Please turn on your JavaScript for this page to function normally.
keys
CRIME, TIME, BREACH and HEIST: A brief history of compression oracle attacks on HTTPS

The HEIST vulnerability was presented at Black Hat USA 2016 by Mathy Vanhoef and Tom Van Goethem. In this presentation, new techniques were presented that enhanced previously …

people
Security startup confessions: How to tackle outsourcing

My name is Kai Roer and I am a co-founder of a European security startup, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …

locks
Breathing new life into SSL VPNs: Making the most of the security benefits

Network security has been in an accelerated arms race for over a decade, with IT managers constantly adding new technologies to secure various network resources in an attempt …

data
My data, my problem

I haven’t seen BlackHat, you know the movie featuring Chris Hemsworth? In fact the list of shows or movies I haven’t seen (or in fact am unlikely to see) is growing as the …

How to avoid vendor lock-in and get more flexibility

Traditionally, customers, and security teams have worked with a single major technology provider, like IBM or Symantec, to build out their entire security stack. Layers that …

tools
Utilizing hardware to stop attackers earlier and without disruption

Too often the defense community makes the mistake of focusing on the “what,” without considering and truly understanding the “why.” This mindset often leads to the development …

danger
The growing threat of ransomware: Lucrative, low-risk and easy to use

Recent headlines are testament to the growing popularity of ransomware attacks on businesses and consumers alike. In January, for example, Lincolnshire County Council saw its …

Abstract
IoT: A hacker’s dream come true?

There’s a lot more to the web than the cat-video-laden sites we normally see. In fact, according to most sources, the web that we can typically get to via our browser of …

doctor
Is your business still HIPAA compliant after the 2016 federal changes?

The U.S. Department of Health and Human Services’ Office for Civil Rights (OCR) warned healthcare professionals and their business associates of its intention to launch …

Amazon Echo
As voice interaction increases, what will security look like in the next 5 years?

Things are getting chatty – everywhere. In Mary Meeker’s recent annual report on the State of the Internet, she dedicated a chunk of it to the liftoff of the voice interface. …

energy
How to secure critical utilities

Over the past few years the issue of cybersecurity and the threat of hackers stealing data has increased tenfold. Not a day goes by without a breach being reported of a …

EU
Preparing for new EU cybersecurity rules and regulations

Recently, the European Parliament signed off on its first ever set of cybersecurity rules. The Network and Information Security (NIS) Directive spells the end of more than …

Don't miss

Cybersecurity news