Expert Corner


Telecom services: Patient zero for email-based attacks?

Organizations offering telecommunication services are seeing more advanced malware threats than organizations in other industries, Lastline researchers have found. They have come to that conclusion after having analyzed all the threats seen by …


New infosec products of the week​: August 17, 2018

Alkemist: Harden vulnerable embedded systems and devices RunSafe Security announced the availability of Alkemist, a proprietary self-service technology built to reduce vulnerabilities and deny malware the uniformity needed to execute. Alkemist …


Endpoint breach prevention by reducing attack surfaces

In this podcast recorded at Black Hat USA 2018, Chris Carlson, VP of Product Management, Cloud Agent Platform at Qualys, talks about endpoint breach prevention by reducing attack surfaces. Here’s a transcript of the podcast for your convenience. …

SIM cards

AT&T sued for enabling SIM swap fraud

A cryptocurrency investor is suing AT&T because criminals were able to empty his accounts through SIM swap fraud (aka account port out fraud), even though he had already asked for additional protections to be set up on his AT&T …


Cloud computing remains top emerging business risk

Cloud computing ranks as the top risk concern for executives in risk, audit, finance and compliance, according to the latest survey by Gartner. In Gartner’s latest quarterly Emerging Risks Report, 110 senior executives in risk, audit, finance …


eBook: Windows PowerShell Scripting Tutorial

This PowerShell tutorial opens with an introduction to PowerShell scripting basics. It guides you through various topics, starting with launching PowerShell and preparing to run PowerShell scripts. Learning these basics will help you easily …

Industry news

Whitepapers and insight