Keep Calm and Prepare for the GDPR Data Security and Privacy Policies

Countdown to GDPR #5: Data Security and Privacy Policies

To prepare for the upcoming GDPR we’re doing a series of blogs about key regulations and ways to be compliant with them. In part 5 in our 10-part series we take a ...
An in-depth malware analysis of QuantLoader

An in-depth malware analysis of QuantLoader

QuantLoader is a Trojan downloader that has been used in campaigns serving a range of malware, including ransomware, Banking Trojans, and RATs. In this post, we'll take a high-level look at the ...

Upcoming Webinar: Prepare Your Security Operations for Orchestration and Automation Tools

I am super-super-busy preparing the materials for Gartner Security Summit 2018, but here is a quick one – I am doing a webinar on SOAR next week. Title: “Prepare Your Security Operations ...

Evident GDPR Report Delivers Automated Approach to Compliance Monitoring and Management

Within organizations across the globe there is heightened anticipation and preparation for compliance with the General Data Protection Regulation (GDPR). With this formal set of policies for organizations doing business in, or ...
Figure 1: The dreaded F grade by SSL Labs that organizations are trying to avoid

Making the Grade: Achieve SSL Labs A+ Grade with Imperva WAF

In this blog post, we'll go over how to elevate your web server SSL/TLS implementation, why it's important, and how you can leverage our version 13.0 release for Imperva SecureSphere Web Application ...
OffensiveCon 2018: Building a Zero-Day Machine

OffensiveCon 2018: Building a Zero-Day Machine

Fabian Yamaguchi, Niko Schmidt & Marco Bartoli of ShiftLeft recently presented on our efforts to build a zero-day vulnerability machine at OffensiveCon. You can watch their presentation below.FIELD REPORT ON A ZERO-DAY ...

10 ways to protect your Android phone

How can Android users balance the power of better tech with the safety of best cybersecurity practices? Here are a few tried and true methods to protect your Android phone. Categories: How-tos ...
The Mikrotik RouterOS-Based Botnet

The Mikrotik RouterOS-Based Botnet

A newly discovered botnet targets TCP port 8291 and vulnerable Mikrotik RouterOS-based devices. MikroTik, a Latvian hardware manufacturer, products are used around the world and are now a target of a new ...
Application complexity and porosity

It’s Complicated – Operational Security for Developers

The life of a commercial software developer is a difficult one. Or at least we have to assume it is because of how many of them half-ass it when code starts to ...
The Nonattribution Approximation

The Nonattribution Approximation

via Jordan Drysdale, writing at the Black Hills Infosec blog, regales us with a well attributed post, detailing a fucntional non-attribution hardware and software package... Today's Must Read. Permalink ...

Secure Guardrails