Please turn on your JavaScript for this page to function normally.
keyboard
Detect observation and evade theft of sensitive data

Jacob Torrey is an Advising Research Engineer at Assured Information Security, where he leads the Computer Architectures group. He has worked extensively with low-level x86 …

authentication
Customer Authentication: Multi-factor security from iovation

With most transactions now happening online, providing customers with a frictionless online experience that’s also highly secure is critical for today’s businesses. Still, …

MobSF
MobSF: Security analysis of Android and iOS apps

The Mobile Security Framework (MobSF) is an open source framework capable of performing end to end security testing of mobile applications. MobSF can be used for security …

Terbium Labs
The power to immediately counter data theft with Matchlight from Terbium Labs

In June 2015, Terbium Labs launched Matchlight, a first-of-its-kind data intelligence system used to find stolen enterprise data on the dark web within minutes of it …

keyboard
Why outsource risk management to people who don’t care?

The 2015 Cost of Cyber Crime Study by the Ponemon Institute reported that 50% of companies have implemented some sort of access governance technology. It fell 4th on the list …

Past, present and future of threat intelligence platforms

In this podcast recorded at RSA Conference 2016, John Czupak and Ryan Trost, CEO and CTO of ThreatQuotient respectively, clarify the meaning of threat intelligence and …

cloud computing
Cloud computing: Security and evolution

What we’ve seen in the past 15 years is cloud computing becoming increasingly popular. Many companies have focused plenty of resources in making cloud computing the most …

Magnify
Web application scanning with Htcap

Htcap is a free web application scanner that can crawl single page applications in a recursive manner by intercepting Ajax calls and DOM changes. The app is focused mainly on …

Innovation Sandbox and the modern threat landscape

In this podcast, recorded at RSA Conference 2016, Ajay Arora, CEO at Vera, and Amir Ben-Efraim, CEO at Menlo Security, discuss their participation in the Innovation Sandbox …

Apple
Reactions to the KeRanger ransomware for Macs

Palo Alto researchers have discovered the first fully functional ransomware aimed at Mac users. The malware, dubbed KeRanger, has been found bundled into the Mac version of …

Anomali threat intelligence
Making sense of threat intelligence data in your IT environment

Threat intelligence data has been growing at an exponential rate of 39% a month. Enterprise customers are looking at around 30,000 events going into their SIEM every second. …

connection
Working towards a common set of IoT standards

Major industry leaders who are invested in the future of the Internet of Things, announced they will unify as the Open Connectivity Foundation (OCF), an entity whose goal will …

Don't miss

Cybersecurity news