Expert corner

Black Hat USA 2016

How much of a risk is BYOD to network security?

We’re all familiar with BYOD dangers: data breaches exploited because of a lack of proper security protocols and encryption on devices or missed operating system updates; data leakage as a result of device software not being regularly …


Cisco starts publishing fixes for EXTRABACON exploit

Starting last Wednesday, Cisco has begun publishing fixes for the SNMP RCE flaw in the software of its Adaptive Security Appliances (ASA), which can be triggered through the EXTRABACON exploit leaked by the Shadow Brokers. The exploit was …

CSA book

100 best practices in Big Data security

The Cloud Security Alliance (CSA) released the new handbook from the CSA Big Data Working Group, outlining the 100 best practices in Big Data security. The Big Data Security and Privacy Handbook: 100 Best Practices in Big Data Security and …


Data protection for any cloud, anywhere

In this podcast recorded at Black Hat USA 2016, Jeff Schilling, CSO at Armor, talks about Armor Anywhere, which provides user-friendly managed security, with visibility and controls to ensure the protection of workloads, assets and applications. …


Don't miss

Malware news

Privacy news

Black Hat USA 2016