Please turn on your JavaScript for this page to function normally.
cyber threat maps
7 free cyber threat maps showing attack intensity and frequency

Cyber threat maps are one of the most visually engaging tools in the arsenal of cybersecurity professionals. These real-time visualizations provide a global perspective on …

Appointments
OneSpan appoints Matthew Moynahan as President and CEO

OneSpan announced that the Company’s Board of Directors has appointed Matthew Moynahan as President and Chief Executive Officer effective November 29, 2021. Mr. Moynahan …

fire
Intensifying DDoS attacks: ​Choosing your defensive strategy

One of the biggest misconception regarding DDoS attacks is that they are a once-in-a-lifetime event for organizations, says Josh Shaul, VP of Web Security at Akamai. …

DDoS
Surge in memcached-based reflected DDoS attacks is due to misconfigured servers

Massive memcached-based reflection DDoS attacks with an unprecedented amplification factor have been ongoing for the last few days, by taking advantage of memcached servers …

bomb
Infosec expert viewpoint: DDoS attacks

DDoS attacks have become more extensive and are testing the limits of existing DDoS mitigation tools and practices, as well as affecting online businesses globally. …

structure
Forget about the malware, go after attackers’ tactics, techniques and procedures

The cybercriminal’s options for monetizing attacks has never been broader, less complex, or less risky, and attempts to detect intrusions by detecting the malware they …

talk speak speaker
Industry reactions to the Verizon 2017 Data Breach Investigations Report

Nearly 2,000 breaches were analyzed in this year’s Verizon 2017 Data Breach Investigations Report and more than 300 were espionage-related. Here are some of the comments Help …

Search
Monitoring scanning activities that could lead to IoT compromises

IoT devices are ideal targets for attackers looking to build DDoS botnets because they have limited or non-existent security features. Some IoT devices utilize hard-coded …

DDoS
Innovation and exploitation fuel DDoS attack landscape

Arbor Networks released its 12th Annual Worldwide Infrastructure Security Report offering direct insights from network and security professionals at global service providers, …

keyboard
New infosec products of the week​: December 9, 2016

Thales releases advanced encryption solutions for secure docker containers Thales released new capabilities for its Vormetric Data Security Platform. These advances extend …

robot
Building the IoT monster

When Mary Shelley wrote Frankenstein, she imagined the misguided doctor assembling his creature from dead body parts, who instead of elevating science, created something dark …

Report: The changing face of hacking
Over one-third of Americans have been hacked

Two-thirds of Americans believe themselves to be tech savvy, although their actions with regard to online security indicate otherwise – with millennials being the worst …

Don't miss

Cybersecurity news