Keep a lid on your AWS cloud goodies with breach and attack simulation
If you store business data in the AWS cloud, you need to secure it against unauthorized access. A breach and attack simulation can boost your security.
If you store business data in the AWS cloud, you need to secure it against unauthorized access. A breach and attack simulation can boost your security.
The need for cyber insurance is gaining traction across all levels of business. But are the policies currently available adequately addressing these needs?
2016 will be remembered for many things, but for security experts the No. 1 story was ransomware, most prominently the virulent malware known as Locky.
The U.S. government is asking for an “adult conversation” with InfoSec professionals about encryption, but what they really want is backdoor methods to decrypt personal data and more intrusion on civil liberties.
Top security researcher Dan Kaminsky says a single government agency to oversee cybersecurity is needed to avert emerging threats.
Ransomware has been around a while but only recently have attackers begun targeting large organizations. Cisco offers some tips to minimize the risks.
The evolution of various privacy and cryptography algorithms – RSA, SHA-1, SHA-2, and others–and what the government has to do with all of it.
In January, the CEO of aerospace manufacturer FACC in Europe fell victim to possibly one of the worst cyberphishing acts in history.
Malicious hackers are not only talented at coding and bypassing cybersecurity measures; many are also talented at hacking people.
I’m often asked how one should go about landing a job and potentially a career in cybersecurity. I am optimistic that with my 15 years of experience in this realm, I can offer some direction.