Security News

Relying on legacy security technologies leaves you blind to IoT threats
2018-05-18 11:15

As shadow IoT infiltrate organizations, the variety of risks and threats stemming from these devices put networks and data at risk, according to 802 Secure. IoT and IIoT (Industrial IoT) introduce...

How can Office 365 phishing threats be addressed?
2018-05-18 11:00

With the rapid expansion of Office 365, more and more threats can emerge within its infrastructure, particularly via email. This is due in part to the size and ease of compromising Office 365...

One Year After WannaCry: A Fundamentally Changed Threat Landscape
2018-05-17 15:25

Threatpost talked to several security researchers about what's changed in the past year.

Threat analytics: Keeping companies ahead of emerging application threats
2018-05-16 12:00

Every application that is downloaded via an app store runs in a zero-trust environment. When a protected app is published to an official app store, an open loop of protection is created, leaving...

Insider threat blind spot enables employee revenge attacks
2018-05-15 17:30

Based on threat assessments from global organizations in public and private sector industries, Dtex Systems determined there are active insider threats in all assessed organizations. This is clear...

Exposing the threat of shadow devices
2018-05-14 13:07

Infoblox announced new research that exposes the significant threat posed by shadow devices on enterprise networks. Researchers found that enterprise networks across the US, UK and Germany have...

One Year After WannaCry Outbreak, EternalBlue Exploit Still a Threat
2018-05-11 17:41

One year after the WannaCry ransomware outbreak, the NSA-linked exploit used for propagation is still threatening unpatched and unprotected systems, security researchers say. read more

LookingGlass Acquires Threat Intelligence Platform From Goldman Sachs
2018-05-07 16:12

Goldman Sachs Becomes a Strategic Investor in LookingGlass Cyber Solutions  read more

Leveraging security analytics to investigate and hunt modern threats
2018-05-07 12:00

In this interview, Gary Golomb, co-founder at Awake Security, talks about how machine learning help develop a scalable enterprise cybersecurity plan, what technologies can make a security...

SAP systems: The threat of insecure configurations
2018-05-07 11:15

Onapsis researchers revealed a critical security configuration vulnerability that results from default installations in SAP systems which if left insecure, could lead to a full system compromise...