Please turn on your JavaScript for this page to function normally.
insider threat
What do SOC analysts need to be successful?

Gurucul announced the results of a Black Hat USA 2022 security professionals survey with respondents indicating that insider threats were the most difficult type of attack for …

person
Employees participating in unethical behaviors to help an organization actually harm themselves

When employees participate in unethical behaviors meant to help an organization, such as lying about products or withholding negative information about the organization, this …

shield
What behavioral experts can teach us about improving security

The “castle and moat” approach to protecting one’s domain was effective for centuries. At the start of the internet age, when a company’s greatest assets were physically …

5G
The 5G toolbox of defense

For the mobile communications industry, security has always held a prominent role. However, the onset of 5G – which introduces new network architectures, services and devices …

fingerprint
Biometric device revenues to drop 22%, expected to rebound in 2021

In the aftermath of the COVID-19 pandemic, global biometric device revenues are expected to drop 22%, ($1.8 billion) to $6.6 billion, according to a report from ABI Research. …

monitoring javascript
VisibleV8: Stealthy open source tool for monitoring JavaScript in the wild

An open source tool that allows users to track and record the behavior of JavaScript programs without alerting the websites that run those programs has been developed at North …

gears
Organizations focus on fine-tuning systems to ensure compliance while reducing risk

66% of financial institutions face the significant challenge of achieving low false positive rates, putting unnecessary burden on their compliance departments and creating …

collaboration
Most IT pros find red team exercises more effective than blue team testing

More than one-third of security professionals’ defensive blue teams fail to catch offensive red teams, a study from Exabeam reveals. The survey, conducted at Black Hat USA …

Veriato Cerebral
Product showcase: Veriato Cerebral user & entity behavior analytics software

When it comes to identifying and stopping insider data security threats, actionable insights into people’s behaviors are invaluable. Employees involved in negative workplace …

hole
Cybersecurity pros don’t feel equipped to stop insider attacks

Based on interviews with nearly 1,500 cybersecurity professionals over three years, Haystax Technology released a study that makes it clear that organizations are feeling the …

What if defenders could see the future? Many clues are out there

Malware sophistication is increasing as adversaries begin to weaponize cloud services and evade detection through encryption, used as a tool to conceal command-and-control …

evil
The evil of vanity metrics

With the fast-paced evolution of tools and connectedness in business operations, the amount of network and log data has exploded. However, organizations have largely failed to …

Don't miss

Cybersecurity news