Please turn on your JavaScript for this page to function normally.
Book
Review: Advanced Persistent Security

About the authors Ira Winkler, CISSP is President of the Internet Security Advisors Group. He is considered one of the world’s most influential security professionals. Araceli …

Broken glass
66% of US law firms reported a breach in 2016

The majority of US-based law firms are not only exposed in a wide variety of areas, but in many cases, unaware of intrusion attempts. These findings were based on Logicforce …

bitcoin
South Korean bitcoin exchange hacked, user accounts plundered

Bithumb, a South Korean bitcoin and ether exchange, has suffered a data breach that resulted in customer losses potentially reaching billions of South Korean won (currently, a …

money
How to create an effective application security budget

Inadequately secured software ranks amongst the most significant root cause issues in cybersecurity. The frequency and severity of attacks on the application layer is greater …

eye
Security’s blind spot: The long-term state of exception

It seems every major hack is accompanied by the pointing of fingers. And there are plenty of places to point them: the servers that weren’t patched, the retailer who hadn’t …

speed
How High-Tech Bridge uses machine learning

In this podcast, Ilia Kolochenko, CEO at High-Tech Bridge, talks about the difference between artificial intelligence and machine learning, and illustrates how his company …

Windows 10
Windows 10 will use protected folders to thwart crypto ransomware

Windows 10 Fall Creators Update (the next major update of Microsoft’s popular OS) is scheduled to be released in September, and will come with major new end-to-end …

fire
Rising information security threats, and what to do about them

The digital threat landscape faced by enterprises large and small is in perpetual flux, and keeping an eye on things and adapting defenses should be of primary importance to …

locks
TLS security: Past, present and future

The Transport Layer Security (TLS) protocol as it stands today has evolved from the Secure Sockets Layer (SSL) protocol from Netscape Communications and the Private …

corporate cloud
Cloud IT infrastructure revenues grew 14.9% to $8 billion in 1Q17

Vendor revenue from sales of infrastructure products (server, storage, and Ethernet switch) for cloud IT, including public and private cloud, grew 14.9% year over year in the …

building
Week in review: NotPetya, Facebook to inspect private messages, new issue of (IN)SECURE

Here’s an overview of some of last week’s most interesting news and articles: With ransomware, pay up if you want to keep paying So there you are, staring at a …

Eternal Blues
Eternal Blues: A free EternalBlue vulnerability scanner

It is to be hoped that after the WannaCry and NotPetya outbreaks, companies will finally make sure to install – on all their systems – the Windows update that …

Don't miss

Cybersecurity news