Upcoming Events

DDoS Resilience, Remediation and Recovery: Updating Your Strategy
2019-08-13 13:00 | 2019-08-13 13:00
So are you ready for a DDoS attack on your network -- or on your service provider’s network
...Read more

[SANS] 10 Visibility Gaps Every CISO Must Fill
2019-08-23 10:30 | 2019-08-23 11:30
There are 10 visibility gaps that must be filled by every Chief Information Security Officer. Success in this prominent and often misunderstood role hinges on how quickly these gaps get closed.
...Read more

How SOAR Can Improve Security Operations, Monitoring & Incident Response
2019-08-29 10:00 | 2019-08-29 11:00
In this webinar we will look at how a well architected DNS, DHCP and IPAM can power SOAR platforms, and how to get to a state of security where you can rely on your SOAR tools.
...Read more

Equifax reportedly close to $700 million data breach settlement
Announced Monday, Equifax could pay near the $690 million figure they told investors was set aside for a penalty....Read more

"Glass-box" Solutions Are Critical For Cybersecurity Reporting To Executive Management
Glass-box solutions empower security leaders to employ methodologies/frameworks easily explained to technical & business...Read more

Why hackers are targeting your web apps (and how to stop them)
How do you protect your web apps from hackers? Forget firewalls. You need an AppSec toolbelt...Read more

Why Microsoft’s BlueKeep Bug Hasn’t Wreaked Havoc—Yet
It's a matter of if (or when) the secret details of exploiting the Windows vulnerability leak out. Download patch here...Read more

QuickBooks Cloud Hosting Firm iNSYNQ Hit in Ransomware Attack
Victims in the toughest spot, completely unable to serve their customers while a ransomware infestation is active....Read more

Security Automation: Where Does It Fit In Your Secure SDLC?
Security automation is an integral part of how we as an industry are working to keep our products secure....Read more

True passwordless authentication is still quite a while away
The downsides of using (just) passwords are apparent: they can be forgotten, guessed, cracked, stolen and misused....Read more

Radical Transparency and Zero Trust: Putting Concept into Practice
Radical transparency was born out of frustration expressed by enterprise executives citing a lack of transparency...Read more

Hackers Can Manipulate Media Files You Receive Via WhatsApp and Telegram
If you think that the media files you receive on your end-to-end encrypted secure messaging apps can not be tampered wit...Read more

“Agent Smith:” The New Virus to Hit Mobile Devices
Researchers at Check Point have identified a new mobile malware that has infected around 25 million devices....Read more

Schneier on Security: Zoom Vulnerability
The Zoom conferencing app has a vulnerability that allows someone to remotely take over the computer's camera....Read more

Back to Basics with Log Management, SIEMs & MSSPs
Experts offer their tips on making better use of log data and alerts to improve your security profile....Read more

GDPR One Year Anniversary: A Risk-Based approach to GDPR is key for achieving compliance
Steps and security controls that will bring your organization one step closer to compliance...Read more

A Lawyer’s Guide to Cyber Insurance: 4 Basic Tips
Negotiate before, not after a breach...Read more