Penetration Testing Services: what to look for in a pen test provider

These days computers and the software that operate upon them touch practically every part of our professional and personal lives. The information they store, process and transmit is the foundation upon which businesses are built, how customer experiences are delivered, and how we find the best takeout food in our immediate area. So why is … Continue reading Penetration Testing Services: what to look for in a pen test provider

Password managers: A cheat sheet for professionals

The sheer number of passwords the average person has can lead to confusion and tons of password retrieval emails. Simplify and secure your digital life by learning about password managers. Never used a password manager? Here's how to get started Watch Now Find me a person alive that doesn't have at least one online password, … Continue reading Password managers: A cheat sheet for professionals

New Research Finds Bugs in Every Anti-Malware Product Tested

Products from every vendor had issues that allowed attackers to elevate privileges on a system -- if they already were on it. A majority of security tools that organizations use to defend against malware attacks are themselves vulnerable to exploits that allow attackers to escalate privileges on a compromised system, a new CyberArk study has … Continue reading New Research Finds Bugs in Every Anti-Malware Product Tested

New HEH Botnet Targets Exposed Telnet Services

Latest threat is one in a growing list of malware developed in the Go programming language. A potentially destructive peer-to-peer (P2P) botnet has surfaced and is targeting a broad variety of Internet of Things (IoT) devices with exposed or weakly protected telnet services. Researchers at China-based 360NetLab, who recently discovered the so-called HEH botnet this … Continue reading New HEH Botnet Targets Exposed Telnet Services

3 Ways Companies are Working on Security by Design

Execs from top financial organizations and other companies share insights on building a security culture. As cybersecurity professionals seek to bolster security culture across the enterprise, the concept of security by design has grown in prominence. It has several interpretations: baking security fundamentals into development requirements, building less obtrusive security features for the convenience of … Continue reading 3 Ways Companies are Working on Security by Design