This phishing attacks has a few interesting elements, including a weak attempt to spoof an HTTPS connection, and a sort of hybrid lure, which starts as Dropbox but ends at Microsoft Office. We'll show you how it works. Read More ▶ |
|
| White Paper: Hitachi ID Systems, Inc. Privileged accounts, like their name suggests, are accounts designed to provide broad access to systems and data. They are an integral part of every IT infrastructure and play a key role in a large variety of day-to-day operations. Read More ▶ | Bug bounties are all the rage, but many programs do not offer legal safe harbor to good-faith security researchers who wish to report security issues. Caveat bug finder. Read More ▶ |
| Malware is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use it to wreak destruction and gain access to sensitive information. Learn what malware does and how you can remove it—or prevent it. Read More ▶ |
| | Quantum computers could crack public-key encryption in as little as five years. Here's how to prepare for the post-quantum world. Read More ▶ |
| The FTC and DOJ are pushing companies to provide a means for good-faith security researchers to report bugs and put effective processes in place to act on those reports. Read More ▶ |
| Building a cyber strategy can be overwhelming unless you start with large goals broken down into smaller milestones. Read More ▶ |
| White Paper: Bronze Drum Consulting Discover how machine learning, informed by rich, streaming data, is helping business leaders transform financial services is this white paper from Bronze Drum Consulting. By leveraging cloud services, financial service firms now have the power to put real-time streaming data to work. Read More ▶ | Editor’s Picks | |
|
|
|