George V. Hulme

DDoS protection, mitigation and defense: 8 essential tips

DDoS explained: How distributed denial of service attacks are evolving

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...

6 DoS attacks that made headlines

6 DoS attacks that made headlines

As times have changed, so have these venerable attacks.

What is social engineering? How criminals take advantage of human behavior

What is social engineering? How criminals take advantage of human behavior

Social engineering is essentially the art of gaining access to buildings, systems or data by exploiting human psychology, rather than by breaking in or using technical hacking techniques. Here are answers to some frequently asked...

Black Hat and DEF CON: The evolution of Hacker Summer Camp

Black Hat and DEF CON: The evolution of Hacker Summer Camp

It’s been 20 years since the first Black Hat Briefings conference. How has this staple of the cybersecurity industry changed over the years?

Six entry-level cybersecurity job seeker failings

Six entry-level cybersecurity job seeker failings

More cybersecurity job openings mean more entry-level candidates are entering the market. These are the common mistakes they make when apply and interviewing for an opening.

Crowdsourcing application security closes the automated assessment gap

Crowdsourcing application security closes the automated assessment gap

Crowdsourced pen tests aren't for everyone, but for one SaaS provider they help identify software flaws that automated tools may miss.

Unmanaged, orphaned SSH keys remain a serious enterprise risk

Unmanaged, orphaned SSH keys remain a serious enterprise risk

There are many ways attackers can try to infiltrate an enterprise, but many times enterprises make it so easy that the attackers don’t have to try too hard. Consider the current state of orphan SSH (Secure Shell) keys and how...

The rising security risk of the citizen developer

The rising security risk of the citizen developer

Citizen developers may help enterprises to develop apps more quickly, but what is this new breed of developer going to do to enterprise security?

What makes a good application pen test? Metrics

What makes a good application pen test? Metrics

Research from application security crowd testing and bug bounty program provider Cobalt attempts to define what enterprises could measure to improve results

The 10 essential Reddits for security pros

The 10 essential Reddits for security pros

Here, we’ve gathered 10 of the best cybersecurity Reddits so you don’t have to waste any time and can get straight to what you are looking for.

7 (more) security TED Talks you can’t miss

7 (more) security TED Talks you can’t miss

In this selection you’ll find speakers taking on some of the most pressing, and persistent, security and privacy challenges of our time, from how society can fight the war on terror while maintaining the social values we cherish to...

Load More