7 Things to Know About Today’s DDoS Attacks

Distributed denial-of-service (DDoS) attacks continue to be a weapon of choice among threat actors seeking to extort money from victims, disrupt operations, conceal data-exfiltration activities, further hacktivist causes, or even to carry out cyberwar. Read/see the slideshow explaining different types of DDoS attacks on Dark Reading.

7 Takeaways From The Equifax Data Breach

The exposure of PII belonging to 143 million US consumers raises questions about the continued use of SSNs as identifiers, breach liability and app sec spending. Read Jai Vijayan list seven lessons we can take away from the Equifax Data Breach in a slideshow on Dark Reading.

7 Things to Know About Today’s DDoS Attacks

Distributed denial-of-service (DDoS) attacks continue to be a weapon of choice among threat actors seeking to extort money from victims, disrupt operations, conceal data-exfiltration activities, further hacktivist causes, or even to carry out cyberwar. Read/see the slideshow explaining seven things companies should know about DDoS attacks on Dark Reading.

The current state of cybercrime

CSO’s 2017 U.S. State of Cybercrime report reveals what IT and security pros fear, how they protect their data, what worked, and what they spend on cyber security. Read/see the slide show explaining CSO’s 2017 U.S. State of Cybercrime report on CSO Online.

The 10 sneakiest hacker attacks

Malware capable of sneaking past your defenses is the Holy Grail of the criminal world. Know your enemy. Here are the 10 sneakiest ways hackers breach your stronghold. Read/see the slideshow explaining the 10 sneakiest hacker attacks ever on CSO Online.

What Info Security Pros Think About Fake News

Fake news sources are manipulating U.S. politics, and it’s virtually impossible to stanch the flow of bogus reports. That’s the opinion of most cyber-security experts and industry thought leaders who participated in a survey at the Black Hat 2017 security conference. Read/see the slideshow explaining how the security pros view fake news on Baseline Mag.

9 of the Biggest Bug Bounty Programs

Bug bounty programs have become an increasingly popular way for organizations to find and fix vulnerabilities in their software and services. Until relatively recently it was mainly the software companies and technology firms that employed the tactic. Read/see the slideshow explaining the nine biggest bug bounty programs on Dark Reading.

Managing Third-Party Risks and Internet of Things

Efforts to mitigate third-party risks in the internet of things ecosystem are lagging, despite recognition that the IoT introduces new security risks and vulnerabilities, according to a new study. Companies rely on technologies and practices that have not evolved to address emergent IoT threat factors, according to “The Internet of Things: a New Era of […]

Cisco Midyear Cybersecurity Report: 10 Security Threats To Watch

2017 so far has seen a rise in new and old threat vectors, the Cisco Midyear Cybersecurity Report found. While email and spyware continued to be threats on the rise, the report said new threats around Malware-as-a-Service, the cloud, Distributed Denial of Service and the Internet of Things are also growing. Read/see the slideshow explaining […]

Biometrics: Moving Far Beyond Fingerprints

Security used to mean “difficult,” says Phil Dunkelberger, CEO of Nok Nok Labs. It’s easy to see why he thinks this. Organizations have struggled for decades to find security tools that kept out bad guys while admitting authorized persons. This is both a physical security and cybersecurity issue. Read/see the slideshow explaining how Biometrics is […]