
Subverting protection into DDoS attacks
On average, DNSSEC reflection can transform an 80-byte query into a 2,313-byte response, an amplification factor of nearly 30 times, which can easily cause a network service …

Incident response challenge: How to get out of Firefighter Mode
Organizations tend to have the mindset that their IT and security teams should play the role of First Responders on the scene of a security incident. They expect their IT and …

eBook: Defending against crypto ransomware
Unlike traditional malware, crypto ransomware doesn’t steal information. Instead, it encrypts a victim’s documents, spreadsheets, pictures, videos and other files, and then …

Employee awareness training: Key component of IT security initiatives
IT projects are most effective when they take into account people, processes, and technology. These three components should be addressed concurrently so the organization can …

Security startup confessions: How to tackle outsourcing
My name is Kai Roer and I am a co-founder of a European security startup, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …

Breathing new life into SSL VPNs: Making the most of the security benefits
Network security has been in an accelerated arms race for over a decade, with IT managers constantly adding new technologies to secure various network resources in an attempt …

Four IT trends CIOs need to know about
CIOs looking for a benchmark to gauge IT success can depend on user experience metrics to provide the answer. In each of today’s “third platform” …

Security analytics: Risk from the inside out
High profile security breaches are at an all-time high. The threat has finally reached the boardroom, and we’re seeing increased security spending. Funds are increasingly …

The growing threat of ransomware: Lucrative, low-risk and easy to use
Recent headlines are testament to the growing popularity of ransomware attacks on businesses and consumers alike. In January, for example, Lincolnshire County Council saw its …

Industry collaborates on automotive cybersecurity best practices
New technology has paved the way for extraordinary advancements in vehicle safety, emissions reduction, and fuel economy. Today’s vehicles do more to keep drivers secure …

Challenges of cybersecurity due diligence in the acquisition process
Acquirers are increasingly aware of the need for vigorous cybersecurity due diligence in M&A, yet often lack the proper personnel to conduct thorough analyses, according …

CISOs need teamwork and a framework, says Chief Cybersecurity Officer at Trend Micro
Eduardo Cabrera is the Chief Cybersecurity Officer at Trend Micro, responsible for analyzing emerging cyber threats to develop enterprise risk management strategies. Before …
Featured news
Resources
Don't miss
- AI Security Map: Linking AI vulnerabilities to real-world impact
- How compliance teams can turn AI risk into opportunity
- Hottest cybersecurity open-source tools of the month: August 2025
- What CISOs can learn from Doppel’s new AI-driven social engineering simulation
- Social media apps that aggressively harvest user data