Application Security October 13, 2015 Application Security Testing on Cloud and the Future of Penetration Testing 3 min read - While cloud-based application security testing services may not make penetration testers' work redundant, they might help establish order in the field.
Fraud Protection October 12, 2015 The Dyre Trojan and the Art of War < 1 min read - The Dyre Trojan is a great example of a threat that combines sophisticated tactics with an impressive strategy, resulting in a worthy cyber opponent.
Intelligence & Analytics October 8, 2015 Three Questions to Answer Before You Set Up a Security Operations Center < 1 min read - Organizations need to ask themselves a few key questions before establishing a security operations center to ensure it's as effective as possible.
Application Security October 7, 2015 Microservices Are Powerful, but Pose New Security Challenges 2 min read - Microservices offer speed and flexibility for applications, but they also expose users and developers to a larger attack surface.
Risk Management October 7, 2015 Why the Lack of Professional Development Among IT and Security Pros? 2 min read - There's a lack of resources and opportunities for IT and security teams to engage in professional development, but it doesn't have to be that way.
Intelligence & Analytics October 6, 2015 Don’t Get Pantsed: Embrace a Culture of Cybersecurity With Greater Security Awareness 3 min read - Every organization needs to evaluate their current cybersecurity culture and work to improve their employees' overall security awareness.
Intelligence & Analytics October 3, 2015 Three Security Best Practices for the Modern Era 2 min read - Here are three things enterprises can do to immediately improve their security posture as part of National Cyber Security Awareness Month.
Endpoint October 2, 2015 Security Hygiene in the Internet of Things 5 min read - Security hygiene becomes exponentially more difficult as the Internet of Things expands the number of smart devices connected in an enterprise.
October 1, 2015 Bad Words: Curse of Macro Malware Makes a Comeback 2 min read - Macro malware is making a comeback in the form of malicious email attachments. How do companies avoid the curse of bad Word docs?
Malware September 28, 2015 Hammertoss: What, Me Worry? 2 min read - Hammertoss uses legitimate sites to distribute malware, which makes detecting it and protecting against it a challenge for many IT departments.