Search results: threat intelligence

New IoT Threat Exploits Lack of Encryption in Wireless Keyboards

Even though the Internet of Things (IoT) is still quite new, hackers are relying on some pretty old vulnerabilities – like a lack of encryption -- to compromise IoT devices.A research team from Bast...

Startup Spotlight: Deep Instinct’s AI-Driven Threat Detection

Dr. Eli David used to conduct an experiment with students in his AI neural networks and evolutionary computation classes by randomly throwing a pen at a student without warning."I've been doing this...

Webcam Hack Shows IoT Security Threat

The Internet of Things promises added convenience, efficiency - and insecurity.This year will see a big increase in attacks on "things" connected to the IoT, believe many se...

Advanced Threat Detection Buying Guide

Traditional security techniques are no longer enough. By the time malware is spotted and added to antivirus (AV) signatures, the bad guys have either gotten in and wreaked ...

Do Threat Exchanges Work?

Facebook recently caught the attention of security professionals with the announcement of its new Threat Exchange, a special social networking platform (currently in beta) that allows companies to s...

Hacker Guccifer Hits Former Defense Intelligence Agency Deputy CIO

Hacker Guccifer recently breached the personal e-mail of Roy Apseloff, who recently retired as Vice President for Information Management and Deputy CIO at the U.S. Defense I...

6 Emerging Security Threats, and How to Fight Them

The security threat landscape changes constantly, with malicious hackers developing new ways to compromise your systems as older vulnerabilities are discovered and patched....

RSA 2013: How the FBI Combats Insider Threats

SAN FRANCISCO: In 2001 the FBI discovered that one of its own agents had been spying for foreign intelligence services for 22 years. The shock of the Robert Hanssen case led the FBI to build and evo...

New Startup Exodus Intelligence Highlights Exploitable Vulnerabilities

The IT security community is a fluid one, with professionals changing jobs and adjusting to a continuously evolving threat landscape. Aaron Portnoy, a well-known and respected figure who until recen...

34 Most Common Types of Network Security Protections

Whether you’re operating a global enterprise network or a small family business, your network’s security needs to be optimized with tools, teams, and processes to protect customer data and valuable b...

Latest Articles

Popular Categories