Several IoT devices are vulnerable to DNS rebinding attacks that could allow attackers to get your geographic location, gather recon for future attacks, or remotely control the devices. Read More ▶ |
|
| Video/Webcast: EMA Analyst Research Is the time right for your organization to purchase a threat intelligence platform? Join leading IT analyst firm EMA and IntSights for a research-based webinar to find out if DTIM is right for your organization. You will also get key insights into new research, including the methodology behind platform evaluation and an overview of key players in the market. Read More ▶ | Hackers are getting better at exploiting encryption gaps that expose plain-text data. New hardware and software runtime encryption solutions aim to close those gaps. Read More ▶ |
| Turn your appliances on/off remotely from your mobile device, or with your voice via Alexa. Or automate with a schedule. The plug also monitors and helps control energy usage, and the slow drain that occurs even when devices aren't in use. Read More ▶ |
| Windows 10 Advanced Threat Protection and new Microsoft 365 Business security features make it easier to detect threats ad stop cyber attacks. Read More ▶ |
| | Reporting relationships are more than lines on an org chart, they're lines of authority. Ultimately, who the CISO reports to may say more about an organization's maturity than it does about an individual's effectiveness. Read More ▶ |
| In the tradition of other great network analysis tools like Bro and Sourcefire, Corelight gives security pros deep insight into data traffic on the systems they defend. Read More ▶ |
| For Eddie Garcia, job satisfaction comes from “[seeing his] contributions help organizations securely process data for good.” His best advice for aspiring security leaders is to focus on your passion and let the rest fall into place — because in his experience it will. Read More ▶ |
| White Paper: Webroot Software Malware detection itself is not the only factor to consider when choosing an endpoint security solution. In addition to initial detection, comprehensive endpoint security must a number of things. Read more to find out. Read More ▶ | CSO Insider | Editor's Picks |
|
|
|