Latest Posts

6fe4d99c3f5787c7098e67eb3c9161fd

Through the Executive Lens: Prioritizing Application Security Vulnerabilities

March 28, 2019 Added by:Neal Goldman

By focusing on specific AppSec initiatives and applying well-tested strategies and tools, you can prioritize the most important issues to focus on.

Comments  (0)

B68c8cbebf6b412d9fd4f9d0950a5901

Next Generation Firewalls are Old News in the Cloud

March 27, 2019 Added by:Sanjay Kalra

As users start to change the way they deploy infrastructure to the cloud, they will also need to find security solutions that are built by using the cloud in order to secure the cloud.

Comments  (0)

211571f3e14099fd9a6c172426982ca5

Trojan Horses for the Mind, Part 2 of Building Impactful Security Awareness Messaging

March 27, 2019 Added by:Perry Carpenter

Let’s talk about another Trojan Horse for the Mind -- visuals.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Internet-Exposed IBM BigFix Relays May Lead to Full Remote Compromise

March 21, 2019 Added by:Ionut Arghire

Internet-facing relays in IBM BigFix deployments could lead to information disclosure and potential full remote compromise if not properly configured, Atredis Partners security researchers have discovered.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

1 Million Apps Patched in Android Security Improvement Program

March 01, 2019 Added by:Ionut Arghire

Over its five-year lifetime, the Android Application Security Improvement Program helped over 300,000 developers to fix more than 1,000,000 apps on Google Play, Google says.

Comments  (0)

47c22ebc25ad3d1dac97fc04f17f8e52

The Role of Analytics in Protecting Healthcare Data Privacy and Security

February 27, 2019 Added by:Nilesh Dherange

Healthcare companies face their biggest threats from malicious insiders that abuse their access privileges to view or exfiltrate PII and PHI.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

WINDSHIFT Hackers Target Government Agency in the Middle East

February 26, 2019 Added by:Ionut Arghire

A recently discovered threat actor was observed targeting a Middle Eastern government agency on several occasions over the course of last year, Palo Alto Networks security researchers reveal.

Comments  (0)

294bb83c6b16fd49b4b29b275f319000

The Rise of Ransomware and the Consequences for SMBs

February 21, 2019 Added by:Timur Kovalev

Ransomware works; that’s why hackers keep honing their techniques. SMBs need to be especially careful when it comes to cybersecurity and should work with vendors that understand their unique security needs.

Comments  (0)

D63b67548a5fd4323d25d572dd43bd76

Trump Administration Starts the Ball Rolling with the National Cyber Strategy

February 19, 2019 Added by:Sam Bocetta

The topic of cybersecurity won’t go away. Like national security in general, it will remain eternal fodder for future politicians to bat around

Comments  (0)

6dc5fbf4195307a7504ede26fd385662

A Call to Structure

February 15, 2019 Added by:Chris O'Brien

One of the most significant challenges you face when building a threat Intelligence team is about how to best take on the ever-growing amount of Threat Intel.

Comments  (0)