Top

Category: Security


Network security, Security, Threats & Malware, Virus & Malware, Vulnerabilities

Are You Really Covered by Your Cyber Insurance?

February 15, 2019

Via: Security Intelligence

The whole point of IT security is to minimize risk, and risk is, ultimately, a financial reality. A well-run organization practices risk mitigation by not only using the best tools, services and methods for maximizing data security, but also increasingly […]


Application security, Security

Learn New Malware-Fighting Tools & Techniques at Black Hat Asia

February 14, 2019

Via: Dark Reading

There’s no better place to sharpen your cybersecurity skills than Black Hat Asia in Singapore next month, where you’ll have access to a cornucopia of practical, hands-on Trainings, Briefings, and Arsenal tools intended to help you master even the trickiest […]


Network security, Security

What Have We Learned About Data Protection After Another Year of Breaches?

February 13, 2019

Via: Security Intelligence

When the General Data Protection Regulation (GDPR) took effect last May, companies were seeking guidance and best practices to address their compliance challenges. Although this sense of urgency is beginning to diminish, the demand for data privacy controls will only […]


Network security, Security

The Costs of Cyberattacks Are Real

February 13, 2019

Via: Radware Blog

Customers put their trust in companies to deliver on promises of security. Think about how quickly most people tick the boxes on required privacy agreements, likely without reading them. They want to believe the companies they choose to associate with […]


Cloud security, Security, Threats & Malware, Vulnerabilities

Major Container Security Flaw Threatens Cascading Attacks

February 12, 2019

Via: Threat Post

runc, a building-block project for the container technologies used by many enterprises as well as public cloud providers, has patched a vulnerability that would allow root-level code-execution, container escape and access to the host filesystem. Discovered by researchers Adam Iwaniuk […]


Access control, Security

What is biometrics? And why collecting biometric data is risky

February 12, 2019

Via: CSO Online

Biometric authentication uses physical or behavioral human characteristics to digitally identify a person to grant access to systems, devices or data. Examples of these biometric identifiers are fingerprints, facial patterns, voice or typing cadence. Each of these identifiers is considered […]


Network security, Security

Is 2019 the year national privacy law is established in the US?

February 12, 2019

Via: Help Net Security

Data breaches and privacy violations are now commonplace. Unfortunately, the consequences for US companies involved can be complicated. A company’s obligation to a person affected by a data breach depends in part on the laws of the state where the […]


Cloud security, Security

Vulnerable cloud infrastructure experiencing increasing attacks

January 25, 2019

Via: Help Net Security

Some attacks are fairly trivial, but others are multi-vector/multi-platform threats where multiple functionalities are combined as part of the same malicious threat (e.g., XBash, which combines cryptomining, ransomware and botnet/worm activity). The way in The attacks are automated and probe […]


Application security, Security

PCI SSC Releases New Security Standards for Payment Software

January 18, 2019

Via: Security Week

The new PCI Secure Software Standard and the PCI Secure Lifecycle (SLC) Standard are part of a new Software Security Framework and their goal is to ensure that the development of payment software keeps up with modern practices. The PCI […]


Network security, Security

Rate of Cybersecurity Venture Funding Not Sustainable, Investors Say

January 18, 2019

Via: Security Week

Venture capital firm Strategic Cyber Ventures (SCV) considers itself a part of the overall security industry. “First and foremost we are cyber operators,” it states on its website. “We advance cybersecurity through expert investment in synergistic teams and technology solving […]