Please turn on your JavaScript for this page to function normally.
money
Stolen devices to blame for many breaches in the financial services sector

Bitglass performed an analysis of all breaches in the financial services sector since 2006, with data aggregated from public databases and government mandated disclosures. …

Car
Automotive security: How safe is a next-generation car?

The vehicles we drive are becoming increasingly connected through a variety of technologies. Features such as keyless entry and self-diagnostics are becoming commonplace. …

Qualys remediate
Key elements for successfully prioritizing vulnerability remediation

New vulnerabilities are disclosed every day, amounting to thousands per year. Naturally, not all vulnerabilities are created equal. In this podcast recorded at Black Hat USA …

WhatsYourSign
Display the cryptographic signing information about any file on your Mac

Verifying a file’s cryptographic signature can help the user deduce its trustability. If you’re using OS X, there is no simple way to view a file’s signature from …

network
A closer look at IT risk management and measurement

In this podcast recorded at Black Hat USA 2016, Casey Corcoran, Partner, FourV Systems, talks about the most significant trends cyber security and risk management. He …

City
Hacking smart cities: Dangerous connections

Once just a curiosity for technology enthusiasts, the Internet of Things (IoT) has become mainstream. In fact, the IoT security market is estimated to grow from USD 7.90 …

Sn1per
Sn1per: Automated pentest recon scanner

Sn1per is an automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities. “I originally created Sn1per because I didn’t want …

user
Organizations still unprepared for malicious insiders

Organizations globally believe they are their own worst enemy when it comes to cybersecurity, with 45 percent saying they are ill-equipped to cope with the threat of malicious …

Qualys
Continuous security in the web application space

What we’re seeing in the market right now is increased consolidation among vendors. They’re buying each other, more products covering another vendor’s …

Google Duo
Google Duo: Simple, encrypted, video calling app

Google Duo is a simple 1-to-1 video calling app available for Android and iOS. In order to use Google Duo all you need is your phone number, no separate account is necessary. …

myLG
myLG: Open source command line network diagnostic tool

myLG (my Looking Glass) is an open source utility that combines the functions of different network probes into one network diagnostic tool. It comes as a single binary with no …

strategy
What’s your security strategy?

In this podcast recorded at Black Hat USA 2016 in Las Vegas, Chris Drake, CEO at Armor, talks about how corporate IT is being stretched thin. They have to tackle the corporate …

Don't miss

Cybersecurity news