Hiring for security is difficult, as many surveys show. But what the research doesn’t explain is the “why” – and a lack of talent may not be the sole...
Read moreSurvey Shows a Security Conundrum
April 25 2019A new report examines and quantifies the conflicts and challenges faced by business security leaders. A new survey illustrates how security executives are forced to embrace conundrums, conflicts, and...
Read moreSurvey Shows a Security Conundrum
April 25 2019A new report examines and quantifies the conflicts and challenges faced by business security leaders. A new survey illustrates how security executives are forced to embrace conundrums, conflicts, and...
Read moreRussian-speaking threat group has been targeting retailers and financial institutions in the US and abroad via a spear-phishing campaign. Researchers from Cyberint have attributed a string of recent attacks...
Read moreRussian-speaking threat group has been targeting retailers and financial institutions in the US and abroad via a spear-phishing campaign. Researchers from Cyberint have attributed a string of recent attacks...
Read more5 Security Challenges to API Protection
April 25 2019Today’s application programming interfaces are no longer simple or front-facing, creating new risks for both security and DevOps. All APIs are different inside, even if they’re using similar frameworks...
Read more5 Security Challenges to API Protection
April 25 2019Today’s application programming interfaces are no longer simple or front-facing, creating new risks for both security and DevOps. All APIs are different inside, even if they’re using similar frameworks...
Read moreNew Twist in the Stuxnet Story
April 24 2019What a newly discovered missing link to Stuxnet and the now-revived Flame cyber espionage malware add to the narrative of the epic cyber-physical attack. Three years after the 2010...
Read moreNew Twist in the Stuxnet Story
April 24 2019What a newly discovered missing link to Stuxnet and the now-revived Flame cyber espionage malware add to the narrative of the epic cyber-physical attack. Three years after the 2010...
Read moreGoogle File Cabinet Plays Host to Malware Payloads
April 24 2019Researchers detect a new drive-by download attack in which Google Sites’ file cabinet template is a delivery vehicle for malware. Cybercriminals have been using the file cabinet template built...
Read more
Recent Comments