Week in review

Week in review: How GDPR affects WHOIS, and what CISOs can learn from Tyrion
Here’s an overview of some of last week’s most interesting news and articles: CIOs are forced to compromise between faster innovation and perfectly working …

Week in review: VPNFilter, hacking BMW cars, verifying data processing for privacy and GDPR
Here’s an overview of some of last week’s most interesting news and articles: The percentage of open source code in proprietary apps is rising The number of open …

Week in review: Office 365 phishing threats, companies ditch data as GDPR approaches
Here’s an overview of some of last week’s most interesting news, podcasts and articles: How can Office 365 phishing threats be addressed? The frequency of phishing …

Week in review: ATM attacks, security automation, hacking for fun and profit
Here’s an overview of some of last week’s most interesting news and articles: iOS users are 18x more likely to be phished than to download malware Phishing is the …

Week in review: New Cybersecurity Framework, Android patching issues, RSA Conference 2018
Here’s an overview of some of last week’s most interesting news and articles: RSA Conference 2018 coverage Check out what you missed at the infosec event of the …

Week in review: Emergency alert systems easily hacked, the cost of GDPR compliance
Here’s an overview of some of last week’s most interesting news and articles: One in 10 C-level execs say GDPR will cost them over $1 million Companies are taking …

Week in review: Critical flaw in Cisco switches, Saks breach, closing the security update gap
Here’s an overview of some of last week’s most interesting news and articles: Establishing covert communication channels by abusing GSM AT commands Security …

Week in review: Hacking intelligent buildings, trust in critical systems under attack
Here’s an overview of some of last week’s most interesting news and articles: The current state of USB data protection The vast majority of employees rely on USB …

Week in review: PKI and IoT, Facebook’s trust crisis, understanding email fraud
Here’s an overview of some of last week’s most interesting news and articles: Top cybersecurity evasion and exfiltration techniques used by attackers SS8 released …

Week in review: Big data and insurance, wireless standards hackers will target after Wi-Fi
Here’s an overview of some of last week’s most interesting news and articles: Malicious activity surges coincide with geopolitical events 2017 was a year of …

Week in review: New LTE attacks, Android P security, backdooring connected cars
Here’s an overview of some of last week’s most interesting news and articles: How to improve your security infrastructure when you’re on a budget You may not be …

Week in review: Memcached-based reflected DDoS attacks, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news and articles: Automating out of the skill gap sinkhole When thinking about the bigger picture, …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility