The Rise of ‘Purple Teaming’
June 17 2019The next generation of penetration testing represents a more collaborative approach to old fashioned Red Team vs. Blue Team. In 1992, the film Sneakers introduced the term “Red Team” into...
Read moreThe next generation of penetration testing represents a more collaborative approach to old fashioned Red Team vs. Blue Team. In 1992, the film Sneakers introduced the term “Red Team” into...
Read moreAndroid-based two-factor authentication now works for Google applications on iPad and iPhone. Google now has extended its Android-based two-factor authentication to Google applications on iOS devices like iPads and iPhones....
Read moreAndroid-based two-factor authentication now works for Google applications on iPad and iPhone. Google now has extended its Android-based two-factor authentication to Google applications on iOS devices like iPads and iPhones....
Read moreBusiness email compromise attacks are growing in prevalence and creativity. Here’s a look at how they work, the latest stats, and some recent horror stories. Last summer, the US...
Read moreBusiness email compromise attacks are growing in prevalence and creativity. Here’s a look at how they work, the latest stats, and some recent horror stories. Last summer, the US...
Read moreOfficials reintroduce a bill that would let businesses monitor attacker behavior and target intruders on corporate networks. “Hacking back,” the largely controversial concept by which organizations can target intruders...
Read moreOfficials reintroduce a bill that would let businesses monitor attacker behavior and target intruders on corporate networks. “Hacking back,” the largely controversial concept by which organizations can target intruders...
Read moreThe development follows speculation and concern among security experts that the attack group would expand its scope to the power grid. The attackers behind the epic Triton/Trisis attack that...
Read moreThe development follows speculation and concern among security experts that the attack group would expand its scope to the power grid. The attackers behind the epic Triton/Trisis attack that...
Read moreIn a year when security companies have been snapped up left and right, these deals stand out from the chaos. (Image: Itchaznong – stock.adobe.com) Anyone watching the cybersecurity market...
Read more
Recent Comments