February 21, 2019
The 116th Congress is only a few months old, but far-reaching cybersecurity bills to protect infrastructure and the supply chain, ensure election integrity, and build a security workforce are now being considered. Hereâs the list. Read more â¶
Are zero-day exploits the new norm?
Review: SlashNext is like shooting phish in a barrel
How much does it cost to launch a cyberattack?
Top tools and resources for running a capture the flag competition
How to update Windows 10 for side channel vulnerability fixes
IoT botnets target enterprise video conferencing systems
Read your guide to prevent breaches from attackers with stolen credentials and ways around 2FA. The more you know about users, the more confidently you can remove authentication disruptions. Read more â¶
Research from Microsoft's Matt Miller shows that every actively exploited Windows vulnerability in 2017 was first done using a zero-day attack. Other research shows this trend extends across the IT landscape. Read more â¶
FROM OUR BUSINESS PARTNERS
Sign up for a free video to see how Quip can benefit your enterprise today, and get contacted for a personalized free trial of the platform. Read more â¶
SlashNext is a dedicated platform for combating modern phishing attacks. It does that one thing and it does it very well. Read more â¶
Just like in regular business, cyber criminals have a cost of operation and a return on investment to worry about. Unfortunately, a new report from Deloitte has found the cost of committing cyber crime is incredibly low. Read more â¶
Capture the flag competitions can help improve security skills and identify talent. Use these tools and frameworks to design and run your own CTF event. Read more â¶
Since Spectre and Meltdown were discovered in 2018, other side channel vulnerabilities have emerged. These are the mitigations to consider for each of them. Read more â¶
WootCloud researchers have discovered a trio of IoT botnets based on Mirai that exploit Polycom video conferencing systems. Polycom has issued an advisory and best practices for mitigating the risk. Read more â¶
This paper explores how you can actually increase security and make users more productive by removing them. Read more â¶