis
June 13 2018Your business is hit with a ransomware attack. Or your ecommerce site crashes. Your legacy system stops working. Or maybe your latest software release has a major bug. These...
Read moreBlack Hat Europe
June 13 2018Security experts from around the world will share ground breaking research at the Black Hat Briefings. Submit proposals by completing a submission form on the Call for Papers. Opens:...
Read moreNext read this: State of the CIO: IT-business alignment (finally) gets real 10 old-school IT principles that still rule 9 forces shaping the future of IT The dark secrets...
Read moreA security bypass weakness in macOS APIs let attackers impersonate Apple to sign malicious code and evade third-party security tools. When is Apple-signed code not actually signed by Apple?...
Read moreUse Caution Opening Email Attachments
June 13 2018The SANS Institute provides training related to cybersecurity and the safe use of technology within your organization. To provide this training, the SANS Institute captures and processes personal data...
Read more
Recent Comments