Penetration Testing Services: what to look for in a pen test provider

These days computers and the software that operate upon them touch practically every part of our professional and personal lives. The information they store, process and transmit is the foundation upon which businesses are built, how customer experiences are delivered, and how we find the best takeout food in our immediate area. So why is … Continue reading Penetration Testing Services: what to look for in a pen test provider

US Counterintelligence Director & Fmr. Europol Leader Talk Election Security

The US counterintelligence lead joins a former Europol cyber chief to discuss modern election threats and the benefits of public-private collaboration. Nations worldwide have faced the challenge of maintaining trustworthy elections in the face of evolving cyberthreats. As the United States rapidly approaches its 2020 presidential election, officials are concerned about how to best protect … Continue reading US Counterintelligence Director & Fmr. Europol Leader Talk Election Security

25% of BEC Cybercriminals Based in the US

While the US is known to be a prime target for BEC attacks, just how many perpetrators are based there came as a surprise to researchers. A new analysis of business email compromise (BEC) attacks reveals the global footprint of BEC activity: Twenty-five percent of perpetrators behind these threats are located in the United States. … Continue reading 25% of BEC Cybercriminals Based in the US

International law firm Seyfarth discloses ransomware attack

International law firm Seyfarth Shaw announced on Monday that it was the victim of a ransomware attack over the weekend. With more than 900 lawyers in 17 offices in America, Europe, and the Asia Pacific regions, the company made over $700 million in gross revenue last year, placing it in the lower half of the … Continue reading International law firm Seyfarth discloses ransomware attack

How to Pinpoint Rogue IoT Devices on Your Network

Researchers explain how security practitioners can recognize when a seemingly benign device could be malicious. A Raspberry Pi floating on your network may not be cause for concern – at first. But when did it join the network? What is it doing? Is it the only Raspberry Pi? These questions can help discern a benign … Continue reading How to Pinpoint Rogue IoT Devices on Your Network