Sudhakar Reddy Bonthu used insider information about the company’s 2017 data breach to profit in stock transaction. Fallout from the epic Equifax data breach just keeps coming: A second...
Read moreThe paradox of cybersecurity automation: It makes your staff more productive but takes more quality experts to make it work. Enterprises increasingly depend on security automation and orchestration to...
Read moreWhy technology alone can’t reduce risk
June 29 2018CSO Online | Jun 28, 2018 Sponsored by Centrify — John Kindervag, Zero Trust founder and former analyst at Forrester Research, and Dr. Chase Cunningham, Principal Analyst, Forrester Research,...
Read moreBotnets Evolving to Mobile Devices
June 29 2018Millions of mobile devices are now making requests in what’s described as “an attack on the economy.” Botnets have tended to hide in the nooks and crevices of servers...
Read moreTwo-Step Verification
June 29 2018The process of authentication, or proving who you are, is key to protecting your information, such as your email, social media, or online banking accounts. You may not realize...
Read morePlant Your Flag, Mark Your Territory
June 29 2018Many people, particularly older folks, proudly declare they avoid using the Web to manage various accounts tied to their personal and financial data — including everything from utilities and...
Read moreMarketing data firm left its massive database open to the Internet. What happens when you leave a database filled with personal information open to the Internet? People find it:...
Read moreRisk management is becoming increasingly complicated, thanks to the growing volume and complexity of security threats, and it is leaving many organizations awash in security risk data without the...
Read moreCoin Miner Malware Spikes 629% in ‘Telling’ Q1
June 28 2018Drastic growth suggests adversaries are learning how they can maximize rewards with minimal effort. Coin miner malware has replaced ransomware as security’s biggest threat, with samples spiking 629% in...
Read moreIntroduction Through FireEye Dynamic Threat Intelligence (DTI), we observed RIG Exploit Kit (EK) delivering a dropper that leverages the PROPagate injection technique to inject code...
Read more
Recent Comments