automation
Key causes of network outages and vulnerabilities
A new global study, conducted by Dimensional Research, surveyed 315 network professionals about their experiences with network outages, vulnerabilities and compliance. How …
Security orchestration and automation: Closing the gap in incident response
Companies in North America are poised to increase their reliance on security orchestration and automation for incident response (IR), according to Enterprise Strategy Group …
US gets federal guidelines for safe deployment of self-driving cars
The Obama Administration has issued a new Federal Automated Vehicles Policy to help facilitate the responsible introduction of self-driving cars. The policy sets a proactive …
Macro-based malware evolves to bypass traditional defenses
Macro-based malware is growing into full-featured malware capable of detecting and bypassing traditional security tools, Barkly researchers have discovered. Macro-based …
Automation isn’t one-size fits all
It’s no secret that security teams are understaffed despite increased pressure to deliver. Firewall engineers face an additional challenge when it comes to access request …
Open sourced: Cyber reasoning system that won third place in DARPA’s Cyber Grand Challenge
Earlier this month, the DARPA-backed Cyber Grand Challenge (CGC) has shown that a future in which computer systems will (wholly or partially) replace bug hunters and patchers …
Can a computer system compete against human CTF experts?
DARPA announced on Thursday that a computer system designed by a team of Pittsburgh-based researchers is the presumptive winner of the Agency’s Cyber Grand Challenge. The …
Weak default credentials, command injection bug found in building operation software
A vulnerability in servers programmed with Schneider Electric’s StruxureWare Building Operation software can be exploited by a low-skilled, remote attacker to gain access to …
Phantom named RSA Conference 2016’s Most Innovative Startup
RSA Conference has named Phantom “RSAC Most Innovative Startup 2016″ in its Innovation Sandbox Contest. A panel of venture capitalists, entrepreneurs and large security …
Featured news
Resources
Don't miss
- Acronis CISO on why backup strategies fail and how to make them resilient
- Ransomware attackers are “vishing” organizations via Microsoft Teams
- Scam Yourself attacks: How social engineering is evolving
- Addressing the intersection of cyber and physical security threats
- Fleet: Open-source platform for IT and security teams