The ATT&CK framework allows security researchers and red teams to better understand hacker threats. Read More ▶ |
|
| White Paper: Digital Shadows Billions of leaked credentials are exposed online every year. Cybercriminals are increasingly turning to credential stuffing tools to automate attempts at account takeover, making these leaked credentials very useful for them. Read More ▶ | Using open source components saves developers time and companies money. In other words, it's here to stay. Here's a look at what it will take to improve open source security. Read More ▶ |
| The process for getting the FedRAMP seal of approval is complex, but it can ultimately be lucrative for companies that meet the security requirements. Read More ▶ |
| | Ransomware creators are getting more sophisticated in how they infect systems, avoid detection, and foil decryption efforts. Read More ▶ |
| Flaws in 2G, 3G and 4G networks could be repeated in 5G, says EU IT security agency. Read More ▶ |
| The 2012 LinkedIn breach, along with other old third-party breaches, is still paying dividends for criminals, who now have free access to 1.4 billion previously exposed email addresses and passwords. Read More ▶ |
| The Intellicta Platform from TechDemocracy acts like a security information and event management (SIEM) console, but for compliancy issues. It pulls information from a series of network collectors and correlates that data into a continuously-monitored compliancy dashboard. Read More ▶ |
| White Paper: F5 Networks Today that skills gap is around automation, orchestration, and DevOps methodologies-as well as how to apply them to cloud environments. Nearly three in four (74%) of respondents to the F5 State of Application Delivery 2018 survey rate the use of automation in the operation of IT infrastructure to be "somewhat" or "very" important. That holds true across all roles in the organization-including C-level executives and security professionals. Read More ▶ | CSO Insider | Editor's Picks |
|
|
|