Leading CISO explains the art of simplicity in presentations to business leaders
#Infosec19 Enable Visibility into App Development for Vulnerability Managment
“Pushing left doesn’t fix this, you need to push right too”
Identifying Vulnerabilities in Phishing Kits
While recently examining hundreds of phishing kits for ongoing research, Akamai discovered something interesting – several of the kits included basic vulnerabilities due to flimsy construction or reliance on outdated open source code. Considering the i…
#Infosec19: Winners of European Security Blogger Awards Announced
The results of the 2019 European Security Blogger Awards have been announced
Ex-NSA Hacker Reviewed by FEC over Software Contribution Offer
Area 1 Security wants to contribute free spear-phising prevention software to political campaigns.
Imperva Acquires Bot Management Company Distil Networks
Imperva adds bot management services to its portfolio through the acquisition of Distil Networks.
Nearly Half of Phishing Attacks Are Polymorphic
Over the past year, IRONSCALES identified 11,733 email phishing attacks that underwent at least one permutation.
#Infosec19: How to Defend Against ‘Multi-Intent’ Malware
As cyber-criminals diversify their malware attacks, organizations can bolster defenses by automating attack classification
#Infosec19: Threat Intel Sharing: The Future of Resilience, but Use with Caution
It’s about the quality of the data shared, and not the quantity
#Infosec19: DNS Security Could Be a Match for Crypto-jacking
Overlooked vector can be useful part of defense-in-depth approach, says Infoblox