Please turn on your JavaScript for this page to function normally.
strategy
The six stages of a cyber attack lifecycle

The traditional approach to cybersecurity has been to use a prevention-centric strategy focused on blocking attacks. While important, many of today’s advanced and motivated …

Businessman juggling
Key areas for risk managers in 2017 and beyond

A majority of banks and other financial institutions surveyed are not confident about their firms’ effectiveness in managing cybersecurity and geopolitics, two of the …

drone
Are enterprises ready for drones?

From package delivery to props in major sporting events, drones continue to play major roles in everyday life. But are enterprises prepared for the rise of the drones in their …

Technology
Week in review: MySQL databases held for ransom, CloudPets as surveillance devices

Here’s an overview of some of last week’s most interesting news, podcasts and articles: Google releases details, PoC exploit code for IE, Edge flaw As we’re …

cloud
AlienVault USM Anywhere: Security in the cloud, for the cloud

In this podcast recorded at RSA Conference 2017, Denny LeCompte, SVP, Products at AlienVault, talks about AlienVault USM Anywhere, a SaaS security monitoring solution that …

servers
New infosec products of the week​: March 3, 2017

Nehemiah Security’s AtomicEye RQ quantifies the effects of cyber exploits Nehemiah Security released AtomicEye RQ (Risk Quantifier). Engineered to replicate a network …

speed
The evolution of cloud and mobile security

In this podcast recorded at RSA Conference 2017, Salim Hafid, Product Marketing Manager at Bitglass, talks about how organizations are dealing with BYOD, cloud security, and …

The agile IT stack grows and becomes more complex

BigPanda’s annual survey evaluated the current IT monitoring landscape, including a review of the most popular tools for monitoring, deployment, and ticketing/collaboration; …

Yahoo
Yahoo cookie-forging incident affected 32 million accounts

We finally know how many user accounts were affected by last year’s Yahoo cookie-forging incident: 32 million. What happened? “In November and December 2016, we …

Android graffiti
132 compromised apps removed from Google Play

Google has recently removed 132 Android apps from Google Play due to them containing in their local HTML pages hidden iFrames linking to malicious domains. But even though …

alert
Chrome users on macOS to see more dangerous site warnings

MacOS users who use Chrome to surf the web are likely to see more security warnings in the coming days, as Google’s Safe Browsing service will start flagging sites …

robot
Multiple security flaws found in mainstream robotic technologies

IOActive exposed numerous vulnerabilities found in multiple home, business, and industrial robots available on the market today. The array of vulnerabilities identified in the …

Don't miss

Cybersecurity news