dcsimg

From the experts who also bring you:

eWeekLogo
ITBELogo
DeveloperLogo
eSFLogo
ServerwatchLogo
DatamationLogo

LATEST SECURITY NEWS AND ANALYSIS

NewsletterSECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Who Needs Malware? How Adversaries Use Fileless Attacks to Evade Your Security

The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it.  One advanced threat technique that is experiencing success is the use of fileless attacks, …

How Are You Responding to Threats? SANS 2018 Incident Response Survey Part 1

What new and continuing threats are responders uncovering in investigations, and how are they dealing with those threats? This on-demand webcast releases results from the SANS 2018 Incident Response Survey that examines how incident response (IR) teams are coping with organizational …

Analytics and the AML Paradigm Shift

Financial organizations are deploying artificial intelligence and machine learning in the fight against financial crimes. David Stewart, Director of Pre-Sales for the Global Security Intelligence Practice at SAS, offers tips to help separate fact from market hype when reviewing new data …

Securing Office 365 Vulnerabilities with Okta

Office 365 is a highly targeted application for hackers because it is widely deployed across industries. Okta’s security team commonly sees customers experiencing phishing, password spraying, and brute-force attacks, to name a few. Office 365 uses several authentication …