The virus affected the network, applications, and databases at City Power, which delivers electricity to the South African financial hub. Johannesburg’s City Power, the municipal entity delivering power to...
Read moreLouisiana Declares Cybersecurity State of Emergency
July 28 2019A series of attacks on school district systems leads the governor to declare the state’s first cybersecurity state of emergency. Louisiana is no stranger to declarations of emergency, but...
Read moreLouisiana Declares Cybersecurity State of Emergency
July 28 2019A series of attacks on school district systems leads the governor to declare the state’s first cybersecurity state of emergency. Louisiana is no stranger to declarations of emergency, but...
Read moreOf particular interest for cybercriminals is the Domain Name System, which plays a central role in orchestrating all Internet and application traffic. Security teams are laser-focused on protecting the...
Read moreOf particular interest for cybercriminals is the Domain Name System, which plays a central role in orchestrating all Internet and application traffic. Security teams are laser-focused on protecting the...
Read moreBlack Hat Q&A: Inside the Black Hat NOC
July 28 2019Cybersecurity expert Bart Stump explains what it’s like to reliably deliver a useful, high-security network for one of the toughest audiences in the world. When you sign up to...
Read moreBlack Hat Q&A: Inside the Black Hat NOC
July 28 2019Cybersecurity expert Bart Stump explains what it’s like to reliably deliver a useful, high-security network for one of the toughest audiences in the world. When you sign up to...
Read more3 Takeaways from the First American Financial Breach
July 28 2019Data leaks from business logic flaws are not well understood and difficult to identify before they reach production environments. Here’s how to find and prevent them. On the eve...
Read more3 Takeaways from the First American Financial Breach
July 28 2019Data leaks from business logic flaws are not well understood and difficult to identify before they reach production environments. Here’s how to find and prevent them. On the eve...
Read moreNew study found that any database containing 15 pieces of demographic data could be used to identify individuals. For more than two decades, researchers have chipped away at the...
Read more
Recent Comments