Launch your own cybersecurity sprint: 30 days to improved security
Whether it’s well-publicized cyber attacks on government organizations or widespread ransomware that threatens to halt business operations, attackers continue to target …
IBM reboots iconic mainframe: Encrypt data all the time, at any scale
IBM today unveiled IBM Z, the next generation of a transaction system capable of running more than 12 billion encrypted transactions per day. The new system also introduces an …
Week in review: Acunetix 11 review, BEC scams exposed, innovation and cybercrime
Here’s an overview of some of last week’s most interesting news and articles: 751 domains hijacked to redirect visitors to exploit kit An unknown attacker has …
Dark web market Alpha Bay was shut down by law enforcement
Dark web black market Alpha Bay went offline on June 5, leaving users to wonder whether its operators did it and ran off with their money. Reassurances that the market will be …
NTT Security to give away Gap Assessment at Black Hat USA 2017
This year at Black Hat USA 2017, NTT Security is focusing on incident response readiness with a promotion called Swimming with the Sharks: The Need for Proactive Critical …
751 domains hijacked to redirect visitors to exploit kit
An unknown attacker has managed to modify the name servers assigned to 751 domains, which resulted in some visitors to the hijacked domains being redirected to a site hosting …
Could e-discovery pros fill the insatiable demand for cybersecurity talent?
When looking at the cybersecurity industry from a jobs perspective, there is no denying demand for talent far exceeds supply. With many lingering vacant job requisitions, who …
New infosec products of the week: July 14, 2017
Pramati introduces ThumbSignIn biometric authentication platform Pramati Technologies announced the ThumbSignIn biometric authentication SaaS platform for mobile and web …
Worldwide IT spending to grow 2.4 percent in 2017
Worldwide IT spending is projected to total $3.5 trillion in 2017, a 2.4 percent increase from 2016, according to Gartner. This growth rate is up from the previous …
EFF offers legal advice to researchers at Black Hat, B-Sides and DEF CON
Not all security researchers have someone to talk to and ask specific advice about the legal challenges that they could be faced while doing their work. If you are one of …
BEC scams: How to avoid them and how to fight back
Phishing and spear-phishing emails are a constant threat to all users, but enterprises are positively inundated with them. “Most businesses will use a spam filter and …
Don’t let cybercrime hold your innovation to ransom
When things break, our natural instinct is to look for someone to blame. Why? Because nothing happens by accident. It’s either done on purpose, a casualty of neglect or lack …