Risk Management December 11, 2017 Revisiting the Top Security Threats of 2017 3 min read - Many of the security threats we noted at the start of 2017 gripped the public's attention during the past year, foreshadowing major shifts to come in 2018.
Endpoint November 30, 2017 Securing Mobile Transactions and Payments in the Age of Connected Devices 2 min read - Simple security best practices can go a long way toward securing mobile transactions and payments for both consumers and service providers.
Endpoint November 29, 2017 Moving Target Defense: A Digital Shell Game 3 min read - Moving target defense constantly shifts the environment surrounding sensitive data, making it harder for would-be attackers to identify vulnerabilities.
Application Security November 28, 2017 How Israel Became the Land of Connected Car Research and Development 2 min read - With its many manufacturer-sponsored test labs, smart car startups and military imperatives, Israel is becoming a major hub for connected car research.
Endpoint November 27, 2017 IoT Security: The Cold, Hard Truth About Digital Device Defense 3 min read - Is better digital device defense possible, or is securing the Internet of Things (IoT) an impossible task?
Retail November 21, 2017 ‘Tis the Season for Retail Disruption 2 min read - Companies looking to minimize retail disruption during this holiday season should keep close tabs on emerging trends such as ransomware, the IoT and more.
Network November 16, 2017 New Quad9 DNS Service Makes the Internet Safer and More Private 3 min read - Quad9 goes far beyond standard DNS name resolution to improve privacy, security scalability and ease of use.
Healthcare November 6, 2017 Securing Medical Devices in the Age of the IoT 2 min read - Both health care IT professionals and device manufacturers are responsible for securing medical devices in light of emerging IoT threats.
Intelligence & Analytics October 27, 2017 Investigating IoT Crime in the Age of Connected Devices 3 min read - To fight IoT crime, security professionals must properly classify incidents and connect seemingly disparate strings of evidence.
October 24, 2017 Reaping the Benefit? New Botnet Exploits IoT Security Flaws 2 min read - The new IoT_Reaper botnet has already compromised more than 2 million devices by exploiting existing IoT security flaws.