Please turn on your JavaScript for this page to function normally.
Past, present and future of threat intelligence platforms

In this podcast recorded at RSA Conference 2016, John Czupak and Ryan Trost, CEO and CTO of ThreatQuotient respectively, clarify the meaning of threat intelligence and …

cloud computing
Cloud computing: Security and evolution

What we’ve seen in the past 15 years is cloud computing becoming increasingly popular. Many companies have focused plenty of resources in making cloud computing the most …

Magnify
Web application scanning with Htcap

Htcap is a free web application scanner that can crawl single page applications in a recursive manner by intercepting Ajax calls and DOM changes. The app is focused mainly on …

Innovation Sandbox and the modern threat landscape

In this podcast, recorded at RSA Conference 2016, Ajay Arora, CEO at Vera, and Amir Ben-Efraim, CEO at Menlo Security, discuss their participation in the Innovation Sandbox …

Apple
Reactions to the KeRanger ransomware for Macs

Palo Alto researchers have discovered the first fully functional ransomware aimed at Mac users. The malware, dubbed KeRanger, has been found bundled into the Mac version of …

Anomali threat intelligence
Making sense of threat intelligence data in your IT environment

Threat intelligence data has been growing at an exponential rate of 39% a month. Enterprise customers are looking at around 30,000 events going into their SIEM every second. …

connection
Working towards a common set of IoT standards

Major industry leaders who are invested in the future of the Internet of Things, announced they will unify as the Open Connectivity Foundation (OCF), an entity whose goal will …

Volvo
Volvo to launch a car without a physical key

Can you imagine accessing and driving your car without a physical key? In a first for the automotive industry, Volvo is set to become the first car manufacturer to offer cars …

PacketFence
PacketFence: Free and open source network access control

PacketFence is a fully supported, free and open source network access control (NAC) solution. Its feature set includes a captive-portal for registration and remediation, …

W3C
W3C launches effort to replace passwords

The World Wide Web Consortium (W3C) is launching a new standards effort in web authentication that aims to offer a more secure and flexible alternative to password-based …

desk
(IN)SECURE Magazine issue 49 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 49 has been released today. Table of contents …

mitmproxy
Intercept, inspect and modify traffic flow with mitmproxy

mitmproxy is an interactive console program that allows traffic flows to be intercepted, inspected, modified and replayed. All flows are kept in memory, which means that it’s …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools