cybersecurity
Chris Eng: An infosec journey from offense to defense
“Come to my lab, I promise you’ll learn something cool,” a friend told Chris Eng. Within a couple of hours, he had walked him through writing an exploit for …
Can an international cyber convention ever succeed?
The Cold War is a distant memory for most, but today we see a new struggle for dominance on the global stage – with cyber weapons being the latest focal point. The advance of …
Top threats impacting endpoint security decisions
Enterprise Strategy Group surveyed 300 IT and information security professionals from large midmarket and enterprise-class organizations in order to examine the top threats …
Most SMBs are not worried about their business being hacked
America’s small business owners may want to consider placing a greater emphasis on cyber awareness and best practices year-round. According to a new survey by Paychex, …
Third-party risk management: Moving toward centralized, automated systems
While concerns about third-party risk remain high – particularly regarding cyber security – 58% of organizations ranked their programs as maturing or advanced, according to …
CEO email exposure underscores the importance of password management
Nearly one in three major CEOs has been pwned using their company email address, according to a new F-Secure study. In other words, a service they access using their company …
Secure remote browsing: A different approach to thwart ever-changing threats
A defense-in-depth strategy is essential to modern enterprises, and organizations must deepen their defenses as quickly as possible to fully protect themselves. One promising …
Data-driven analysis of vulnerabilities in real-world OT networks
Operational Technology (OT) networks are ripe targets for adversaries, whose motives range from criminal intent to operational disruption and even threats to human and …
The impact of threat hunting on your security operations
The main goal of threat hunting is to find traces attackers have left behind in the organization’s IT environment. These traces can date back to already solved crises or …
The 10 misconceptions of using a policy-based approach for access control
The principle of Attribute Based Access Control (ABAC) has existed for many years. It’s the evolution from simple access control lists and role-based access control, to a …
Infosec shouldn’t eat their own, we’re better than this
Security teams the world around are putting in hours every day to keep their company’s most prized assets secure. These are professionals that have spent considerable time …
The complex digital life of the modern family: Online safety and privacy concerns
The National Cyber Security Alliance (NCSA) conducted a study to better understand teens and parents’ attitudes, concerns and knowledge base about online safety and …
Featured news
Resources
Don't miss
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring