Latest Posts

Ea119a40c1592979f51819b0bd38d39d

Are Colleges Teaching Real-World Cyber Security Skills?

September 25, 2018 Added by:Adi Sua

The real challenge of the cybersecurity skill shortage is making sure new recruits are prepared for the real world.

Comments  (0)

E181257171d17cbf437b89cc372e76bc

What Exactly is Threat Hunting - and Why Does it Matter?

September 24, 2018 Added by:Troy Kent

Though there is debate over the various attributes that make up threat hunting, every SOC has the potential to engage in some level of hunting – and taking action is what’s truly important.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

It's Time to Get Real about Complex, Emerging Threats

September 12, 2018 Added by:Steve Durbin

Information security professionals are facing increasingly complex threats—some new, others familiar but evolving.

Comments  (0)

A98c8f7dbb46467b790e2ac1fbbd3f50

Under Expanding Cyber Siege, CISOs Admit Clear Visibility on Attacks Is a Challenge

September 12, 2018 Added by:Liviu Arsene

Increasingly, CISOs recognize that visibility must be relevant if they want to efficiently contain breaches and not waste precious time on a witch-hunt.

Comments  (0)

130c36bd4e626734d3c3de4e43cdbb8c

Busting the VDI Security Myth

September 11, 2018 Added by:Tal Zamir

Virtual Desktop Infrastructure (VDI) is not an isolation solution. If hackers control the end-user’s device, they control the VDI resources.

Comments  (0)

760f8b3ac86e3ac286c6e0d4bdd9a039

Why Admin Rights Removal Is only the First Step towards Data Protection

September 11, 2018 Added by:Andrew Avanessian

Those that are committed to developing stronger safeguards against cyber threats shouldn’t rely on just one method to keep their data safe.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

FIN6 Hackers Update Arsenal of Techniques

September 11, 2018 Added by:Ionut Arghire

A cybercriminal group focused on stealing payment card data records has been using new tactics, techniques and procedures (TTPs) in attacks observed in 2017 and 2018, IBM X-Force security researchers report.

Comments  (0)

A4ea6d6b9e1d62beff019069abdb7dfd

Hackers and Worms in the Singularity

September 07, 2018 Added by:David Holmes

On one path to the Singularity, hacking is the worst possible crime. But on the other path, hacking is humanity’s highest calling. Either way, the absolute value of hackers is going to be maximal.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Trojanized Extension Uploaded to Google’s Chrome Store

September 07, 2018 Added by:Ionut Arghire

A trojanized version of the MEGA extension was uploaded to the Google Chrome webstore and automatically pushed to users via the autoupdate mechanism.

Comments  (0)

8d109f28623b3d0bd57500ba35f914e1

Gartner SOAR Adoption Rate Prediction: From 1% to 15% by 2020 - Why Should You Care?

September 06, 2018 Added by:Rishi Bhargava

SOAR tools allow for an effective way of fighting security threats through a central collection of intelligence that can be quickly transformed into action.

Comments  (0)