APIs are everywhere, and they are ripe targets for malicious attacks By Ameya Talwalker, Co-founder and…
Mes: febrero 2020
Predictive Cyber Intelligence and Defenses using InfoSec Award Winning Cythereal
DTAG-CTI (Deutsche Telekom – Cyber Threat Intelligence) protects clients against cyber-attacks worldwide on a scale beyond…
The Secret to Winning IT Security Roulette
The Secret to Winning IT Security Roulette By Thomas Hatch Cybersecurity can oftentimes feel like…
Industrial Control System Vulnerabilities: A Prime Target of Our Critical Infrastructure by Adversaries
By Dr. Daniel Osafo Harrison, DCS, C|CISO, CISM, CISA, CRISC, Security+ Industrial control system (ICS) is…
Helping Developers with Permission Requests
Posted by Sai Teja Peddinti, Nina Taft and Igor Bilogrevic from PDPO Applied Privacy Research, and…
Cross Domain Solutions – Quo Vadis
By Alexander Schellong, VP Global Business, INFODAS Highly sensitive systems and data assets (domains) are often…
5 Recruitment Predictions in Cybersecurity For 2020
By Karl Sharman As we prepare for more figures to be produced saying the amount of…
Data Encryption on Android with Jetpack Security
Posted by Jon Markoff, Staff Developer Advocate, Android Security Have you ever tried to encrypt data…
Improving Malicious Document Detection in Gmail with Deep Learning
Posted by Elie Bursztein, Security & Anti-Abuse Research Lead; David Tao, Software Engineer; Neil Kumaran, Product…
Cybersecurity Talent Shortage and Ways to Address the Gap
By Blake Tinsley, Founder, and CEO, Prosyntix The cyber threat landscape is ever-evolving. From rapid deployment…