Security News

Retail and finance top the list of vulnerable industries, increasingly targeted with credential threat campaigns
2018-08-21 16:00

The finance, professional, and information sectors had the highest volume and most variety of malicious activity in Q2 2018, says Rapid7, and the manufacturing sector is steadily getting more and...

Video: Bishop Fox on Device Threats and Layered Security
2018-08-21 13:58

Bishop Fox's Christie Terrill talks to us about IoT security and other trends at Black Hat 2018 this month.

Planning for the Shifting Threat Landscape
2018-08-17 20:48

RSA's CTO, Zulfikar Ramzan, Shares His View of the Challenges AheadThe best way to take a holistic approach to the current threat landscape is to define security issues as business problems and...

What Does 'Threat Analytics' Really Mean?
2018-08-17 19:48

Gerry Sillars of Skybox on How to Operationalize ItThreat analytics involves understanding where threats to key data assets exist and planning your mitigation strategy around that, says Skybox's...

OT Security and the Threat of Disruption
2018-08-16 22:03

Nozomi Network's Obbe Knoop on Why OT Security Needs a Different ApproachDisruption to operational technology can cause business downtime as well as serious public safety issues, so a nuanced...

Open MQTT Servers Raise Physical Threats in Smart Homes
2018-08-16 13:44

Misconfigured DIY smart-home hubs for home automation could allow attackers to track owners’ movements, see if smart doors and windows are opened or closed, and even open garage doors.

Profile of a Threat Hunter
2018-08-16 10:26

"The history of the bow and arrow is the history of mankind." – Fred Bear read more

FBI Eyes Plethora of River-Related Threats
2018-08-15 17:11

NEW ORLEANS (AP) — Giant cranes loading and unloading gargantuan barges. Oil tankers, supply vessels and pipelines serving a vital energy industry. Flood control structures. Chemical plants....

Black Hat Exclusive Video: The IoT Security Threat Looms for Enterprises
2018-08-14 12:30

Armis' CTO discusses the top IoT security issues in the marketplace today - and whether device manufacturers will start to prioritize security.

Connecting the dots to North Korea as a threat adversary
2018-08-14 12:00

Reports of malware campaigns invariably focus on two critical conclusions: attribution and who was the intended target of the attack. It is challenging to draw swift conclusions on the former, due...