Security News

Free eBook: Threat intelligence platforms
2019-10-10 03:45

Today’s threat environment is complex and dynamic. The internet was built for connectivity, not security, and approaches such as intrusion detection systems, anti-virus programs, and traditional...

FireEye Digital Threat Monitoring: Visibility beyond your walls
2019-10-10 03:30

FireEye announced the availability of FireEye Digital Threat Monitoring – a new way for customers to defend their digital footprint across otherwise inaccessible facets of the web. Traditional...

Pass the Hash Remains a Poorly Defended Threat Vector
2019-10-09 14:51

In 2010, SANS reported that knowledge of the Pass the Hash attack first described some thirteen years earlier was still poor. By 2019, knowledge of the threat vector that has now been in the...

The Unspoken Insider Threat
2019-10-09 14:48

When it comes to identifying and stopping malicious and even accidental insider threats, organizations are often overlooking a significant gap. Nathan Hunstad of Code42 discusses how to plug this...

Insider Threat Mitigation: Sanctions and Incentives
2019-10-08 15:48

Michael Theis of CERT Insider Threat Center on Best PracticesThe battle against insider threats requires a balance of sanctions and incentives, says Michael Theis of the CERT Insider Threat Center.

Update: Internet Security Threat Report
2019-10-08 13:48

Kevin Haley of Symantec Shares Key FindingsKevin Haley of Symantec shares key findings from the company's latest Internet Security Threat Report.

Report: 2019 eSentire Threat Intelligence Spotlight
2019-10-08 03:30

This new report, Threat Intelligence Spotlight: The Shifting Framework of Modern Malware, draws on data gathered from the 650-plus organizations that eSentire protects and Carbon Black’s extensive...

Malicious Bots: Mitigating the Threat
2019-10-07 18:18

Eric Bucher of Sequence Security on the Role of Machine LearningMalicious bot attacks are on the rise. Eric Bucher of Cequence Security describes the role machine learning can play in mitigating...

NIST's Zero Trust Taxonomy Introduces Components, Threats and Migration Routes
2019-10-07 14:24

NIST has published a draft Zero Trust Architecture (ZTA) special publication (SP.800.207). The purpose is to develop a technology-neutral lexicon of the logical components of a zero trust...

Insider threats are security’s new reality: Prevention solutions aren’t working
2019-10-07 05:30

Insider threats expose companies to breaches and put corporate data at risk. New research from Code42 questions whether the right data security solutions are being funded and deployed to stop...