Security is weak, and most companies are clueless, according to Immunity researcher Lurene Grenier, who kicked off the Cisco Talos Threat Research Summit on Sunday. Your network is under...
Read moreMeet ‘Bro’: The Best-Kept Secret of Network Security
June 18 2018This often overlooked open source tool uses deep packet inspection to transform network traffic into exceptionally useful, real-time data for security operations. The 1990s was a terrific era for...
Read moreContainerized Apps: An 8-Point Security Checklist
June 17 2018Here are eight measures to take to ensure the security of your containerized application environment. Image Source: Sheila Fitzgerald via Shutterstock Containers allow applications to be abstracted from the...
Read more23,000 Compromised in HealthEquity Data Breach
June 17 2018HealthEquity, which handles more than 3.4 million health savings accounts, was breached when an intruder accessed an employee’s email. Sometimes all it takes is one employee to spark a...
Read moreMobile App Threats Continue to Grow
June 17 2018Criminals looking to profit from corporate resources and information keep going after mobile devices, two new reports confirm. Security threats aimed at mobile devices are evolving and shifting –...
Read moreRealizing the wide scope of fraud should be at the top of every business executive’s to-do list. Here’s some practical advice to help you stay safe. Fraud has a...
Read moreGrayshift, the company behind a system to help police break into iPhones, says it found a workaround for USB Restricted Mode. Hackers say they found a workaround for USB...
Read moreEmail, Social Media Still Security Nightmares
June 16 2018Phishing and banking trojans continue to be major threats brought into the enterprise. Users are going to click on sketchy links, download iffy files, and go to dangerous web...
Read moreAttacks directed at targets in Singapore went through the roof earlier this week. The recent meeting in Singapore between US President Donald Trump and North Korea’s Kim Jong Un...
Read moreThere are many factors to consider when making an application security purchasing decision, and the pressure is on organizations now more than ever to improve their security risk management...
Read more
Recent Comments