Regulatory penalties that exceed the cost of an extortion payout may lead to a new form of ransomware. These four steps can keep you from falling into that trap....
Read more6 Ways DevOps Can Supercharge Security
August 5 2018Security teams have a huge opportunity to make major inroads by embracing the DevOps movement. Image Source: Adobe Stock (Dmytro Tolokonov) As the DevOps movement goes mainstream, IT security...
Read more6 Ways DevOps Can Supercharge Security
August 5 2018Security teams have a huge opportunity to make major inroads by embracing the DevOps movement. Image Source: Adobe Stock (Dmytro Tolokonov) As the DevOps movement goes mainstream, IT security...
Read moreCisco intends to use Duo’s authentication technology to ramp up security across hybrid and multicloud environments. Networking giant Cisco Systems has agreed to buy authentication startup Duo Security for...
Read moreCisco intends to use Duo’s authentication technology to ramp up security across hybrid and multicloud environments. Networking giant Cisco Systems has agreed to buy authentication startup Duo Security for...
Read moreDEF CON Invites Kids to ‘Hack the Election’
August 5 2018New contest at DEF CON lets kids ages 8 to 16 hunt for vulnerabilities in replicas of states’ election-results websites. DEF CON is kicking its Voting Village hacking event...
Read moreDEF CON Invites Kids to ‘Hack the Election’
August 5 2018New contest at DEF CON lets kids ages 8 to 16 hunt for vulnerabilities in replicas of states’ election-results websites. DEF CON is kicking its Voting Village hacking event...
Read more4 Reasons Why Companies Are Failing at Incident Response
August 4 2018When it comes to containing the business impacts of a security breach, proper planning is often the difference between success and failure. The cybersecurity threat landscape continues to evolve...
Read more4 Reasons Why Companies Are Failing at Incident Response
August 4 2018When it comes to containing the business impacts of a security breach, proper planning is often the difference between success and failure. The cybersecurity threat landscape continues to evolve...
Read moreFBI Offers New IoT Security Tips
August 4 2018A new article from the FBI offers insight into IoT risks and ways to reduce them. Following the FBI’s May request to router owners to reboot their devices, the...
Read more
Recent Comments