Security News

Download: The Risk Mitigation Handbook for Connected Medical Devices
2019-12-18 04:30

Wondering what it takes to secure clinical networks in your healthcare organization? Get The Risk Mitigation Handbook for Connected Medical Devices, a practical approach to risk mitigation in...

NSA Issues Advisory on Mitigation of Risks Associated With TLSI
2019-11-20 15:48

The U.S. National Security Agency (NSA) has published an advisory to provide information on possible mitigations for risks associated with Transport Layer Security Inspection (TLSI). read more

Insider Threat: Greater Risk Mitigation Required
2019-11-11 16:34

Make Insider Threat Defenses 'Top of the Agenda' Says Veriato's Chris GilkesToo many organizations are still failing to prioritize mitigating the risk posed by insiders, whether they're malicious...

Insider Threat Mitigation: Sanctions and Incentives
2019-10-08 15:48

Michael Theis of CERT Insider Threat Center on Best PracticesThe battle against insider threats requires a balance of sanctions and incentives, says Michael Theis of the CERT Insider Threat Center.

Bill Calling for DHS Cyber Incident Mitigation Teams Advances
2019-10-01 20:48

Senate, House Versions Now Must Be ReconciledIn the wake of ransomware attacks that have hit the public and private sectors, the U.S. Senate has passed a bill that calls for creating cyber...

Chrome OS 75 Adds More Mitigations for Intel MDS Flaws
2019-06-27 11:35

Chrome OS version 75, which Google released on Wednesday in the stable channel, adds more mitigations for recently disclosed Microarchitectural Data Sampling (MDS) vulnerabilities affecting most...

Raytheon and Black Sage to provide an integrated drone detection and mitigation system
2019-06-18 23:00

Raytheon Company and Black Sage are now partnering through a formal teaming arrangement to provide an integrated drone detection and mitigation system for civil authorities, critical...

Proactive Mitigation: A Cybersecurity Imperative
2019-06-13 18:03

Akamai's Jay Coley on Blunting Hackers by Blocking Emerging Types of AttacksA top cybersecurity imperative for organizations is to "take proactive mitigation before an event even occurs" by...

Anatomy of Container Attack Vectors and Mitigations
2019-05-16 14:48

Join us on an investigative journey as we explore popular attack vectors that have been used to breach container-based environments.Join us on an investigative journey as we explore popular attack...