The Return of Email Flooding
Commentary | 11/29/2018 | An old attack technique is making its way back into the mainstream with an onslaught of messages that legacy tools and script writing can't easily detect.
Perceptual Ad Blockers Have Security Flaws, Too
Larry Loeb | 11/22/2018 | Blocking ads is more than stopping annoying pop-ups. There's a security component as well. However, a crop of perceptual ad blockers that use machine learning have their own flaws and shortcomings.
To Stockpile or Not to Stockpile Zero-Days?
Commentary | 11/21/2018 | As the debate rages on, there is still no simple answer to the question of whether the government should stockpile or publicly disclose zero-day vulnerabilities.
Cybersecurity at the Core
Commentary | 11/20/2018 | For too long, cybersecurity has been looked at as one team's responsibility. If we maintain that mentality, we will fail.
IoT Security Problems Can Cost Enterprises Millions
Jeffrey Burt | 11/20/2018 | A survey by DigiCert finds that the IoT is a priority for most companies, but many enterprises struggle when it comes to security and privacy. This can translate into firms losing millions.
Empathy: The Next Killer App for Cybersecurity?
Commentary | 11/13/2018 | The toughest security problems involve people not technology. Here's how to motivate your frontline employees all the way from the service desk to the corner office.
RIP, 'IT Security'
Commentary | 11/13/2018 | Information security is vital, of course. But the concept of "IT security" has never made sense.
Hidden Costs of IoT Vulnerabilities
IoT devices have become part of our work and personal lives. Unfortunately, building security into these devices was largely an afterthought.
After the Breach: Tracing the 'Smoking Gun'
Systems, technology, and threats change, and your response plan should, too. Here are three steps to turn your post-breach assessment into a set of workable best practices.
Where Is the Consumer Outrage about Data Breaches?
Facebook, Equifax, Cambridge Analytica … Why do breaches of incomprehensible magnitude lead to a quick recovery for the businesses that lost or abused the data and such little lasting impact for the people whose information is stolen.
|