Latest Posts


A Siri for Network Security: How Chatbots Can Enhance Business Agility

March 19, 2018 Added by:Avishai Wool

Professor Avishai Wool, co-founder and CTO of AlgoSec, takes a look at the role chatbots will imminently play in network security – and the benefits it will bring

Comments  (0)


Centering Your Security Strategy on Leadership, Resilience and Fundamentals

March 16, 2018 Added by:Steve Durbin

Companies that prioritize well-equipped security programs and widespread security awareness are more prepared to grow, innovate and compete.

Comments  (0)


An Open Letter to AWS CEO Andy Jassy on Cloud Security Innovation

March 16, 2018 Added by:Brian Ahern

Brian Ahern, CEO & Chairman of Threat Stack, writes an open letter to Amazon Web Services CEO Andy Jassy.

Comments  (0)


Beat Them at Their Own Game: Understanding and Neutralizing Evasive Malware Tactics in the Face of Rising Attacks

March 16, 2018 Added by:Eddy Bobritsky

If there is any hope of disarming modern and well-equipped attackers, we have to beat them at their game.

Comments  (0)


Increasing Board Accountability and Expertise Is Critical to Security and Risk Management

March 09, 2018 Added by:Greg Reber

The Board of Directors (BoD) is ultimately responsible for the future of their company. Shareholders expect that the companies they have invested in will follow through on specific, well-informed plans to mitigate risk in every form.

Comments  (0)


Number of Domains Hosting Crypto-Miners Up 725% in Four Months

March 07, 2018 Added by:Ionut Arghire

The number of websites hosting code that mines for crypto-coins using visitors’ CPU power went up a staggering 725% in a four-month period, Cyren reports.

Comments  (0)


Today's Threat Landscape Demands User Monitoring

February 27, 2018 Added by:Eric Sun

For a complete picture of user behavior, you need visibility both on and off the corporate network.

Comments  (0)


EDR for Everyone Is about Fighting Alert Fatigue

February 21, 2018 Added by:Liviu Arsene

Endpoint detection and response solutions (EDR) are predicted to become a key security technology by 2020.

Comments  (0)


Researchers Detail Linux-Based “Chaos” Backdoor

February 20, 2018 Added by:Ionut Arghire

A Linux-targeting backdoor observed in live attacks in June last year was recently found to have been part of an older rootkit, GoSecure researchers reveal.

Comments  (0)


Large Crypto-Mining Operation Targeting Jenkins CI Servers

February 20, 2018 Added by:Ionut Arghire

A large malicious crypto-mining operation has recently started targeting the powerful Jenkins CI server, Check Point security researchers have discovered.

Comments  (0)