Boldest Cybersecurity Predictions For 2016
Slideshows | 12/31/2015 | Forget the boring, safe predictions -- here instead are the most interesting, cringe-worthy, humorous, or otherwise shocking predictions for the coming year.
A Hidden Insider Threat: Visual Hackers
Commentary | 12/23/2015 | Ponemon experiment shows how low-tech white-hat hackers, posing as temps, captured information from exposed documents and computer screens in nearly nine out of ten attempts.
2015 Ransomware Wrap-Up
Slideshows | 12/22/2015 | Here's a rundown of the innovative ransomware that frightened users and earned attackers big bucks this year.
9 Coolest Hacks Of 2015
Cars, guns, gas stations, and satellites, all got '0wned' by good hackers this year in some of the most creative yet unnerving hacks.
An Ill ‘Wynd’ Blowing But No Safe Harbor
Commentary | 12/16/2015 | What will state-of-the-art for cybersecurity look like in 2016? The regulatory headwinds on both sides of the Atlantic portend big changes.
The End Of Passwords?
IT professionals believe they won't exist in 10 years, but this prediction's been on tap for a decade already.
Macro Malware Is Back
Partner Perspectives | 12/15/2015 | Social engineering drives macro malware levels to six-year highs.
To Better Defend Yourself, Think Like A Hacker
Commentary | 12/15/2015 | As attacks become more sophisticated and attackers more determined, organizations need to adopt an offensive approach to security that gets inside the head of the hacker.
‘Re-innovating’ Static Analysis: 4 Steps
Before we pronounce the death of static analysis, let’s raise the bar with a modern framework that keeps pace with the complexity and size found in today’s software.
|