Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
Traffic Light Protocol (TLP) provides CISOs with best practice guidance on how to share sensitive data within an organization or externally. Here is how to use TLP and more on the latest version, TLP 2.0. → Read More
Cloud native application protection platforms aim to provide a complete cloud security solution, but some are more complete than others. → Read More
New protocols help keep VPNs relevant in the face of secure access service edge and zero-trust network access. → Read More
Virtual private networks still have a place in the enterprise for protecting data and networks. Here's what you need to know when selecting a VPN. → Read More
Poorly secured WordPress websites are a favorite hacker target. Use these tools and advice to keep them out. → Read More
Risk-based authentication tools have become more sophisticated and popular as companies transition away from dependence on password protection. → Read More
Playing the role of an attacker can make your team better at defense if you include all the stakeholders and carefully design goals. → Read More
Hacking groups that make up Magecart are effective and persistent at stealing customer and payment card data through skimmers. Here's how they work and what you can do to mitigate the risk. → Read More
The three main email security protocols complement one another, so implementing them all provides the best protection. That’s easier said than done, but these tips can help. → Read More
The recent revelation that Michael Cohen paid to rig a presidential primary poll underscores the risks they present to business. Here's how to identify and prevent poll rigging. → Read More
Every security team should have these types of digital forensics tools available. Many are free, and there are enough options to find one that suits your skills and approach. → Read More
Poorly secured WordPress websites are a favorite hacker target. Use these tools and advice to keep them out. → Read More
Slack does a good job of protecting its own code, but you'll need help to stop malware delivered through Slack messages or to avoid exposing personal information. → Read More
The time to set up a digital forensics program is before you have a breach. Here are the decisions you need to make. → Read More
Checking for security flaws in your applications is essential. These tools can help find and fix them. → Read More
Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Checking for security flaws in your applications is essential as threats become more potent and prevalent. → Read More
Beef up your infosec in 2019 with these recommendations. → Read More
The recent indictment of North Korean hacker Park Jin Hyok contains valuable information from the FBI’s investigation that will help you defend against similar attacks. → Read More
Rhino Security and Amazon offer tools to improve visibility into your AWS cloud environments, making it easier to find configuration errors and vulnerabilities. → Read More
New regulations and a changing threat landscape mean you need a different approach to your security risk assessment process. → Read More