Search results for: “threat intelligence”
-
CVSS Vulnerability Scores Can Be Misleading: Security Researchers
Vulnerability management systems based on the Common Vulnerability Scoring System (CVSS) v2 scoring system may be misguided, as a new report found that roughly half…
-
Cobalt Strike Inspires Next-generation Crimeware
Cobalt Strike is a legitimate vulnerability scanning and pentesting tool that has long been a favorite tool of hackers, and it’s even been adapted by…
-
New Quantum-safe Cryptography Standards Arrive None Too Soon
A six-year quantum cryptography competition just ended, producing four new security standards selected by the U.S. Department of Commerce’s National Institute of Standards and Technology.…
-
Hyperautomation and the Future of Cybersecurity
Next-gen AI systems are now baked into just about every category of software—but Gartner believes we can automate even further. For the last few years,…
-
Some Cybersecurity Startups Still Attract Funding Despite Headwinds
With the plunge in tech stocks and the freeze in the IPO market, the funding environment for cybersecurity startups has come under pressure. According to…
-
IDS & IPS Remain Important Even as Other Tools Add IDPS Features
Intrusion detection system (IDS) and intrusion prevention system (IPS) technologies – often combined as intrusion detection and prevention (IDPS) – have been in use for…
-
Best Wi-Fi Security & Performance Testing Tools
The prevalence of Wi-Fi has been accelerating for two decades, but in the last two years, it’s surged even further as so many people were…
-
Log4j Vulnerability Puts Enterprise Data Lakes and AI at Risk
The Apache Log4j Log4Shell bug is one of the most critical vulnerabilities in the history of cybersecurity. Hundreds of millions of devices use the Log4j…
-
Security in Milliseconds: Visa Invests in Payment Security as E-Commerce Surges
The COVID-19 pandemic has driven a massive increase in e-commerce spending, doubling to an expected $1 trillion this year, according to Adobe. But that spending…
Latest Articles
Popular Categories
- Applications (99)
- Artificial Intelligence (1)
- Cloud (79)
- Compliance (35)
- Cybersecurity (35)
- Endpoint (74)
- Mobile (41)
- Networks (341)
- News (25)
- Products (368)
- Security (1)
- Sponsored (1)
- Threats (353)
- Trends (201)
- Video (17)