Think Outside the Box to Close the Skills Gap

The skills gap in cybersecurity is a topic I address a lot, but it is also one of the issues in cybersecurity for which we just can’t figure out the solution. It ...
Security Boulevard
The London Protocol Improve Identity Assurance

The London Protocol: An Initiative to Improve Identity Assurance

Can today’s data security technologies protect us from the phishing attacks? Is there an ultimate way to combat phishing once and for all? Five leading certificate assurance (CA) companies have joined their ...
Security Boulevard

How Cybercriminals Are Getting Initial Access into Your System

This article covers the main techniques cybercriminals use at the initial stage of attacks against enterprise networks. There are several dangerous phases of cyberattacks targeting the corporate segment. The first one encountered ...
5 Industries Grappling with Bad Bots

The Top 5 Industries Grappling with Bad Bots

2018 was the year bots went mainstream, as we learn more and more each day about Russia’s influence over the 2016 U.S. presidential election and watch as two of the most popular ...
Security Boulevard
malware spy vs. spy

FireEye Focuses on Email Security Analysis with Free Offering

FireEye has begun offering a free service through which IT organizations can evaluate their email security, as those systems have become the primary mechanism through which malware gets introduced into the enterprise ...
Security Boulevard
Under the hoodie: why money, power, and ego drive hackers to cybercrime

Under the hoodie: why money, power, and ego drive hackers to cybercrime

We know what cybercriminals do. We know how they do it. Now we ask: why? This in-depth profile examines what makes hackers turn to cybercrime, and what could change their minds. Categories: ...
Akamai JavaScript

Vulnerable Web Applications Leave All Sectors at Risk

Coming into 2018, security professionals expected to see a continued increase in the use of websites as a means of infecting user workstations, according to a recently released report from Positive Technologies ...
Security Boulevard
What Is RSA Labs? A Q&A with Security Ledger

RSA Labs: Staying Secure Means Staying Relevant

Keeping up with, if not a step ahead, of the bad guys isn?t all that security researchers find themselves battling. Staying upright on a rapidly shifting terrain is made all the more ...
Fifth Generation of Cybersecurity

Check Point: Time for a Fifth Generation of Cybersecurity

Cybersecurity is entering a new phase that requires IT organizations to put processes in place that are capable of continuously identifying potential threats before they impact operations and detecting them once a ...
Security Boulevard