Advertisement

BlueBorne Bluetooth attack stage fright
IDG Contributor Network

Are you being tracked through a Bluetooth security vulnerability?

The Bluetooth protocol, which was never that secure to begin with, now allows the bad guys to track your location on some laptops and phones, but worse could be the entry it offers into the IoT.


fedora hat black hat detective spy

The best and worst of Black Hat 2019

Security rock stars? Fake science? This year's Black Hat had it all.


CSO  >  malware / virus / security threat / protective antivirus shield

Best antivirus software: 10 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.


Advertisement

Let's Encrypt automated encryption gears
Cybersecurity Snippets

Black Hat 2019: 3 cybersecurity concerns and 3 things that give hope

At this year's Black Hat, it was evident that several cybersecurity issues remain a concern, but the industry is making progress.


Email takeover  >  Puppeteer hands manipulating the strings of an email client

Beware rogue email rules and forms

Creating malicious rules and forms in a compromised email client is an old but effective hacker trick that evades traditional antimalware software. Here’s how to make sure you can detect it.


international travel / security checkpoint / electronic ticketing/ inspecting personal device

Safe travels: 7 best practices for protecting data at border crossings

Border agents are requesting access to devices and the data on them with no regard to your organization's security policies. Here's how to protect that data and your employees.


Windows security and protection [Windows logo/locks]

More critical Remote Desktop flaws expose Windows systems to hacking

Microsoft finds and fixes multiple RDS and RDP vulnerabilities in Windows, but new research on BlueKeep patch rates suggests many machines could remain exposed.


Las Vegas Sign for Blackhat DefCon Event
IDG Contributor Network

Thoughts from Defcon 27 – This is why I do what I do

Every year, thousands of security professionals descend upon Las Vegas to take part in a series of conferences known as Hacker Summer Camp. This year, Black Hat, BSides Las Vegas, Defcon 27 and the Diana Initiative took up the...


Identity access management  >  abstract network connections and circuits reflected in eye

How to check Privileged Identity management settings for Office 365

Microsoft Azure Privileged Identity Management (PIM) allows you to set administrative rights for roles on an as-needed basis, reducing risk.


Mastery of technology skills + knowledge.

12 things every computer security pro should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know.


Advertisement

CSO > IoT / Internet of Things, unencrypted/unsecured/vulnerable

ICS security: Popular building management system vulnerable to takeover

Remotely exploitable vulnerability in internet-connected devices gives attackers a means to cause disruption and damage in a wide range of industries.


Insider Pro  >  Plug-and-play network security

Review: How Perimeter 81 provides a near plug-and-play network security service

Starting with the concept of zero trust, VPN tunneling and secure network access as a service, Perimeter 81 is now providing an almost plug-and-play solution for more elements of cybersecurity served through the cloud and on demand.


CSO  >  high-value targets  >  binary targeting of executives

Developing personal OPSEC plans: 10 tips for protecting high-value targets

Attackers are increasingly targeting executives and employees who have access to sensitive enterprise data. Here's how to protect those individuals with personal OPSEC plans.


Conceptual image of a network of executives / silhouettes of executives in motion.

Staffing the CISO office: A call to senior management for some expansive thinking

More companies need to realize that an inherent staffing misalignment around their CISO role presents potentially critical exposure to the organization.


Planning / strategy / management  >  Nurturing growth / scale / expansion

Built to scale: 5 tips for structuring your security organization for growth

How to prepare your SOC for mergers, new business innovation and a constantly changing and growing attack surface.