Organizations of all sizes should include both human firewalls and virtual tools in their cybersecurity budgets. The average cost of a data breach is now $3.92 million, according to...
Read moreOrganizations of all sizes should include both human firewalls and virtual tools in their cybersecurity budgets. The average cost of a data breach is now $3.92 million, according to...
Read moreState of SMB Insecurity by the Numbers
October 20 2019SMBs still perceive themselves at low risk from cyberthreats – in spite of attack statistics that paint a different pictur Image Source: Adobe(Pablo Lagarto) Even as attacks and breaches...
Read moreApplied Security Briefing lineup for this December event also includes expert looks at Google’s ClusterFuzz and the art of breaking PDF encryption. The organizers of Black Hat Europe have...
Read moreApplied Security Briefing lineup for this December event also includes expert looks at Google’s ClusterFuzz and the art of breaking PDF encryption. The organizers of Black Hat Europe have...
Read moreSOC Puppet: Dark Reading Caption Contest Winners
October 20 2019Social engineering, SOC analysts, and Sock puns. And the winners are: First Prize ( $25 Amazon gift card) goes to Deadsnott, aka John-Paul Power, whose day job is information developer at...
Read moreSOC Puppet: Dark Reading Caption Contest Winners
October 20 2019Social engineering, SOC analysts, and Sock puns. And the winners are: First Prize ( $25 Amazon gift card) goes to Deadsnott, aka John-Paul Power, whose day job is information developer at...
Read moreGlitching: The Hardware Attack that can Disrupt Secure Software
October 19 2019Glitching (or fault-injection) attacks aren’t easy (yet). But get ready, because as the IoT grows, these attacks will be a big reason that hardware security should be part of...
Read moreGlitching: The Hardware Attack that can Disrupt Secure Software
October 19 2019Glitching (or fault-injection) attacks aren’t easy (yet). But get ready, because as the IoT grows, these attacks will be a big reason that hardware security should be part of...
Read moreIn A Crowded Endpoint Security Market, Consolidation Is Underway
October 19 2019Experts examine the drivers pushing today’s endpoint security market to consolidate as its many players compete to meet organizations’ changing demands and transition to the cloud. The overcrowded endpoint...
Read more
Recent Comments