LAS VEGAS — The scourge that is ransomware has dominated security headlines over the last year, with large outbreaks like WannaCry and NotPetya shutting down critical infrastructure in affected organizations.…
LAS VEGAS — The concept of Red and Blue security team testing is one that is well understood among many security professionals. The Red Team takes an offensive penetration testing…
The Let’s Encrypt project has re-shaped the market for SSL/TLS certificates, providing millions of free security certificate to organization around the world. Among the many backers of Let’s Encrypt is…
As users have increasingly moved from desktop operating systems to mobile devices as their primary form of computing, cyber attackers have taken notice and malware has followed. While the total…
The era of employees bringing their own devices into corporate environments created the need for advanced technology platforms to help control all types of devices. Bring Your Own Device, often…
A core element of computing access is end users and their devices. It is the device that will access a network or corporate application and it is often the device…
The modern enterprise is mobile and employees are no longer tethered to their corporate owned and provisioned computing equipment. As is the case in the wired world, mobile end-user devices…
Attackers often create new accounts in order to commit fraud, but how long does it take from the time the account is created until fraud is attempted? That’s one of…
Since 2010 when it first began its bug bounty program, Google has been one of the most transparent companies when it comes to revealing how much it will pay security…
Validating the integrity and authenticity of code in Microsoft applications is important given their near-ubiquity in the enterprise. One mechanism for doing so is a digitally signed file that is…
Subscribe to Cybersecurity Insider for top news, trends & analysis