Black Hat Europe
June 13 2018Security experts from around the world will share ground breaking research at the Black Hat Briefings. Submit proposals by completing a submission form on the Call for Papers. Opens:...
Read moreSecurity experts from around the world will share ground breaking research at the Black Hat Briefings. Submit proposals by completing a submission form on the Call for Papers. Opens:...
Read moreNext read this: State of the CIO: IT-business alignment (finally) gets real 10 old-school IT principles that still rule 9 forces shaping the future of IT The dark secrets...
Read moreA security bypass weakness in macOS APIs let attackers impersonate Apple to sign malicious code and evade third-party security tools. When is Apple-signed code not actually signed by Apple?...
Read moreThe SANS Institute provides training related to cybersecurity and the safe use of technology within your organization. To provide this training, the SANS Institute captures and processes personal data...
Read moreMicrosoft today pushed out a bevy of software updates to fix more than four dozen security holes in Windows and related software. Almost a quarter of the vulnerabilities addressed...
Read moreWhen CIOs aren’t being overwhelmed by data, they’re wondering who’s securing it. They’re dealing with the pressure of cutting costs while trying to stay nimble as they face difficulties...
Read moreThe most critical vulnerability, experts say, affects Windows Domain Name Systems, while another lets attackers hack Cortana from the lock screen. Another month, another Patch Tuesday update. Microsoft today...
Read moreCSO Online | Jun 12, 2018 Host Steve Ragan reports from the RSA 2018 conference, talking with Liv Rowley, an intelligence analyst at Flashpoint, about Spanish cybercrime, an underground...
Read moreJust because you’re not yet using IPv6 doesn’t mean you’re safe from the protocol’s attack vectors. During the historic growth of the Internet in the 1990s – when venture...
Read moreJust because you’re not yet using IPv6 doesn’t mean you’re safe from the protocol’s attack vectors. During the historic growth of the Internet in the 1990s – when venture...
Read more
Recent Comments