
Most companies fail to measure cybersecurity effectiveness
Thycotic released its first annual 2017 State of Cybersecurity Metrics Report which analyzes key findings from a Security Measurement Index (SMI) benchmark survey of more than …

Employees working while on holiday open orgs to security risks
Many workers will feel the need to check-up on work emails while they are away from the office and enjoying a well-earned vacation. Unfortunately, by doing that, they can open …

Self-service perimeter security for the hybrid cloud
Skyport Systems, a secure hyperconverged infrastructure provider for the hybrid enterprise, announced at the Black Hat USA 2017 conference the release of new self-service …

Microsoft offers rewards for Windows bugs
Microsoft is asking researchers to look for bugs inside the latest Windows 10 version (Insider Preview slow ring). Remote code execution bugs can net finders up to $15,000, …

Defensive AI system implements strategies from the best analysts
Champion Technology Company, developer of DarkLight, an AI expert system for active cyber defense and trusted information sharing, today released their latest technology …

Photo gallery: Black Hat USA 2017
Black Hat USA 2017 is underway at Las Vegas, and here are a few photos from the Business Hall and the Arsenal. Featured companies: Forcepoint, Qualys, LookingGlass, Vectra …

NanoCore RAT creator pleads guilty
26-year-old Taylor Huddleston, of Hot Springs, Arkansas, pleaded guilty today to charges of aiding and abetting computer intrusions. According to the statement of facts filed …

90% of consumers think security should be built into smart devices
90% of consumers polled from Brazil, China, Germany, India, UK and US believe it is important that a connected device has security built into the product, digital platform …

Win a security gap assessment from NTT Security at Black Hat
This year at Black Hat 2017, NTT Security is focusing on incident response readiness: one lucky show participant will win a thorough security gap assessment from the NTT …

UniCredit breach: Data of 400,000 customers exposed
Italian global banking and financial services company UniCredit has revealed that it has suffered two security breaches in less than a year. “A first breach seems to …

Malware creators increasingly run their business like legitimate software companies
The continuing increase in ransomware attacks is, partly, due to how easy the malware can be built and used by attackers that have limited technical skills. Take for example …

Orchestrating security across multiple environments
In an effort to help organizations centralize their intelligence and security process management, ThreatConnect has expanded its security platform’s capabilities to …
Featured news
Resources
Don't miss
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests