By Darren T. Kimura, Spin Technology The threat of ransomware is rising rapidly. Each day, we…
Mes: septiembre 2020
Mapping Automation to the MITRE ATT&CK Framework
By Chris Calvert, vice president, product strategy, and co-founder Respond Software As major enterprises race to…
Automotive Cybersecurity Is Not One-Size-Fits-All. Here’s How Oems And Tier 1s Can Tailor Their Approach to Meet the Needs of The Market
OEMs, Tier 1s, and key supply chain players all differ in their approach to cybersecurity, opting…
Privacy Shield Revoked
What This Means for EU-US Commercial Data Transfers By Dan Piazza, Technical Product Manager, Stealthbits Technologies…
Manual vs. Automatic Cybersecurity Testing: What’s the Difference?
By Tamir Shriki, Customer Operations Manager, XM Cyber In the context of cybersecurity, if you want…
German investigators blame Russian DoppelPaymer gang for deadly hospital attack
The investigation of German authorities on the recent attack on the Dusseldorf hospital reveals the possible…
5 Ways to Avoid Security Automation Pitfalls
By Joe Partlow, CTO at ReliaQuest Amid an enterprise attack surface that is more complex than…
Lockscreen and Authentication Improvements in Android 11
Posted by Haining Chen, Vishwath Mohan, Kevin Chyn and Liz Louis, Android Security Team[Cross-posted from the…
Mozi Botnet is responsible for most of the IoT Traffic
The Mozi botnet accounted for 90% of the IoT network traffic observed between October 2019 and…
Weaknesses of Biometric Authentication
By Mark Perkins, MS, CISSP, IT Manager In today’s digital world, knowing who is on the…