Lessons From the Black Hat USA NOC
The conference's temporary network operations center provides a snapshot of what is possible when a variety of professionals work together.
Data Leaks Via Smart Light Bulbs? Believe It
Researchers from the University of Texas at San Antonio have shown it's possible to exfiltrate data from a smart-bulb system. But there's no need to go back to candles just yet.
Vulnerable Web Apps Top Threat to Enterprises
Jeffrey Burt | 8/22/2018 | A report by Kaspersky researchers found that 73% of successful network perimeter breaches in 2017 were committed via web apps, while inside threats continue to put companies at risk.
IAM Heads to the Mobile Cloud
Joe Stanganelli | 8/16/2018 | Persisting problems with identity and access management combined with usability demands are influencing the IAM market. But will enterprise IT step up its IAM game?
|