Archive

According to Gartner, “Future security operations, incident response and threat intelligence teams will use more automation and more consistent processes, and will have to deal with an ever-increasing number of security tools.” “This will necessitate more orchestration capabilities and clearly

Danish rail travelers found buying a ticket difficult yesterday, following a DDoS attack on the railway company DSB. DSB has more than 195 million passengers every year but, as reported by The Copenhagen Post, the attack on Sunday made it

Security experts are warning PGP users to disable tools that automatically decrypt PGP-encrypted email after the discovery of a critical vulnerability which could help attackers read protected emails. The new research will be revealed in a paper on Tuesday morning,

SynAck targeted ransomware was seen in the wild using the Doppelgänging technique which was first presented as a proof of concept in December 2017. SynAck targeted ransomware was seen in the wild using the Doppelgänging technique which was first presented

The ISO has brought together a team of privacy experts to develop the first set of preventative international guidelines to ensure consumer privacy is embedded into the design of a product or service. Cyber-security professionals have long been lamenting the

Now is the time to deceive the deceivers. As the number of cyber-attacks grows every year and cybercriminals become smarter with their tactics, you can never be too safe with your company’s private information. Now is the time to think

Thycotic, a provider of privileged access management (PAM) solutions for more than 7,500 organizations worldwide, announced that Cyber Management Alliance (CM-Alliance) has chosen Thycotic as the PAM solutions leader in a new report titled, “The CM-Alliance Leaderboard: Privileged Access Management

The US has turned up the pressure on Chinese technology firms after the Department of Defense ordered all military bases to stop selling Huawei and ZTE devices out of security concerns. The Pentagon is also said to be considering whether

Warren Buffett believes cybersecurity incidents will rise, and with it the potential to significantly harm the insurance industry. “Cyber is uncharted territory. It’s going to get worse, not better,” he said at the Berkshire Hathaway 2018 Annual Shareholders Meeting Saturday.

Not long after the Russian government ordered the immediate blocking of the Telegram messaging app from the Apple App Store and Google Play Store, an imitation of the popular app made its rounds on Google Play. Confusion surrounding the prompt

Whether serendipitous or ironic, Global Password Day found Twitter advising users to change their passwords after a bug in its password storage system “unmasked” the passwords in an internal log. “We have fixed the bug, and our investigation shows no

From a cruising altitude, a blockchain might not look that different from things you're familiar with, say Wikipedia. With a blockchain, many people can write entries into a record of information, and a community of users can control how the

2017 proved the necessity of endpoint security perhaps more than ever. Major malware and ransomware attacks changed the global conversation about the safety of our data and servers, and we learned more concretely that traditional, signature-based antivirus are insufficient to

It's an exciting time to be a professional penetration tester. As malicious computer attackers amp up the number and magnitude of their breaches, the information security industry needs an enormous amount of help in proactively finding and resolving vulnerabilities. Penetration
The Open Web Application Security Project (OWASP) is a non-profit organization dedicated to providing unbiased, practical information about application security. The OWASP Top 10 Web Application Security Risks was updated in 2017 to provide guidance to developers and security professionals
Penetration testing, more commonly called pentesting, is the practice of finding holes that could be exploited in an application, network or system with the goal of detecting security vulnerabilities that a hacker could use against it. Pentesting is used to