Security News

Threat Modeling the Internet of Things: Part 3 - A Real World Example (Security Week)
2017-08-01 11:18

One of the most bizarre beginnings in movie history involved a young Paul Newman decapitating a streetful of Duncan Model 50 parking meters in the existential-hero classic, “Cool Hand Luke.” Those...

Nation-states are biggest cyber threat for drug and medical device makers (Help Net Security)
2017-07-31 21:18

Government-sponsored hackers were seen as the biggest threat to cyber security among executives in charge of technology, information, and security at drug and medical device makers, according to...

Hackers Compromise Accounts of FireEye Threat Intelligence Analyst (Security Week)
2017-07-31 18:46

A hacker or group of hackers claimed today to have breached FireEye's Mandiant. In a Pastebin post, they claimed, "It was fun to be inside a giant company named 'Mandiant'... 'Mandiant' knows how...

Man-Machine Teamwork Needed for Effective Threat Hunting: Report (Security Week)
2017-07-28 16:27

Seven hundred IT and security professionals were surveyed by McAfee to understand the current state and future development of threat hunting -- the active search for existing network breaches. read more

Threat prevention for protecting production environments (Help Net Security)
2017-07-28 14:33

Capsule8 launched the beta version of Capsule8 Protect, a threat prevention and response platform purpose-built for cloud-native environments. Organizations are rapidly shifting toward...

CISO Perspective: How Digital Risk Monitoring Fits Into Threat Intelligence Programs (Security Week)
2017-07-28 11:41

Cyber threat intelligence means different things to different people and as such I’ve spent the last several articles exploring a threat intelligence mind map and the different levels of threat...

Secrets of successful threat hunters and SOCs (Help Net Security)
2017-07-26 13:27

McAfee has polled over 700 IT and security professionals from a diverse set of countries, industries, and organization sizes about the role of threat hunting and the evolution of the security...

Expected cyber threats over the next six months (Help Net Security)
2017-07-26 12:45

With recent large-scale cyber attacks signaling a growing front in destructive threats and business impact, a new midyear report from iDefense, part of Accenture Security, reveals how threat...

Tech Firms Target Domains Used by Russia-linked Threat Group (Security Week)
2017-07-25 11:45

Tech companies ThreatConnect and Microsoft are moving toward exposing and taking down domains associated with Russia-linked threat group known as Fancy Bear. read more

ICS Networks Not Immune To Insider Threats (Security Week)
2017-07-25 11:06

Organizations Need Specialized Monitoring and Control Technologies for ICS Networks  read more