In the second of a two-part series on threat risk models, we look at Trike, MIL-STD-882E and OCTAVE.
No threat risk model (an assessment of software, network or other risks and threats) is complete without a methodology for rating threats. In an earlier article we addressed two common and simple threat … more »
Cymmetria's cyber deception technology turns the tables on bad guys by luring them to decoys where users can track their lateral movements.
Which threat risk model is right for you? We compare strengths and weaknesses of three popular ones: STRIDE, DREAD and CVSS.
Hacks happen. But sometimes organizations seem to make themselves targets with behavior that is a bit too boastful, judgmental or egotistical.
Mike Fey, president and COO of Symantec, talks about how he will bring the former Blue Coat and Symantec teams together. [VIDEO]
While Mac malware is not as big of a problem as attacks meant for Windows, hackers are targeting Apple operating systems more than ever before.
Rapid growth of e-commerce applications mean security is sometimes lacking. How can developers secure e-commerce apps?