David Spark asked conference attendees at RSA 2016 how to access their network. What's the secret? The answers might surprise you Read More ▶ |
|
| White Paper: Lockheed Martin Industrial Defender Inc A comprehensive look at the top four challenges facing your security operations is the first step to mitigating them. Why not approach them as opportunities to strengthen your cybersecurity posture and better protect your assets! Read More ▶ | Fitness wearables are a growth industry – more than 13 million sold in the U.S. during the past two years. But their security and privacy risks also enable growth in the marketing and identity theft industries. Read More ▶ |
| A careful count of the number of IT security vendors around the world reveals unprecedented growth. Read More ▶ |
| The email comes from a trusted source -- the CEO, a regular vendor, the company attorney or accountant. It's part of an ongoing conversation, the format and language is identical to previous emails of the same type. There might even be phone calls. It's no surprise that in this situation an employee would send a wire transfer to a new payee or a sensitive business document to someone who turns out to be a fraudster Read More ▶ |
| | In its last brief to Judge Pym before the first hearing on March 22, Apple makes its case for encryption. Read More ▶ |
| An increasing number of cyberespionage groups are using stolen code-signing certificates to make their hacking tools and malware look like legitimate applications. Read More ▶ |
| Video/Webcast: Lockheed Martin Industrial Defender Inc Click here to listen to SANS ICS experts Michael Assante, and Robert M. Lee, along with Lockheed Martin Director of Commercial Cyber Solutions, Richard Mahler share Insight into APTs targeting ICS and critical infrastructure. Read More ▶ |
|
|
|