Threat Intelligence October 7, 2015 Comparing Different Tools for Threat Sharing 4 min read - Threat sharing is getting more and more attention from security professionals to detect and quickly respond to security threats.
October 6, 2015 Common Vulnerabilities: The Key to Better Cybersecurity? 2 min read - A new report finds companies share common cybersecurity vulnerabilities. Can this common ground be used to enhance network security?
October 5, 2015 From the Grave: Adobe Exploit Rises Again 2 min read - An Adobe Flash Player exploit has reappeared after it was thought to be mitigated in a recent patch. What's the risk for users of this popular program?
Endpoint October 2, 2015 Security Hygiene in the Internet of Things 5 min read - Security hygiene becomes exponentially more difficult as the Internet of Things expands the number of smart devices connected in an enterprise.
October 1, 2015 Want a Better Windows Encrypt? Take a Pass on TrueCrypt 2 min read - Looking for the best way to encrypt Windows drives? Take a pass on open-source TrueCrypt, which was recently found to have critical flaws.
Application Security September 30, 2015 10 Convenient Ways to #CoverYourApps and Increase Application Security Testing Knowledge in Your Organization 4 min read - Here are 10 ways you can improve your application security testing knowledge and posture — without a massive investment of time or money.
September 29, 2015 Yahoo’s Gryffin Security Scanner Could Help Companies Better Protect Web Applications 2 min read - System admins can never be sure of where the next online attack will come from, which is why Yahoo has released a new Web application security scanner.
September 24, 2015 Building a Bug Bounty? Start Here 3 min read - Many companies are now considering their own bug bounty program, and HackerOne has designed a free assessment tool to get the ball rolling.
CISO September 24, 2015 High-Impact Security Flaws and Why They’re Still Being Overlooked 2 min read - Seemingly simple security flaws can cause major damage for organizations, most often in the form of massive data breaches caused by the vulnerability.
Fraud Protection September 24, 2015 Authentication: The Enterprise’s Weakest Link 3 min read - Many organizations struggle to find the right authentication methods for their employees and needs, but they can ill afford to let malpractice continue.