Latest Blog Posts

0da151db886b8b40e0a1d051485bedd3

An Open Letter to AWS CEO Andy Jassy on Cloud Security Innovation

March 16, 2018 Added by:Brian Ahern

Brian Ahern, CEO & Chairman of Threat Stack, writes an open letter to Amazon Web Services CEO Andy Jassy.

Comments  (0)

Cddf97a969951d5d4db2728c7894524b

Beat Them at Their Own Game: Understanding and Neutralizing Evasive Malware Tactics in the Face of Rising Attacks

March 16, 2018 Added by:Eddy Bobritsky

If there is any hope of disarming modern and well-equipped attackers, we have to beat them at their game.

Comments  (0)

2d356835f3abb8f341fe23f58a2b4fd6

Increasing Board Accountability and Expertise Is Critical to Security and Risk Management

March 09, 2018 Added by:Greg Reber

The Board of Directors (BoD) is ultimately responsible for the future of their company. Shareholders expect that the companies they have invested in will follow through on specific, well-informed plans to mitigate risk in every form.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Number of Domains Hosting Crypto-Miners Up 725% in Four Months

March 07, 2018 Added by:Ionut Arghire

The number of websites hosting code that mines for crypto-coins using visitors’ CPU power went up a staggering 725% in a four-month period, Cyren reports.

Comments  (0)

Fcd5ebcc1f75461bbe843246f54c190e

Today's Threat Landscape Demands User Monitoring

February 27, 2018 Added by:Eric Sun

For a complete picture of user behavior, you need visibility both on and off the corporate network.

Comments  (0)

A98c8f7dbb46467b790e2ac1fbbd3f50

EDR for Everyone Is about Fighting Alert Fatigue

February 21, 2018 Added by:Liviu Arsene

Endpoint detection and response solutions (EDR) are predicted to become a key security technology by 2020.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Researchers Detail Linux-Based “Chaos” Backdoor

February 20, 2018 Added by:Ionut Arghire

A Linux-targeting backdoor observed in live attacks in June last year was recently found to have been part of an older rootkit, GoSecure researchers reveal.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Large Crypto-Mining Operation Targeting Jenkins CI Servers

February 20, 2018 Added by:Ionut Arghire

A large malicious crypto-mining operation has recently started targeting the powerful Jenkins CI server, Check Point security researchers have discovered.

Comments  (0)

2976a6e4f9f094965adb965397c96dcf

Three Ways to Take Home the Gold When It Comes to Cybersecurity at the Olympics

February 16, 2018 Added by:Ben Carr

Start planning now for the events on the horizon; hopefully you thought ahead for Pyeongchang – but remember Tokyo 2020 isn’t that far way.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – February 2018

February 16, 2018 Added by:Alexander Polyakov

The second set of SAP Security Notes in 2018 consists of 26 patches with the majority of them rated medium.

Comments  (0)

F7d0f3bd3db3ac1238b1165855b93542

The Only Gold Russia Can Win at the Winter Olympics Is for Cyber-Hacking

February 09, 2018 Added by:Ross Rustici

Each time Russia leaks information in connection to doping commissions, it garners less news attention and is increasingly being viewed as a failed operation.

Comments  (0)

377a54ee089b6809e8e68d75d28614cb

Think GDPR Won’t Affect Your U.S. Company? Guess Again

February 07, 2018 Added by:Ken Spinner

Ignorance is not bliss when it comes to the GDPR, and organizations that have fallen behind in their preparations must ramp up their compliance activities.

Comments  (0)

9d9e32000b07da9c5acd1ad33accbbb6

Advancing the Usability of PKIs

February 06, 2018 Added by:Dan Timpson

If your organization is going to rely on PKI, it’s important to also leverage the benefits that automation can provide.

Comments  (0)

211571f3e14099fd9a6c172426982ca5

The Five Secrets to Making Security Awareness Work in 2018

January 29, 2018 Added by:Perry Carpenter

Are you ready to make 2018 a break-out year for your security awareness program?

Comments  (0)

7fc123e0c16f296ad28a8c3214506aa9

Crypto-Mining Is the Next Ransomware

January 19, 2018 Added by:Steve McGregory

Since new security threats surface every week, there is a good chance that more devices will be infected with cryptocurrency mining malware in the near future.

Comments  (0)

9ae0fe776de46500a4f71f32673fad0f

Increasing Importance of Mobile Makes Malware a Priority

January 17, 2018 Added by:Asma Zubair

Businesses should fortify their high value apps with additional security precautions from the inside out.

Comments  (0)


« First < Previous | 3 - 4 - 5 - 6 - 7 | Next > Last »