Seeing Red: Understanding Red Team Security

Seeing Red: Understanding Red Team Security

| | Cybersecurity
As the number and scope of cyberattacks on corporate networks increase, organizations must remain vigilant as they try to stay one step ahead of the threats. Red teams can help organizations understand ...
Slip Siding Away, A Tune The DoD Would Like To Un-Hear

Slip Siding Away, A Tune The DoD Would Like To Un-Hear

Bad news for the Department of Defense (which nearly always translates into bad news for ourselves and our allies). Via Robert N. Charette, writing at the IEEE's Spectrum Magazine, of a recently ...

CISO series: Building a security-minded culture starts with talking to business managers

| | Cybersecurity
Protecting the company and its users against data leaks is no longer just the responsibility of IT and security operations. Everyone from the board to Firstline Workers has an important role to ...
How Office 365 learned to reel in phish

How Office 365 learned to reel in phish

| | Cybersecurity
Find out how Office 365 learned to mitigate phishing attacks. The post How Office 365 learned to reel in phish appeared first on Microsoft Secure ...
Senseless AI in Cybersecurity

Making Sense of the Senseless AI in Cybersecurity

It is obvious to anyone who has attended a commercial security conference, been on the receiving end of countless security vendor pitches or tried to sift through what security product to add ...
Security Boulevard
angus macrae

NCSAM: It’s Everyone’s Job to Ensure Online Safety at Work

October is National Cyber Security Awareness Month (NCSAM). NCSAM is a great initiative to help educate and inform our friends and family on the importance of taking your digital security seriously. Week ...
Attack of the Hackers: Cybersecurity and Local Governments in the 21st Century

Attack of the Hackers: Cybersecurity and Local Governments in the 21st Century

You might have heard about the ransomware attack against Atlanta this year. A ransomware attack had significant impact on the city, forcing police officers to file reports by hand and city workers ...
Using Application Analytics to Achieve Security at Scale

Using Application Analytics to Achieve Security at Scale

Are you overwhelmed by the number of security events per day? If so, you are not alone. Alert Fatigue is Leaving You Exposed It is not uncommon for security administrators to receive ...
Making it real—harnessing data gravity to build the next gen SOC

Making it real—harnessing data gravity to build the next gen SOC

In this post we address the question: "How do we make data gravity a reality in the security operations center (SOC) while we are under increased and constant pressure from motivated threat ...

Google+ Shutdown, Weapons Systems Vulnerabilities, Voice Phishing Scams – WB38

This is your Shared Security Weekly Blaze for October 15th 2018 with your host, Tom Eston. In this week’s episode: Google+ shutdown, weapons systems vulnerabilities, and new data on voice phishing scams ...
Loading...