Please turn on your JavaScript for this page to function normally.
Qualys remediate
Key elements for successfully prioritizing vulnerability remediation

New vulnerabilities are disclosed every day, amounting to thousands per year. Naturally, not all vulnerabilities are created equal. In this podcast recorded at Black Hat USA …

World map
Global cyber security market: Competition forecast and opportunities

Increasing cyber attacks on the critical infrastructure has rendered worldwide security at risk. The prime motive behind these attacks is to gain access to financial …

data
Snowden documents definitely link Shadow Brokers’ leak to the NSA

Last week, Cisco and Fortinet confirmed that the exploits leaked by the Shadow Brokers and aimed at compromising their networking devices work as intended, but the origin of …

threat hunting
Open sourced: Cyber reasoning system that won third place in DARPA’s Cyber Grand Challenge

Earlier this month, the DARPA-backed Cyber Grand Challenge (CGC) has shown that a future in which computer systems will (wholly or partially) replace bug hunters and patchers …

WhatsYourSign
Display the cryptographic signing information about any file on your Mac

Verifying a file’s cryptographic signature can help the user deduce its trustability. If you’re using OS X, there is no simple way to view a file’s signature from …

GnuPG
18-year-old random number generator flaw fixed in Libgcrypt, GnuPG

Researchers have discovered a “critical security problem” that affects all versions of the Libgcrypt cryptographic library and, therefore, all versions of the …

market
The deception technology market is exploding

The global deception technology market is expected to generate a revenue of USD 1.33 billion by 2020, according to Technavio. Deception technology was introduced as an …

earth
Week in review: Hacking smart cities, leaked hacking tools, and detecting hardware Trojans

Here’s an overview of some of last week’s most interesting news and articles: eBook: Defending against crypto ransomware Download your copy of the Defending …

bomb
Is security enabling or compromising productivity?

While most organizations fundamentally believe connecting people to the best technology is vital to business productivity, many struggle to achieve agility due to traditional …

danger
Researchers pinpoint best times for delivering security messages

When is the best time to deliver a security message? A group of researchers from Brigham Young University has been tracking users’ neural activity while they are using a …

phone
Banking customers hesitant to use mobile features due to security concerns

Banking customers are hesitant to use mobile features due to fraud and security concerns, according to Kaspersky Lab and IDC Financial Insights. Their findings show that of …

rope
The state of security? No one cares about a breach

In an election year, everyone asks the question about whether or not you are better off than you were four years ago. There are many ways to answer such a question, and …

Don't miss

Cybersecurity news