• Who's afraid of shadow IT?

    One of the biggest disruptions in the IT world is the quantity and quality of SaaS tools. From email and storage, to phone systems and infrastructure, it has never been easier to use top of the range products and scale when your business does. As empowering as these tools are, there is a risk to adopting SaaS that might not be immediately apparent.

    Shadow IT is any system or service used inside of a company without explicit approval and deployed using non-IT resources. It was born out of business necessity - the need to be agile and adapt to change. The Shadow IT movement is here, and it isn’t going anywhere any time soon.

  • CPU hardware performance counters for security

    In this podcast recorded at Black Hat USA 2015, Nishad Herath, Principal Anti-Malware Technologist at Qualys, talks about CPU hardware performance counters, which allow us to do low latency performance measuring, without special runtime or compile time software instrumentation. It is said "advanced users often rely on those counters to conduct low-level performance analysis or tuning" according to Wikipedia.

  • The WhatsApp of Wall Street

    On August 21, a pump and dump penny stock scam targeting US users, and spread using WhatsApp, drove the share price of Avra Inc, a digital currency company, by 640% from its opening price of $0.17 to its peak of $1.26. What is unique about this scam is its use of WhatsApp to spread the threat, essentially using mobile applications to resurrect schemes that are dying out on email.

  • Proactive real-time security intelligence: Moving beyond conventional SIEM

    Surprisingly, discussions about security intelligence still focus primarily around conventional reactive Security Incident and Event Management systems (SIEM). However, in today’s highly active and complex landscape security professionals need to move from this reactive model to proactively using this security intelligence to protect their businesses. A proactive model which enables to predict security incidents and events besides preventing and detecting them.

  • Protect against privileged credential attacks with zero trust

    Enterprise networks – and the attacks against them – have evolved. No longer static, they are dynamic entities. And yet, IT organizations continue to use traditional security controls that aim to protect an increasingly irrelevant perimeter. It is no wonder IT organizations are failing to prevent malware infections and data loss. It won’t get any better until we take a different approach to security and adopt a new paradigm: the zero-trust model.

  • The big picture of protecting and securing Big Data

    Today almost every company is dealing with big data in one way or another – including customer data, tracking data, and behavioral marketing information – connecting every aspect of our lives. Although it can be considered trendy and useful, some of the latest “innovations” cross the line from creative to creepy. Take for example a Bluetooth-connected doll that learns how to answer the child’s questions by recording each and every movement or comment in the room. While this is a cutting edge use of technology, that kind of data monitoring can become dangerous when placed in the wrong hands.

  • Effective security starts with UX

    The two biggest contributors to security budget spend are the short-term, lower-priority challenges of internal compliance errors and accidental data leaks. That’s precisely the opposite of what it should be, and exactly why companies will spend almost $80B on security technology this year. And they won’t have much to show for their efforts.

  • Open source auditing with Lynis

    Lynis is an open source security auditing tool. Commonly used by system administrators, security professionals and auditors, to evaluate the security defenses of their Linux/Unix based systems. It runs on the host itself, so it performs more extensive security scans than vulnerability scanners.

    In this podcast recorded at the Black Hat USA 2015 Arsenal, Michael Boelen, the creator of Lynis, talks about how his tool is flexible and easy to use. It is one of the few tools, in which installation is optional. Just copy it onto the system and give it a command like "audit system" to run the security scan. It is written in shell script and released as open source software.

  • The changing focus around critical infrastructure protection

    I spend a fair amount of time attending various security conferences, as I’m sure many of you do. Recently I’ve noticed a change in agendas and, perhaps more significantly, shifts in attendance on topics related to Critical Infrastructure Protection (CIP). In the past, these sessions were dominated by discussions of ICS/SCADA vulnerabilities and specialized malware designed to probe and extract insights from very custom, not widely distributed systems.

  • How to get better at web application security

    Robert Hansen, Vice President of WhiteHat Security Labs, has more than 20 years of web application and browser security experience. In this interview he discusses the evolution of web application security, offers advice on how to improve web application security practices, recommends tools, and more.

Videos      Podcasts


Pen-testing drone searches for unsecured devices

You're sitting in an office, and you send a print job to the main office printer. You see or hear a drone flying outside your window. Next thing you know, the printer buzzes to life and, after spitting out your print job, it continues to work and presents you with more filled pages than you expected.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Fri, Oct 9th