MS Word
Security threats News
-
March 31, 2018
31
Mar'18
Privacy protections are needed for government overreach, too
Following the Facebook-Cambridge Analytica controversy, major tech companies pledged to defend users from corporate data misuse, but they're ignoring a more serious privacy threat.
-
March 30, 2018
30
Mar'18
New Facebook privacy features and bug bounty aim to repair damage
News roundup: New Facebook privacy features and updates to the company's bug bounty program are being rolled out. Plus, Drupalgeddon 2.0 threatens over 1 million sites, and more.
-
March 27, 2018
27
Mar'18
Machine learning algorithms: New tool for fighting cyberthreats?
As hackers use increasingly sophisticated tech to tap into corporate data, machine learning platforms can help companies fight fire with fire by detecting cyberthreats early on.
-
March 15, 2018
15
Mar'18
Companies ill-equipped to combat malicious AI
Companies are on the precipice of being attacked by malicious AI but lack the skills and tools needed to put up a basic defense, according to ISACA's Rob Clyde.
Security threats Get Started
Bring yourself up to speed with our introductory content
-
Cloud-based email security tools barricade entry to Exchange
The pressure is on Exchange administrators to avoid a ransomware outbreak that cripples the on-premises email system. Cloud-based security tools can help blunt trending attacks. Continue Reading
-
How the Mirai botnet changed IoT security and DDoS defense
It seemed that no IoT device was safe from the Mirai botnet when it took down major enterprises and internet infrastructure providers with massive DDoS attacks. Continue Reading
-
Network intrusion detection systems ID threats
Learn how to stop threats before they turn into real danger. Expert Adam Gordon provides a deep dive into tools and technologies that should be in every infosec pro's back pocket. Continue Reading
Evaluate Security threats Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Protect your serverless app with this mix of AWS tools
As they move to serverless platforms, such as Lambda, development and operations teams need to acquire a new mindset -- and set of tools -- to keep their workloads safe. Continue Reading
-
Cybersecurity professionals: Lack of training leaves skills behind
Cybersecurity professionals' increased workloads leave little time for training, leaving their skill sets -- and their companies' data security -- vulnerable to outside threats. Continue Reading
-
Why it's critical enterprises address the IoT security blind spot
There's an IoT security blind spot, in which enterprises can't see nor protect the majority of IoT devices, which must be addressed to ensure enterprise safety. Continue Reading
Manage Security threats
Learn to apply best practices and optimize your operations.
-
How are logic devices like WAGO PFC200 used by hackers?
The Department of Homeland Security warned of a vulnerability affecting WAGO PFC200 logic devices. Discover how this flaw enables threat actors with expert Judith Myerson. Continue Reading
-
Typosquatting: How did threat actors access NPM libraries?
Typosquatting was used by threat actors to spread malware in the NPM registry. Learn from expert Nick Lewis how this method was used and what it means for users. Continue Reading
-
How to manage application security risks and shortcomings
A lack of proper testing, communication and insight into best practices all contribute to application security shortcomings. Kevin Beaver explains how to manage the risks. Continue Reading
Problem Solve Security threats Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
SQL injection attacks: How to defend your enterprise
SQL injection attacks threaten enterprise database security, but the use of cloud services can reduce the risk. Here's a look at some alternative SQL injection protection methods. Continue Reading
-
What do Dnsmasq vulnerabilities mean for Android users?
Researchers found several Dnsmasq vulnerabilities that affect Google's Android operating system. Matt Pascucci explains how these flaws can be exploited by threat actors. Continue Reading
-
OCR: Combat internal healthcare security threats with IAM policies
The Office for Civil Rights (OCR) is urging healthcare organizations to create effective identity and access management (IAM) policies to prevent data breaches by former employees. An IAM policy ... Continue Reading