Endpoint July 24, 2015 Endpoints: The Beginning of Your Defense 3 min read - Every endpoint connected to your system is a point of vulnerability. It takes compromising only one for attackers to infiltrate your entire infrastructure.
Fraud Protection July 16, 2015 Third-Party Insiders: Compliance as the First Step to Trust 2 min read - Third-party insiders are vital to organizations, but you must apply security management and compliance controls to these workers before building trust.
July 15, 2015 Butterfly Effect: Chaos Reigns, From Morpho to Wild Neutron 3 min read - Malware group Butterfly — once called Morpho and Wild Neuton — is after corporate IP. What are the risk factors, and how can companies protect their data?
July 15, 2015 Could Open-Source ‘Census Project’ Prevent the Next OpenSSL Flaw? 2 min read - The Core Infrastructure Initiative has released a ranking of open-source tools that should help the industry avoid problems in OpenSSL and similar tools.
Risk Management July 15, 2015 Security Decision-Making: When Decisions Are Based on Fear Rather Than Fact 2 min read - When it comes to decision-making, are security professionals motivated negatively by fear and misinformation or positively by facts and common sense?
Network July 15, 2015 DDoS Extortion: Easy and Lucrative 6 min read - Distributed denial-of-service (DDoS) attacks can vex organizations in a number of ways. Learn how to secure your networks and respond appropriately.
July 14, 2015 Google Uses Artificial Neural Network to Keep Malicious Spam Out of Gmail 2 min read - Google's artificial neural network is now working to recognize spam such as phishing messages in Gmail, which could boost security for thousands of users.
Intelligence & Analytics July 13, 2015 DEF CON Vs. Black Hat: Your Best Bet for Vegas 2015 3 min read - The DEF CON, Black Hat and BSides conferences all descend on Las Vegas this August. But which of these gatherings is the best bet for you?
Application Security July 9, 2015 Why Is Digital Piracy Running Rampant, and What Can We Do About It? 4 min read - Digital piracy is growing at a rapid rate due to the modern distribution model, new technologies and mobile applications, increasing the need for security.
CISO July 9, 2015 Cyber Risks: From the Trenches to the Boardroom 4 min read - Business leaders must learn to recognize, manage and mitigate cyber risks. This task requires cooperation and awareness across C-suites and boardrooms.