The security industry doesn't need a one-size-fits all vulnerability disclosure policy. It needs a culture change. Getting everyone to the table is the first step.
A cybersecurity expert was reportedly abducted last week, according to his family, after commenting on an attempted cyberattack of $951 million from Bangladesh's central bank.
New SANS analysis on how the attackers broke in and took control of the industrial control systems at three regional power firms in the Ukraine and shut off the lights.
Join us for this webinar in which we will demonstrate how the right process paired with the right threat intelligence platform (TIP) are key in automating resource intensive aspects of your threat intelligence team. Discover how understanding what you are ...
Join us for a webinar where we will explain why threat intelligence itself has become a big data problem and how the number of active indicators of compromise has grown into the tens of millions.
The indictment of five Iranian hackers three years after the fact raises the question: Is naming them a worthwhile part of the threat defense lifecycle, or is it a meaningless distraction?
When vetting a cloud or SaaS provider, it is imperative that you find out how they handle data security and privacy. Here are some key questions to ask.
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.