February 26, 2019
These RSAC Early Stage Expo startups bring fresh cybersecurity solutions to fight phishing, improve application security, provide better cloud protections, enforce security policy, more accurately authenticate and more. Read more â¶
Bruce Schneier takes his pitch for public-interest security to RSA Conference
Verizon builds a DevSecOps culture with its developer dashboard
How much does it cost to launch a cyberattack?
7 mobile security threats you should take seriously in 2019
How DDoS attacks are evolving
The CSO and CPO role just dramatically expanded overnight
How to Maximize Agility with Content Services in the AWS Cloud Read more â¶
Bruce Schneier's new all-day track at the RSA Conference explores idea that security pros, like lawyers, should be expected to engage in a certain amount of pro bono work. Read more â¶
FROM OUR BUSINESS PARTNERS
For the next few days, HP's online store is offering some steep discounts on laptops, desktops, printers and other products you might have had your eye on. Read more â¶
Verizon's developer dashboard not only records how vulnerabilities are introduced and by whom, but provides indicators as to why. The goal isn't to name and shame, but to instill a secure-by-design mindset. Read more â¶
Just like in regular business, cyber criminals have a cost of operation and a return on investment to worry about. Unfortunately, a new report from Deloitte has found the cost of committing cyber crime is incredibly low. Read more â¶
Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these seven issues this year. Read more â¶
A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty years, and are only growing more prevalent and stronger. Read more â¶
How two high-profile incidents highlight the changing definition and scope of security and privacy. Read more â¶
How to Seamlessly Embed Information Governance to Control your Content and Processes and Reduce Compliance Risk Read more â¶