• Do attribution and motives matter?

    Whenever people think of APTs and targeted attacks, people ask: who did it? What did they want? While those questions may well be of some interest, we think it is much more important to ask: what information about the attacker can help organizations protect themselves better?

  • The price of the Internet of Things will be a vague dread of a malicious world

    Volkswagen didn’t make a faulty car: they programmed it to cheat intelligently. The difference isn’t semantics, it’s game-theoretical (and it borders on applied demonology).

    Regulatory practices assume untrustworthy humans living in a reliable universe. People will be tempted to lie if they think the benefits outweigh the risks, but objects won’t. Ask a person if they promise to always wear their seat belt, and the answer will be at best suspect. Test the energy efficiency of a lamp, and you’ll get an honest response from it. Objects fail, and sometimes behave unpredictably, but they aren’t strategic, they don’t choose their behavior dynamically in order to fool you. Matter isn’t evil.

  • Applying machine learning techniques on contextual data for threat detection

    The momentum behind cloud computing couldn’t be stronger as companies, governments and other organizations move to the cloud to lower costs and improve agility. However, you need look no further than headlines about the latest data breach to know how extremely important security architectures are amid this rapid cloud adoption.

  • Top 5 Android Marshmallow enterprise security benefits

    Google’s new Android Marshmallow operating system offers important new security and ease-of-use features that improve its functionality for both enterprise and individual consumers.

  • The evolution of the CISO in today's digital economy

    As the digital economy becomes ever more connected and encompasses all industries, we’re reaching a point where every company today is a technology company. Along with this transformation we have seen a commensurate explosion in the number of cyber attacks in recent years that only seems to increase in criminals’ strength, frequency and severity.

  • Is your network suffering from the trombone effect?

    Trombones are wonderful instruments. These brass beauties are mainstays of any marching band, dutifully producing a bouncing bass tone. Some trombones, however, generate a completely different sound: cries of frustration from networking teams and end users across the globe.

  • Enhancing email security in Office 365

    The need for corporate security has never been greater. Identity theft remains a lucrative crime, and we read about a major hack nearly every day. Companies moving to Office 365 are sometimes unaware that simply moving their employees to an online email system will increase their exposure to threats.

  • Data security for the borderless enterprise

    As the age of information mobility pushes data across international borders, Greg Hanson, vice president of business operations EMEA at Informatica addresses the need to secure data at its source, and in motion.

  • Encryption: Whose keys are they, anyway?

    Until now, key management – the processing, management and storage of keys for who can decrypt and access protected information – was an often-overlooked, and yet critical element of encryption. Many organizations left that part up to their vendors or stored them inconsistently across their IT infrastructure in both hardware and software. This lack of centralized control can jeopardize the integrity of encryption. In fact, the management of the keys is more important than the encryption itself, because if something happens to the keys, entire sets of data can be stolen or lost, and there’s nothing you can do about it.

  • The Lord of the Hacktivist Rings

    Cyber attacks against websites have been around for about a decade. Considering this, an important question to ask is: what makes one company considered high risk, and what puts them into what we call ‘The Ring of Fire?’ The Cyber Attack Ring of Fire maps out vertical markets based on the likelihood that organizations in these sectors will experience attacks. It reflects five risk levels, with organizations closer to the red center more likely to experience DoS/DDoS and other forms of cyber attacks with greater frequency.

Videos      Podcasts


Pen-testing drone searches for unsecured devices

You're sitting in an office, and you send a print job to the main office printer. You see or hear a drone flying outside your window. Next thing you know, the printer buzzes to life and, after spitting out your print job, it continues to work and presents you with more filled pages than you expected.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Fri, Oct 9th