News Analyses

forensics threat hunter cyber security thumbprint
Quantum Break

binary cyberattack cybersecurity hacked protected

End-to-end security requires multi-vendor automation

To make it easier to use security tools from multiple vendors, as well as bake security into the development process, Fortinet introduces Fabric Connectors and DevOps integration.

scanning the internet malicious magnifying glass

GreyNoise: Knowing the difference between benign and malicious internet scans

Used with Shodan, this "search engine that looks at people scanning the internet" can help you pick bad actors out of the noise.

north korea flag games

Theft of North Korean secrets may have pushed Kim Jong Un into talks

The ultimate insider has made off with North Korea's cyber intelligence, counterintelligence and nuclear secrets, causing people to think that's why Kim Jong Un met with South Korea's leader.

security bug

Katie Moussouris: It’s dangerous to conflate bug bounties and vulnerability disclosure

“There are two extremes right now: no idea where to start or do a bug bounty,” says Moussouris, who built Microsoft's vulnerability disclosure program.

Ken Mingis Tech Talk
video

Watch Tech Talk on May 17 for an in-depth GDPR discussion

The GDPR deadline is coming up fast, and most businesses in the U.S. aren’t ready yet. Join Ken Mingis and his panel of experts as they discuss the impact of the new rules and what U.S. organizations must do now to protect customer...

04 cyberlaws gavel

Georgia governor vetoes bill that would criminalize good-faith security research, permit vigilante action

Veto comes in response to overwhelming criticism from industry. Georgia cybersecurity folks had been outraged about SB 315, and warned that it could cost the state jobs.

forensics threat hunter cyber security thumbprint

Who wants to go threat hunting?

Rob Lee talks about how he became one of the first threat hunters and how you can become one. It will take skills in IR, forensics, and security analytics.

intro biggest security startups 2018

The biggest security startup deals of 2018 (so far)

Recent VC investment in cybersecurity has tended to favor companies applying machine learning techniques to security problems. Here are some of the largest dealmakers that will be bringing you the next wave of security technology.

apple store

Apple means business when protecting intellectual property

Apple takes the protection of intellectual property very seriously. In 2017, it says 27 people were caught and 12 arrested for revealing inside information.

Election 2016 teaser - Electronic voting security for digital election data

Online voting is impossible to secure. So why are some governments using it?

If you thought electronic voting machines were insecure, wait 'til you meet online voting. Dr. Vanessa Teague has twice demonstrated massive security flaws in online voting systems. Instead of fixes and support, she got official...

People walking with airplane in background

Aviation industry takes steps to mitigate insider threats

The aviation industry realizes insider threats are a reality and is working within the public-private partnership to heighten awareness of them.

security trust

Charter Communications, who can you trust?

Charter Communications, its union, its customers and the New York attorney general all are experiencing trust issues.

CSO slideshow - Insider Security Breaches - Weak link breaks among a larger chain in a network

Microsegmentation evolves into a compensating control security tool

Illumio integrates Qualys data into its security platform to provide real-time vulnerability maps, enabling organizations to implement microsegmentation as a compensating control.

The U.S. Capitol building in Washington

No Congressional background check for IT contractor charged with fraud

Imran Awan was an IT contractor to members of Congress, with access to their email servers, yet not even a basic background check was conducted.

medical heart rate monitor ekg hospital

Paper healthcare records highly vulnerable, yet often overlooked

It isn't just digital healthcare records that are vulnerable. Paper records are regularly compromised -- and they're the easiest for healthcare organizations to protect.

Election 2016 teaser - Electronic voting security

Voting machine vendor firewall config, passwords posted on public support forum

"This is gold" for a nation-state attacker that wanted to hack an election.

istock 916151214

Iran's need to steal intellectual property

The indictment of nine Iranians by the DOJ is one in a long string of incursions by Iran to compromise trusted insiders and steal intellectual property.

login password - user permissions - administrative control

Former employee visits cloud and steals company data

Shared credentials may have facilitated a former medical center employee's access to the HIPAA data stored in the cloud after his termination.

Load More