Attend Black Hat USA this summer and see how researchers are subverting the GDPR’s privacy rules and detecting deep fakes with machine learning. Even the most well-meaning cybersecurity laws...
Read moreOffice 365 Multifactor Authentication Done Right
July 1 2019Why the ubiquitous nature of Office 365 poses unique challenges for MFA-based security and how organizations can protect themselves. Attacks like password spraying, brute force, and phishing have targeted...
Read moreOffice 365 Multifactor Authentication Done Right
July 1 2019Why the ubiquitous nature of Office 365 poses unique challenges for MFA-based security and how organizations can protect themselves. Attacks like password spraying, brute force, and phishing have targeted...
Read morePolymorphic malware is far from a new thing. But today, what is good for attackers is also good for defenders. Here’s why. I first wrote about polymorphic malware four...
Read morePolymorphic malware is far from a new thing. But today, what is good for attackers is also good for defenders. Here’s why. I first wrote about polymorphic malware four...
Read moreHow Hackers Infiltrate Open Source Projects
July 1 2019The dependency trees of modern software-development make smaller open-source projects vulnerable to hackers sabotaging code. The open source software that the vast majority of organizations include in their critical...
Read moreHow Hackers Infiltrate Open Source Projects
July 1 2019The dependency trees of modern software-development make smaller open-source projects vulnerable to hackers sabotaging code. The open source software that the vast majority of organizations include in their critical...
Read moreAs personal messaging platforms see the rise of end-to-end encryption, businesses struggle to provide strong levels of security. As the world moves toward end-to-end encryption for personal messaging platforms,...
Read moreAs personal messaging platforms see the rise of end-to-end encryption, businesses struggle to provide strong levels of security. As the world moves toward end-to-end encryption for personal messaging platforms,...
Read more7 Ways to Mitigate Supply Chain Attacks
June 30 2019Breaches caused by external vendors and service providers have become a major and escalating problem for organizations. Image Source: Shutterstock Breaches resulting from third-party security lapses are on the...
Read more
Recent Comments