Security News
Today’s threat environment is complex and dynamic. The internet was built for connectivity, not security, and approaches such as intrusion detection systems, anti-virus programs, and traditional...
FireEye announced the availability of FireEye Digital Threat Monitoring – a new way for customers to defend their digital footprint across otherwise inaccessible facets of the web. Traditional...
In 2010, SANS reported that knowledge of the Pass the Hash attack first described some thirteen years earlier was still poor. By 2019, knowledge of the threat vector that has now been in the...
When it comes to identifying and stopping malicious and even accidental insider threats, organizations are often overlooking a significant gap. Nathan Hunstad of Code42 discusses how to plug this...
Michael Theis of CERT Insider Threat Center on Best PracticesThe battle against insider threats requires a balance of sanctions and incentives, says Michael Theis of the CERT Insider Threat Center.
Kevin Haley of Symantec Shares Key FindingsKevin Haley of Symantec shares key findings from the company's latest Internet Security Threat Report.
This new report, Threat Intelligence Spotlight: The Shifting Framework of Modern Malware, draws on data gathered from the 650-plus organizations that eSentire protects and Carbon Black’s extensive...
Eric Bucher of Sequence Security on the Role of Machine LearningMalicious bot attacks are on the rise. Eric Bucher of Cequence Security describes the role machine learning can play in mitigating...
NIST has published a draft Zero Trust Architecture (ZTA) special publication (SP.800.207). The purpose is to develop a technology-neutral lexicon of the logical components of a zero trust...
Insider threats expose companies to breaches and put corporate data at risk. New research from Code42 questions whether the right data security solutions are being funded and deployed to stop...