Red teaming, or the practice of detecting network and system vulnerabilities by taking an attacker-like approach to system, network or data access, … [Read more...] about Red Teaming + Artificial Intelligence: A Match Made in Cybersecurity Heaven
Network security is an issue that is increasingly important as businesses and even households shift more workflow processes and key tasks to the … [Read more...] about Cybersecurity: Protecting All the Endpoints
Radware released its 2018 Executive Application and Network Security Report. For the first time in the survey’s five-year history, a majority of … [Read more...] about Has paying the ransom become business as usual?
Patching is often the responsibility of the operations or infrastructure team. They are required to keep systems up to date, but rarely have the full … [Read more...] about Patch management is not just IT’s responsibility, get your whole team on board
A critical vulnerability found in Cisco Access Control Server (ACS) allowed attackers to obtain the credentials of privileged users and run commands … [Read more...] about Cisco ACS vulnerability lets attackers remotely control servers: Are you at risk?
Security teams are under tremendous pressure today. According to an Imperva study released at RSA Conference 2018, 27 percent of enterprise security … [Read more...] about Why creativity is key to security
A kill chain consists of seven identifiable steps (as defined by Lockheed Martin) which cyber criminals go through in order to gain access to an … [Read more...] about How to identify and defend against the steps of a cybersecurity kill chain
Machine learning (ML) and artificial intelligence (AI) are not what most people imagine them to be. Far removed from R2-D2 or WALL-E, today's bots, … [Read more...] about Machine Learning, Artificial Intelligence & the Future of Cybersecurity
Enterprises and their Security Operations Centers (SOCs) are under siege. Security events are being triggered from all corners of the security stack – … [Read more...] about 5 ways deception tech is disrupting cybersecurity
Researchers at Carnegie Mellon's Software Engineering Institute (SEI) have released a study identifying the best practices and major challenges … [Read more...] about 4 best practices for cyber intelligence in business