Security News
Many high profile database breaches have resulted from the abuse of legitimate logon credentials. Identifying these apparent “insider threats” requires a new approach. Those who were once...
The popular and sometimes controversial Shodan search engine made some changes recently that drew attention mostly of the latter variety. If you are not familiar with Shodan, it is the...
In this podcast recorded at RSA Conference 2016, John Czupak and Ryan Trost, CEO and CTO of ThreatQuotient respectively, clarify the meaning of threat intelligence and actionable intelligence....
In this podcast, recorded at RSA Conference 2016, Ajay Arora, CEO at Vera, and Amir Ben-Efraim, CEO at Menlo Security, discuss their participation in the Innovation Sandbox Contest and offer...
Trend Micro released its annual security roundup report which dissects the most significant security incidents from 2015. The research confirms attackers are now bolder, smarter and more daring in...