The ethical and legal dilemmas of threat researchers
Threat intelligence is mainstreaming into a de-facto everyday tool of cyber-defense. But all that intelligence must be collected, analyzed, and prepared by someone. Enter …
Threat intelligence is mainstreaming into a de-facto everyday tool of cyber-defense. But all that intelligence must be collected, analyzed, and prepared by someone. Enter …
In light of new data privacy legislations, a new Webroot report looks at how businesses in the U.S., U.K., and Australia are adjusting to new data security measures in order …
Do security professionals like their jobs and would they recommend a career in cyber security to those looking into one? What do they like about their jobs and what motivates …
Every application that is downloaded via an app store runs in a zero-trust environment. When a protected app is published to an official app store, an open loop of protection …
After a two-year transition period, the General Data Protection Regulation (GDPR) becomes enforceable beginning 25 May 2018. Presumably, many large companies have been working …
A recent Outpost24 survey of 155 IT professionals, which revealed that 42 percent ignore critical security issues when they don’t know how to fix them (16 percent) or don’t …
After year over year increases in the number of reported data breaches, Risk Based Security has released the results of their Q1 2018 Data Breach QuickView Report, showing the …
In this podcast recorded at RSA Conference 2018, Travis Farral, Director of Security Strategy at Anomali, talks about the impact of blue team collaboration. Discover why …
“You can pay me now, or you can pay me later” was the tagline of a 1981 ad promoting oil filters. Seems simple, but the implied message was much stronger: It wasn’t about …
In this interview, Gary Golomb, co-founder at Awake Security, talks about how machine learning help develop a scalable enterprise cybersecurity plan, what technologies can …
Forrester Consulting surveyed 158 security leaders to evaluate how enterprises are assessing and managing security threats to their IT infrastructure, as well as to their …
In this podcast recorded at RSA Conference 2018, Jerry Caponera, VP cyber risk strategy at Nehemiah Security, offers some interesting thoughts on cyber risk assessment and …