It is obvious to anyone who has attended a commercial security conference, been on the receiving end of countless security vendor pitches or tried to sift through what security product to add to their defenses: Artificial intelligence (AI) has permeated the marketing language in cyber. The promise of automation superhuman intelligence is compelling, but..
In his talk, “DevOps is Automation, DevSecOps is People,” at the 2018 Security Congress in New Orleans, Mike Shema, CISO at Colbalt.io, said there needs to be a more collaborative approach when it comes to securing DevOps. The Classic DevOps Approach The increasingly popular buzzword “DevOps” means development and operations, and it comes from..
Independent lab AV-Comparatives focuses on one thing and one thing only — constant, regular tests of the leading antivirus software on the market. After putting each brand’s software suite through its paces, the lab then publishes the results in easy-to-read reports aimed at helping consumers make informed decisions in choosing the cybersecurity that’s right for them. This week,..
Last time, I had fun speaking with my friend, red team-minded student/teacher Alana Staszczyszyn. This time, I had the privilege of speaking with cybersecurity and intelligence industry veteran Theresa Payton. She’s always had tons of responsibility. She went from the White House to start her own private sector firm, Fortalice Solutions. Kim Crawley: Hi, Theresa! … Read More The..
The Payment Card Industry Data Security Standard (PCI DSS) is a living set of requirements, and... The post Latest PCI DSS 3.2 Requirements for Service Providers Push Common Sense Security appeared first on..
October is National Cyber Security Awareness Month (NCSAM). NCSAM is a great initiative to help educate and inform our friends and family on the importance of taking your digital security seriously. Week Three in particular aims to help users fuse cybersecurity across their work and personal lives and emphasizes the shared responsibility of employees to … Read More The post NCSAM:..
Today Oracle has released its quarterly patch update for October 2018. It fixes 301 vulnerabilities. The main highlights are as follows: Oracle closed 1119 issues in 2018 in total that is the same as in 2017. CPU for October 2018 contains 162 vulnerabilities in business-critical applications. The most vulnerable application is Oracle Fusion Middleware totaling The post Analyzing Oracle Security..
We are pleased to provide details on our most popular machine learning models. Check out the next in our series of informative blog articles. Gurucul Machine Learning Model: Rare and Volume Based Analytics How does the Rare and Volume Based Analytics machine learning model work, what does it do? This machine learning model identifies rare The post Prevent Fraud with “Rare and Volume..
Do your employees use their personal devices for work purposes? Company data could be at risk. Protect your SMB with these 10 essential BYOD security tips. The post 10 essential BYOD security tips for SMBs appeared first on Emsisoft | Security..
The British government has released a voluntary "Code of Practice" for securing IoT devices. I thought I'd write some notes on it.First, the good partsBefore I criticize the individual points, I want to praise if for having a clue. So many of these sorts of things are written by the clueless, those who want to be involved in telling people what to do, but who don't really understand the..