Week in review: Malicious USB device firmware, insecure IoT devices, and using Hollywood to improve your security program
Here's an overview of some of last week's most interesting news, reviews, articles and interviews: What influences corporate security strategies? Sixty eight percent of businesses stated that the NSA breach by Edward Snowden and the number of PoS system breaches in the past year were the most impactful in terms of changing security strategies to protect against the latest threats.
Here's an overview of some of last week's most interesting news, interviews and articles: EFF invites hackers to test, secure its Open Wireless Router The Electronic Frontier Foundation (EFF) has released Open Wireless Router, an experimental alpha release of wireless router software that is meant to improve some and add new capabilities to existing routers.
Here's an overview of some of last week's most interesting news, interviews and articles: Endpoint security myths and why they persist In this interview, Roman Foeckl, CEO of CoSoSys, illustrates the most prominent endpoint security myths and explains why they persist.
Week in review: Google catches India with fake certificates, and the risks of selling used smartphones
Here's an overview of some of last week's most interesting news, interviews, reviews and articles: Exploring the mobile security landscape In this interview, Adam Ely, COO of Bluebox, discusses the most significant mobile security challenges for enterprise security professionals, illustrates how BYOD is shaping the enterprise mobile security landscape, and offers advice for CISOs trying to protect data confidentiality and integrity while working with an increasingly mobile workforce.
Week in review: DDoS attacks becoming more effective, and how to build trust between business and IT
Here's an overview of some of last week's most interesting news, articles and interviews: Gathering and using threat intelligence In this interview, Tomer Teller, Security Innovation Manager at Check Point, talks about the role of threat intelligence in the modern security architecture, discusses how it can help identify sophisticated malware attacks, and illustrates the essential building blocks of a robust threat intelligence solution.