Sunday April 26th 2015
The Cyber Security Landscape at RSA Conference 2015

The Cyber Security Landscape at RSA Conference 2015

I’m at RSA Conference 2015 in San Francisco this week. With so many recent stories about new cyber attacks and data breaches, it’s encouraging to see such [...]

Burn-Baby-Burn, Zero-Day Inferno

Burn-Baby-Burn, Zero-Day Inferno

Today, advanced cyber attacks launched by nation-states and criminal organizations depend on an inventory of exploits - known as zero-day attacks - to overcome [...]

Heartbleed: One Year Later

Heartbleed: One Year Later

Last week marked the one year anniversary of the notorious Heartbleed vulnerability. Despite being dubbed, “potentially the most significant breach of [...]

Privilege Management Explained

Privilege Management Explained

Today, most enterprise and government networks are under near constant attack from sophisticated cyber criminals and other advanced persistent threats, using [...]

5 Biggest Cyber Security Mistakes Show the Need for Automated Defenses

5 Biggest Cyber Security Mistakes Show the Need for Automated Defenses

As a cyber security software vendor, we’ve conducted many risk assessments for enterprises. Over the years we’ve seen some egregious security faux pas, [...]

Sony Pictures Data Breach Shows Missing Last Line of Cyber Defense

Sony Pictures Data Breach Shows Missing Last Line of Cyber Defense

The Sony Pictures data breach cast a media spotlight on just how unprepared many large organizations are for today’s advanced cyber threats. Suddenly, 60 [...]

Force Majeure – Cyber Security Insurance

Force Majeure – Cyber Security Insurance

As we look back on the cyber attacks of the past year, one recurring theme was that there was no way the hacked companies could have expected or prevented the [...]

Equation, the NSA and Cyber Espionage

Equation, the NSA and Cyber Espionage

I’m always amazed when 20 year old exploits become news. Having said that, last week’s furor around the Equation cyber espionage group, detailed by [...]

Cyber Security: Scare Tactics and Reality

Cyber Security: Scare Tactics and Reality

It’s been said: never let a good crisis go to waste. And when it comes to recent data breaches at some of the biggest names in business, the media has [...]

Zero Day Attacks and Implications

Zero Day Attacks and Implications

“On any given day, nation-states and criminal hackers have access to an entire arsenal of zero-day vulnerabilities — undocumented and unpatched software [...]

 Page 1 of 28  1  2  3  4  5 » ...  Last »