5 Fundamentals for Mitigating the Risk of Laterally Spreading Malware

The persistent risk of laterally spreading malware requires good execution of network security fundamentals including segmentation and internal instrumentation ...
The Five Most Dangerous New Attack Techniques and How to Counter Them

5 Emerging Vectors of Attack and Recommendations for Mitigating the Risks

DNS manipulation, domain fronting, targeted cloud individual attacks, HTTPS and encryption, and the exploitation of hardware features are among the emerging challenges adversaries can exploit according to cybersecurity experts at SANS ...

Spending, Headcount and Optimism: 6 Significant Takeaways from the State of IT Security Survey by eSecurity Planet

A survey of readers by the trade publication eSecurity Planet found businesses plan to boost cybersecurity spending and identified specific areas of confidence and doubt around defenses ...
Girl Scouts of The USA CEO on getting young girls in STEM

The Growing Surface of Attack and What Cybercrime has in Common with Street Crime [Q&A with Steve Morgan of Cybersecurity Ventures]

Trillion with a “T.” Cybercrime damages will cost $6 trillion annually across the globe by 2021. That’s double the figure from 2015, ...

15 Cybersecurity Statistics Summarizing the Intense Year the Community had in 2018

If there was a common denominator across the cybersecurity community in 2018, it was this: everything got more intense. The volume of attacks, ...

The Mixed Forecast for Cybersecurity during Black Friday and Cyber Monday

The first nine months of 2018 have not been easy in cybersecurity circles. Reporting indicates that while breaches and records exposed are down ...
Could IPv6 Result in More DDoS Attacks?

Could IPv6 Result in More DDoS Attacks?

With the growing popularity of IPv6 (Internet Protocol Version 6), so the possibility of this protocol providing a gateway for Distributed Denial of Service (DDoS) attacks has also increased. Developed by the ...
Cyber Risks of Online Gaming

Cyber Risks of Online Gaming

As computer gaming companies rush to get their latest products onto the market, this haste may be providing a serious cybersecurity vulnerability. Prior to launching the next great computer game hit, online ...