Security Geek Gift Guide
Slideshows | 11/30/2015 | Whether you're looking for a gift to give at the IT department's holiday party, for your science-loving kids, or for a genuine friend in the cube beside you, these gifts are sure winners.
The Youthful Side Of Hacking
Commentary | 11/25/2015 | If the iconic 1955 movie Rebel Without a Cause was remade today, would James Dean be a computer hacker?
Where Is Ransomware Going?
Partner Perspectives | 11/23/2015 | As PCs and servers get better protected and employees more knowledgeable about the ransomware threat, criminals will go after less secure systems such as smart TVs, conferencing equipment, or other unsecured devices.
We Need A New Word For Cyber
Commentary | 11/23/2015 | It’s time to find an alternative for 'cyber' (an adjective or noun) before the term – like 'google' -- becomes a verb.
Introducing ‘RITA’ for Real Intelligence Threat Analysis
Commentary | 11/20/2015 | SANS' free, new framework can help teams hunt for attackers by extending traditional signature analysis to blacklisted IP addresses and accounts that have multiple concurrent logons to multiple systems.
Must Automation Remain A Four-Letter Word?
Partner Perspectives | 11/17/2015 | It doesn’t have to. We just need to apply the compensating safeguards and automated controls selectively so CISOs and their security teams can comfortably embrace it.
Don’t Toy With The Dark Web, Harness It
Commentary | 11/16/2015 | The Dark Web’s sinister allure draws outsized attention, but time-strapped security teams would benefit from knowing what's already circulating in places they don't need Tor or I2P to find.
|