Latest Blog Posts
Next Generation Firewalls are Old News in the Cloud
March 27, 2019 Added by:Sanjay Kalra
As users start to change the way they deploy infrastructure to the cloud, they will also need to find security solutions that are built by using the cloud in order to secure the cloud.
Comments (0)
Trojan Horses for the Mind, Part 2 of Building Impactful Security Awareness Messaging
March 27, 2019 Added by:Perry Carpenter
Let’s talk about another Trojan Horse for the Mind -- visuals.
Comments (0)
Internet-Exposed IBM BigFix Relays May Lead to Full Remote Compromise
March 21, 2019 Added by:Ionut Arghire
Internet-facing relays in IBM BigFix deployments could lead to information disclosure and potential full remote compromise if not properly configured, Atredis Partners security researchers have discovered.
Comments (0)
1 Million Apps Patched in Android Security Improvement Program
March 01, 2019 Added by:Ionut Arghire
Over its five-year lifetime, the Android Application Security Improvement Program helped over 300,000 developers to fix more than 1,000,000 apps on Google Play, Google says.
Comments (0)
The Role of Analytics in Protecting Healthcare Data Privacy and Security
February 27, 2019 Added by:Nilesh Dherange
Healthcare companies face their biggest threats from malicious insiders that abuse their access privileges to view or exfiltrate PII and PHI.
Comments (0)
WINDSHIFT Hackers Target Government Agency in the Middle East
February 26, 2019 Added by:Ionut Arghire
A recently discovered threat actor was observed targeting a Middle Eastern government agency on several occasions over the course of last year, Palo Alto Networks security researchers reveal.
Comments (0)
The Rise of Ransomware and the Consequences for SMBs
February 21, 2019 Added by:Timur Kovalev
Ransomware works; that’s why hackers keep honing their techniques. SMBs need to be especially careful when it comes to cybersecurity and should work with vendors that understand their unique security needs.
Comments (0)
Trump Administration Starts the Ball Rolling with the National Cyber Strategy
February 19, 2019 Added by:Sam Bocetta
The topic of cybersecurity won’t go away. Like national security in general, it will remain eternal fodder for future politicians to bat around
Comments (0)
A Call to Structure
February 15, 2019 Added by:Chris O'Brien
One of the most significant challenges you face when building a threat Intelligence team is about how to best take on the ever-growing amount of Threat Intel.
Comments (0)
What CEOs Need to Know About the Future of Cybersecurity
February 14, 2019 Added by:Steve Durbin
CEOs need to take the lead and take stock now in order to ensure that their organizations are better prepared and engaged to deal with these ever-emerging challenges.
Comments (0)
Who’s Responsible for Your Cyber-Security?
February 12, 2019 Added by:Matt Johnson
Cyber security is everybody’s responsibility – make sure that staff have the tools, and the knowledge, to do it properly.
Comments (0)
CERT/CC Warns of Vulnerabilities in Marvell Avastar Wireless SoCs
February 08, 2019 Added by:Ionut Arghire
The CERT Coordination Center (CERT/CC) has issued a vulnerability note providing information on a series of security issues impacting Marvell Avastar wireless system on chip (SoC) models.
Comments (0)
Mozilla Concerned of Facebook’s Lack of Transparency
February 05, 2019 Added by:Ionut Arghire
Mozilla is concerned about Facebook’s lack of transparency regarding political advertising, Chief Operating Officer Denelle Dixon said last week in a letter to the European Commission.
Comments (0)
OWASP: What Are the Top 10 Threats and Why Does It Matter?
January 30, 2019 Added by:Nitzan Miron
Since the founding of the Open Web Application Security Project (OWASP) in 2001, it has become a leading resource for online security best practices.
Comments (0)
Magento Patches Command Execution, Local File Read Flaws
January 29, 2019 Added by:Ionut Arghire
Magento recently addressed two vulnerabilities that could lead to command execution and local file read, a SCRT security researcher reveals.
Comments (0)
The Biggest Security Hurdles in Your Business, and How to Overcome Them
January 23, 2019 Added by:Matt Johnson
Many organisations are still left in the dark when it comes to exactly what the most common, and pressing cyber security challenges are.