The Newbie’s 'How To Survive Black Hat' Guide
There’s little chance you won’t be totally exhausted after “drinking from the information firehose” all week. But if you follow these eight steps, it will be a very satisfying kind of fatigue.
Shifting The Economic Balance Of Cyberattacks
Partner Perspectives | 6/27/2016 | Our goal should be to simply make the cost of conducting a cyberattack so expensive that cybercriminals view attacking our organization as a bad return on investment.
Mind The Gap: CISOs Versus 'Operators'
How open communication among security execs and analysts, incidents responders, and engineers can help organizations stay on top of the constantly changing threat landscape.
5 Ways To Think Like A Hacker
Security expert says CISOs need to use simulations more effectively so they can understand how hackers work and beat them at their own game.
Security Lessons from My Financial Planner
Security investments can be viewed as a portfolio. If we think in portfolio terms, we realize that ROI is a backwards-looking measure. What else can we learn from financial planners?
'PunkyPOS' Malware Dissected
PunkeyPOS copies card data and bank magnetic stripes and has breached around 200 POS terminals in the US, says report.
Bug Poachers: A New Breed of Cybercriminal
As if security researchers don't have enough to worry about, we now have to contend with extortionists who take advantage of the well-established fact that applications are a ripe target for exploitation.
7 Need-To-Know Attack Stats
Facts & figures about average dwell times, incident response speeds, and which direction the 'detection deficit' is heading.
China Still Successfully Hacking US, But Less
New FireEye report shows significant decline in the number of Chinese cyber espionage attacks on the US since 2014, but China has definitely not stopped the intellectual property theft.
|