Calculating the Value of Security
July 22 2019What will it take to align staff and budget to protect the organization? As much as we’d like to think things have changed in the wake of WannaCry, NotPetya,...
Read moreWhat will it take to align staff and budget to protect the organization? As much as we’d like to think things have changed in the wake of WannaCry, NotPetya,...
Read moreThese competitions challenge participants with problems involving digital forensics, cryptography, binary analysis, web security, and many other fields. As cyberattacks become more sophisticated and network complexity increases, there are...
Read moreThese competitions challenge participants with problems involving digital forensics, cryptography, binary analysis, web security, and many other fields. As cyberattacks become more sophisticated and network complexity increases, there are...
Read moreAn attack by a ‘wizard hacker’ results in leaked records for virtually every Bulgarian taxpayer. A hacker hit Bulgaria’s NRA tax agency and gained access to the tax records...
Read moreAn attack by a ‘wizard hacker’ results in leaked records for virtually every Bulgarian taxpayer. A hacker hit Bulgaria’s NRA tax agency and gained access to the tax records...
Read moreThreat actors are increasingly ‘living off the land,’ using publicly available management and administration tools to conceal malicious activity. Image Source: Shutterstock Cybercriminals have long used legitimate management and...
Read moreThreat actors are increasingly ‘living off the land,’ using publicly available management and administration tools to conceal malicious activity. Image Source: Shutterstock Cybercriminals have long used legitimate management and...
Read moreKoadic toolkit gets upgrades – and a little love from nation-state hackers. An open source white-hat hacking tool that nation-state hacking teams out of China, Iran, and Russia have...
Read moreKoadic toolkit gets upgrades – and a little love from nation-state hackers. An open source white-hat hacking tool that nation-state hacking teams out of China, Iran, and Russia have...
Read moreGet the latest insights into how to attack and defend platforms like iOS, MacOS, and Windows 10 at this upcoming August security conference. Cybersecurity professionals, take note: There’s an...
Read more
Recent Comments