When Your EDR Vendor Attacks!

When Your EDR Vendor Attacks!

Florian Roth, Head of Research at Nextron Systems in Germany, received a series of alerts on Nov. 6 that had all the telltale signs of a potentially serious security breach ...
cyber hygiene

Why You Need a Cyber Hygiene Program: Q&A with Alert Logic’s Jack Danahy

In the aftermath of a data breach, organizations must answer many questions. But what often isn’t asked is how effective or efficient its cyber hygiene program is, and what role it will ...
Security Boulevard
 Originally Seen On   Algorithmia   ,   via   Prooffreaderswhimsy  !

Anti-Exfil: The Is-Self, Not-Self Solution?

Originally Seen On Algorithmia, via Prooffreaderswhimsy! via Karen Hao, writing at MIT's Technology Review magazine, reports on a relatively new-and-novel security product monikered Darktrace. Here's the quote from the organization's co-CEO Nicole ...
   via   the Security Mindset of   Robert M. Lee   and Illustration talents of   Jeff Hass   at   Little Bobby   Comics

Robert M. Lee and Jeff Hass’ Little Bobby Comics – ‘Vendors’

via the Security Mindset of Robert M. Lee and Illustration talents of Jeff Hass at Little Bobby Comics Permalink ...

Comodo, RSA, and Security Priorities

More details are coming in on the Comodo digital certificate hack by an Iranian hacker. The young man apparently exploited the use of plaintext usernames and passwords in a generally vulnerable certificate ...

Security Scoreboard is Live!

I am very excited to announce the launch this week of Security Scoreboard - an online resource for researching and reviewing information security vendors. Security Scoreboard features over 600 vendors and aims ...