How to Think Like a Hacker
October 11 2019In the arms race of computer security, it’s never been more important to develop an adversarial mindset that can identify assumptions and determine if and how they can be...
Read moreIn the arms race of computer security, it’s never been more important to develop an adversarial mindset that can identify assumptions and determine if and how they can be...
Read moreWhile USB drives are frequent pieces of business hardware, a new report says that one-third of US businesses have no policy governing their use. Though nearly nine out of...
Read moreWhile USB drives are frequent pieces of business hardware, a new report says that one-third of US businesses have no policy governing their use. Though nearly nine out of...
Read moreTrue red team assessments require a secondary objective of avoiding detection. Part of the glory of a successful red team assessment is not getting detected by anything...
Read moreHow a new open source initiative for interoperable security tools and a wave of consolidation could finally provide some relief for overwhelmed security analysts and SOCs. The typical security...
Read moreHow a new open source initiative for interoperable security tools and a wave of consolidation could finally provide some relief for overwhelmed security analysts and SOCs. The typical security...
Read moreDuring several recent incident response engagements, FireEye Mandiant investigators uncovered new tools in FIN7’s malware arsenal and kept pace as the global criminal operators...
Read moreState has highest number of people in information security roles and the most current job openings, Comparitech study finds. Virginia currently ranks as one of the hottest states for...
Read moreState has highest number of people in information security roles and the most current job openings, Comparitech study finds. Virginia currently ranks as one of the hottest states for...
Read moreEmail addresses and phone numbers provided to secure user accounts were accidentally shared with marketers. Twitter account holders who provided an email address or phone number to enable multifactor...
Read more
Recent Comments