April 13, 2017 Automation Advancement: The Road to Emergent Security AI? 2 min read - Emergent security AI offers the potential for real-time threat detection and defense — what's the role of automation in this infosecurity endgame?
April 13, 2017 Masters Tournament Avoids Cybercrime Hazards With Watson for Security 3 min read - With the help of Watson for Cyber Security, we rounded off yet another successful year for the Masters, keeping all IT assets running smoothly.
April 13, 2017 SSL Certificates Now Need Mandatory Authorization Checks 2 min read - According to new guidelines, as of September 2017 SSL certificates will have to be checked against a dataset before they can be issued.
April 12, 2017 WiCyS 2017: Inspiring a Sense of Community Among Women in Cybersecurity 3 min read - This year's WiCyS conference brought 800 attendees from academia, research, government agencies and industry together March 31 to April 1.
April 11, 2017 Critical Vulnerabilities Put ICS Security at Risk 2 min read - A new potential problem for ICS security stems from CODESYS, a hardware-independent middleware layer for programming IIoT and ICS devices.
April 11, 2017 It’s a Good Time to Review the Security Risks of Obsolete Technology 4 min read - Legacy systems and platforms can pose serious problems for businesses. Consider the security risks that can come with obsolete technology.
April 10, 2017 Brick House? New Malware Destroys Vulnerable IoT Devices 2 min read - Iot devices are now under threat from a new strain of malware. BrickerBot infects vulnerable Linus-based endpoints and makes them permanently unusable.
April 7, 2017 Keeping Enterprise Strong at the Core With AT&T and IBM MaaS360 3 min read - AT&T has teamed up with IBM MaaS360 to secure enterprise endpoints and protect corporate data, thus keeping enterprise strong at the core.
April 6, 2017 Pegasus Spyware Introduces Itself to Android 2 min read - Chrysaor, a variant of Pegasus spyware, has appeared on a small handful of Android devices and surveils users with a variety of techniques.
April 6, 2017 Recently Discovered Remote Access Tool Perpetuates MalDoc Attacks 2 min read - A recently discovered remote access tool (RAT) has stealthy and novel communication methods, which comes in handy as it attacks Korean users.