Analytics & Intelligence
2020 US Election Security is Paramount
The 2020 election season is a Big Deal™ as well it should be. The United... The post 2020 US Election Security is Paramount appeared first on Gurucul ...
Improving on the Typical SIEM Model
Despite its inherent flaws, today’s SIEM software solutions still shine when it comes to searching and investigating log data. One effective, comprehensive approach to network security pairs the best parts of SIEM ...
The Future of Connected Devices
It’s the last week of Cybersecurity Awareness Month, and the last installment of this weekly... The post The Future of Connected Devices appeared first on Gurucul ...
Five worthy reads: Preparing an incident response plan for the pandemic and beyond
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. With the rising concern over cyberattacks in the distributed workforce, this week we ...
Efficient audits with machine learning and Slither-simil
by Sina Pilehchiha, Concordia University Trail of Bits has manually curated a wealth of data—years of security assessment reports—and now we’re exploring how to use this data to make the smart contract ...
Sophisticated phishing
Most of us can think of a time when we received a phishing email. In fact, most phishing emails are easy to identify, and automatically go to spam. However, in this ongoing ...
Enhancing Visibility with Bitglass and Splunk
The complexity of organizations’ IT infrastructures is always increasing. Modern businesses are faced with cloud-based resources like software-as-a-service apps and infrastructure-as-a-service platforms, as well as personal devices, a diffuse remote workforce, IoT, ...
GRU Agents Indicted for Hacking Multiple Targets
The DoJ has charged six Russians, allegedly working for the GRU, with a huge range of computer crimes ...
Securing Internet-Connected Devices in Healthcare
We’ve been talking about Cybersecurity Awareness Month in the last couple of posts, following along... The post Securing Internet-Connected Devices in Healthcare appeared first on Gurucul ...
Split-Second Phantom Images Fool Autopilots
Researchers are tricking autopilots by inserting split-second images into roadside billboards. Researchers at Israel’s Ben Gurion University of the Negev … previously revealed that they could use split-second light projections on roads ...
