Sysadmins around the world have been provided with another helpful guide on how to go about hardening their Linux workstations.
Nishad Herath, Principal Anti-Malware Technologist at Qualys, talks about CPU hardware performance counters.
The shadow IT movement is here, and it isn’t going anywhere any time soon.
Only half feel that they are adequately prepared in preventing attacks, according to KPMG.
Cyphort investigated the practices used by cyber criminals to inject malicious advertisements into legitimate online advertising networks.
Researchers from Palo Alto Networks and WeipTech have unearthed a scheme that resulted in the largest known Apple account theft caused by malware. All in all, some 225,000 valid Apple accounts have been compromised.
35 percent of security experts believe leadership within their organization lacks a healthy paranoia, with 21 percent of leadership "relying on hope as a strategy" to avoid a cyber security breach.
Discussions about security intelligence still focus primarily around conventional reactive SIEM. Security pros need to move from this reactive model to proactively using this security intelligence to protect their businesses.
Today almost every company is dealing with big data in one way or another – including customer data, tracking data, and behavioral marketing information – connecting every aspect of our lives. While this is a cutting edge use of technology, data monitoring can become dangerous when placed in the wrong hands.
Robert Hansen, Vice President of WhiteHat Security Labs, discusses the evolution of web application security, offers advice on how to improve web application security practices, recommends tools, and more.