SSL/TLS Suffers 'Bar Mitzvah Attack'
Researcher at Black Hat Asia shows how attackers could abuse a known-weak crypto algorithm to steal credentials and other data from encrypted communications.
SDN Shows Promise For Security
Improved security is emerging as a major reason for adopting software-defined networking, but concerns about potential SDN risks persist.
The Internet Of Bring-Your-Own Things
Devices and interconnected systems are finding a foothold not only in our homes but in mainstream organizations. Here are three tips to mitigate the risk.
Educating The Cyberwarriors Of The Future
If I have to choose between hiring a university-educated CompSci grad or an IT specialist strong in sysadmin, networking or programming, I will pick the IT specialist every time.
Will POSeidon Preempt BlackPOS?
Research from Cisco Talos uncovers newly evolved POS malware with more sophistication than BlackPOS and similarities to Zeus for camouflage.
Worst Sports-Related Passwords
March Madness and Spring Training underway. NFL draft and NBA playoffs soon to come. Your users may be even more tempted than ever to create some of these bad sports-related passwords
How some intelligence-sharing organizations operate in the face of today's threat landscape.
Deconstructing Threat Models: 3 Tips
There is no one-size-fits-all approach for creating cyber threat models. Just be flexible and keep your eye on the who, what, why, how and when.