CSO Online | Oct 18, 2018 Shodan, a search engine for all ports within the internet, can help enterprises identify and lock down security vulnerabilities. Senior writer J.M. Porup...
Read more(ISC) 2 : Global Cybersecurity Workforce Short 3 Million People
October 18 2018With the skills gap still wide, security leaders explain the challenges of hiring and retaining security experts. The global shortage of cybersecurity experts has reached 2.93 million, posing a...
Read more(ISC) 2 : Global Cybersecurity Workforce Short 3 Million People
October 18 2018With the skills gap still wide, security leaders explain the challenges of hiring and retaining security experts. The global shortage of cybersecurity experts has reached 2.93 million, posing a...
Read moreOracle Issues Massive Collection of Critical Security Updates
October 18 2018The software updates from Oracle address a record number of vulnerabilities. Oracle this week issued a Critical Patch Update (CPU) encompassing 301 separate updates spread across the entire Oracle...
Read moreOracle Issues Massive Collection of Critical Security Updates
October 18 2018The software updates from Oracle address a record number of vulnerabilities. Oracle this week issued a Critical Patch Update (CPU) encompassing 301 separate updates spread across the entire Oracle...
Read more3 Years After Attacks on Ukraine Power Grid, BlackEnergy Successor Poses Growing Threat
October 18 2018In what could be a precursor to future attacks, GreyEnergy is targeting critical infrastructure organizations in Central and Eastern Europe. Three years after BlackEnergy’s unprecedented cyberattack on Ukraine’s power...
Read more3 Years After Attacks on Ukraine Power Grid, BlackEnergy Successor Poses Growing Threat
October 18 2018In what could be a precursor to future attacks, GreyEnergy is targeting critical infrastructure organizations in Central and Eastern Europe. Three years after BlackEnergy’s unprecedented cyberattack on Ukraine’s power...
Read moreThe Three Dimensions of the Threat Intelligence Scale Problem
October 18 2018To succeed, organizations must be empowered to reduce their attack surface and staff overload so they can get more out of their existing firewall and threat intelligence investments. There...
Read moreThe Three Dimensions of the Threat Intelligence Scale Problem
October 18 2018To succeed, organizations must be empowered to reduce their attack surface and staff overload so they can get more out of their existing firewall and threat intelligence investments. There...
Read moreNC Water Utility Fights Post-Hurricane Ransomware
October 17 2018North Carolina’s Onslow Water and Sewer Authority was hit with an advanced attack in the wake of Hurricane Florence. The Onslow Water and Sewer Authority (ONWASA), a critical water...
Read more
Recent Comments