Introduction One of most significant recent developments in sophisticated offensive operations is the use of “Living off the Land” (LotL) techniques by attackers. These techniques leverage legitimate...
Read moreWhy CISOs Need a Security Reality Check
June 18 2018We deserve a seat at the executive table, and we’ll be much better at our jobs once we take it. There is a problem with information security today. I...
Read moreSecurely Disposing Mobile Devices
June 18 2018Mobile devices, such as smartphones, smartwatches, and tablets, continue to advance and innovate at an astonishing rate. As a result, some people replace their mobile devices as often as...
Read moreSecurity is weak, and most companies are clueless, according to Immunity researcher Lurene Grenier, who kicked off the Cisco Talos Threat Research Summit on Sunday. Your network is under...
Read moreMeet ‘Bro’: The Best-Kept Secret of Network Security
June 18 2018This often overlooked open source tool uses deep packet inspection to transform network traffic into exceptionally useful, real-time data for security operations. The 1990s was a terrific era for...
Read moreContainerized Apps: An 8-Point Security Checklist
June 17 2018Here are eight measures to take to ensure the security of your containerized application environment. Image Source: Sheila Fitzgerald via Shutterstock Containers allow applications to be abstracted from the...
Read more23,000 Compromised in HealthEquity Data Breach
June 17 2018HealthEquity, which handles more than 3.4 million health savings accounts, was breached when an intruder accessed an employee’s email. Sometimes all it takes is one employee to spark a...
Read moreMobile App Threats Continue to Grow
June 17 2018Criminals looking to profit from corporate resources and information keep going after mobile devices, two new reports confirm. Security threats aimed at mobile devices are evolving and shifting –...
Read moreRealizing the wide scope of fraud should be at the top of every business executive’s to-do list. Here’s some practical advice to help you stay safe. Fraud has a...
Read moreGrayshift, the company behind a system to help police break into iPhones, says it found a workaround for USB Restricted Mode. Hackers say they found a workaround for USB...
Read more
Recent Comments