Security News
In this podcast recorded at RSA Conference 2018, Jimmy Graham, Director of Product Management, Vulnerability Management at Qualys, talks about the importance of threat intelligence and...
Secure-messaging firm Signal was told by Amazon not to use its AWS servers for domain-fronting, a technique used to enable communications in countries such as Egypt, Oman, Qatar and UAE where the...
Andrew Wertkin of BlueCat Networks Outlines What Enterprises Need to Do NowDNS is not well understood as a signal and control point in cybersecurity, says Andrew Wertkin of BlueCat Networks, who...
Hacker House's Hickey and Arcuri Outline the Evolving LandscapeCryptomining is in its infancy, but it could evolve to be a valuable revenue stream for digital content. Hacker House's Matthew...
Intuit's Threat Hunting Lead, Shannon Lietz, on Building a Better Red TeamAs the head of DevSecOps at Intuit, Shannon Lietz tracks the real-world tactics, techniques and procedures hackers use...
Version 1.1 includes updates on authentication and identity, self-assessment, supply-chain security and vulnerability disclosure, among other changes.
In this podcast recorded at RSA Conference 2018, Leon Ward, VP of Product Management at ThreatQuotient, talks about bringing order to the chaos of security operations, as well as the ideas behind...
Akamai Technologies' Tom Ruff explains three emerging threats that could be significant for startups, SMBs, enterprises, and governments, and what organizations can do to mitigate them.
Cybercriminals leverage attack surfaces as a way to penetrate an organization's infrastructure. Learn how to reduce attack surfaces and apply deceptive cyberdefenses.
In this podcast recorded at RSA Conference 2018, John Delk, Chief Product Officer and the General Manager of the security product group at Micro Focus, talks about how Micro Focus’ solutions...