cyber resilience
Automating the hunt for cyber attackers
In this podcast recorded at Black Hat USA 2017, Mike Banic, Vice President, Marketing, and Chris Morales, Head of Security Analytics at Vectra Networks, talk about the use of …
Review: Advanced Persistent Security
About the authors Ira Winkler, CISSP is President of the Internet Security Advisors Group. He is considered one of the world’s most influential security professionals. Araceli …
The next frontier of cyber governance: Achieving resilience in the wake of NotPetya
Earlier this week, several European nations experienced a widespread ransomware attack. Major international giants, such as Merck, WPP, Rosneft, and AP Moller-Maersk, …
Which countermeasures improve security and which are a waste of money?
If you want to know about which cyber defenses are most effective and which are a waste of money and resources, ask a hacker. And that’s just what Nuix researchers did. …
NTT Security: Delivering cyber resilience
In this podcast recorded at RSA Conference 2017, Garry Sidaway, SVP of Security Strategy & Alliances for NTT Security, talks about the formation of NTT Security and how …
82% of executives experienced a fraud incident in the past year
Fraud, cyber, and security incidents are now the “new normal” for companies across the world, according to the executives surveyed for a new Kroll report. The …
The difficult path to cyber resilience
Global organizations are more confident than ever that they can predict and resist a sophisticated cyber attack, but are falling short of investments and plans to recover from …
The decline of cyber resilience: Organizations unprepared to face attacks
Only 32 percent of IT and security professionals say their organisation has a high level of cyber resilience – down slightly from 35 percent in 2015, according to a global …
Tesco Bank hack shows that attackers continue to follow easy money
What happens when nearly 9,000 accounts at a financial institution experience fraudulent activity and clients have nearly £2.5 million stolen? People notice. The bank notices …
Seven myths for hyperconverged integrated systems
As with many new technology trends, certain assumptions and hype emerge that can influence buyer behavior and lead to poor decisions. Gartner has identified seven of the most …
Dyn DDoS attack: The aftermath
On October 21, New Hampshire-based Internet performance management company Dyn suffered the largest DDoS attack ever to be registered. The attacks – there were three, in …
Use Chaos Monkey to push engineers to build resilient cloud services
Netflix’s engineering team is good at sharing the tools they create, and keeping them updated to serve different needs. Chaos Monkey is the latest offering that received …
Featured news
Resources
Don't miss
- Attackers are exploiting RCE vulnerability in BIG-IP APM systems (CVE-2025-53521)
- TeamPCP strikes again: Backdoored Telnyx PyPI package delivers malware
- CISA sounds alarm on Langflow RCE, Trivy supply chain compromise after rapid exploitation
- Top product launches at RSAC 2026
- Researchers release tool to detect stealthy BPFDoor implants in critical infrastructure networks