Expert analysis

Passion, ingenuity and hard work: The cybersecurity startup story of Israel
According to Start-Up Nation Central (SNC), there are currently 400 cybersecurity start-ups operating in Israel. In 2018, they raised over $1.2 billion in 96 rounds of …

Microsoft is right, mandatory password changes are obsolete
Microsoft has recently come out and said that mandatory password changing is ancient and obsolete. This goes directly against everything we were trained to think for the last …

Orchestrating security policies across your hybrid cloud with intelligent data virtualization
The proliferation of data is causing a security and governance challenge across the hybrid cloud. Estimates project the global datasphere will grow from 33 zettabytes in 2018 …

How to secure your data as you go digital
To scale more efficiently and serve customers better, companies are moving more workloads and services to the cloud. According to IDG, 37 percent of companies are increasing …

Security trends to follow at Black Hat USA 2019
Black Hat USA 2019 is just around the corner! Selecting which sessions to attend from among the conference’s jam-packed catalog of training sessions, panels and briefings can …

The rise of biometrics and passwordless security
Whether you realize it or not, our current era of mobile and cloud computing can be defined, both positively and negatively, by shared secrets. Shared secrets — passwords, …

The need for scalable OT security
As manufacturers and other industrial network owners are becoming more security conscious, they are coming up against security performance issues. Operational Technology (OT) …

How AI can improve user experience and security for the finance industry
For the last 50 years, the fundamental and largely unchanged model for identifying and authenticating users has been based on the combination of a username and password, …

Tricking attackers through the art of deception
In cybersecurity, deception is redundant if it cannot fulfill its critical aim – to misdirect, confuse, and lure attackers into traps and dead-ends. It is the art of tricking …

Security or compliance? Stop choosing between them
The difference between security and compliance is more than just process. It’s philosophy and practice. Compliance can be one tactical execution of a great security strategy …

Securing modern web apps: A case for framework-aware SAST
If you were to write a web application entirely by yourself, it would be a rather daunting task. You would need to write the UI elements from lower-level APIs, set up and …

How DNS firewalls can burn security teams
It’s easy to see how DNS firewalls could have thwarted 33% of data breaches. For most IT and security teams, DNS has been an afterthought. Or, worse, not even that. The …
Featured news
Resources
Don't miss
- F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info
- Microsoft patches three zero-days actively exploited by attackers
- U.S. seizes $15 billion in Bitcoin linked to massive forced-labor crypto scam
- A safer way to break industrial systems (on purpose)
- Maltrail: Open-source malicious traffic detection system