CISO June 2, 2017 Information Security in the Age of Disinformation 3 min read - With so much disinformation being reported in the news and spread through social media, it's hard for security professionals to know what to believe.
Incident Response May 30, 2017 When a Cyber Crisis Hits, Know Your OODA Loops 4 min read - OODA loops can help System 1-thinking security professionals react swiftly to cyberattacks and embrace an intuitive approach to incident response.
April 4, 2017 Security Tools Must Adapt to Fileless, Nonmalware Attacks 2 min read - An attack doesn't need a special file to be malicious; it can use previously existing system structures, prompting the need for new security tools.
November 10, 2016 Survey Shows Financial Cybersecurity Threats Increasing 2 min read - Financial cybersecurity is more important than ever, according to a recent survey. Two-thirds of respondents reported suffering an attack in the past year.
Threat Intelligence November 8, 2016 Consequences of IoT and Telnet: Foresight Is Better Than Hindsight 4 min read - Cybercriminals have learned how to exploit the IoT and Telnet servers to commit record-shattering DDoS attacks against major websites.
CISO November 1, 2016 Lessons From the Dyn DDoS Attack 5 min read - Domain name provider Dyn suffered the largest DDoS attack in history on Oct. 21. DDoS is nothing new, but the attack highlights some alarming trends.
October 23, 2016 Multiphased DDoS Attack Causes Hours-Long Outages 3 min read - Though DDoS attacks using authentic IoT devices are easy to detect, they are one of the more difficult attack types to remediate.
Data Protection August 26, 2015 Blurred Lines: Researching the Ashley Madison Data 4 min read - Ashley Madison's recent data dump provided security researchers with a treasure trove of information — but is looking into the breach completely legal?
August 20, 2015 Research Shows DDoS Attack Volumes Doubling as Threat Vectors Proliferate 2 min read - Cybercriminals are using everything from home routers and WordPress plugins to legacy directory services to launch a DDoS attack, new research shows.
July 14, 2015 When the Canary Stops: New Bitcoin Mining Hack a Wake-Up Call? 2 min read - A recent cyberattack on a bitcoin mining site has many users wondering: Has the canary sung its final song? Could this be the end of the currency?