Posts

Avoiding Micro-Segmentation Pitfalls: A Phased Approach to Implementation

Micro-segmentation is very achievable. While it can feel daunting, you can succeed by proactively being aware of and avoiding these roadblocks.
Source: Vulnerabilitys & Threats

Advanced Deception: How It Works & Why Attackers Hate It

While cyberattacks continue to grow, deception-based technology is providing accurate and scalable detection and response to in-network threats.
Source: Vulnerabilitys & Threats

What Slugs in a Garden Can Teach Us About Security

Design principles observed in nature serve as a valuable model to improve organizations’ security approaches.
Source: Vulnerabilitys & Threats

Rutkowska: Trust Makes Us Vulnerable

Offensive security researcher Joanna Rutkowska explains why trust in technology can put users at risk.
Source: Vulnerabilitys & Threats

6 Personality Profiles of White-Hat Hackers

From making the Internet safer to promoting their security careers, bug bounty hunters have a broad range of motivators for hacking – most just like the challenge.
Source: Vulnerabilitys & Threats

Deception: Why It's Not Just Another Honeypot

The technology has made huge strides in evolving from limited, static capabilities to adaptive, machine learning deception.
Source: Vulnerabilitys & Threats

The Critical Difference Between Vulnerabilities Equities & Threat Equities

Why the government has an obligation to share its knowledge of flaws in software and hardware to strengthen digital infrastructure in the face of growing cyberthreats.
Source: Vulnerabilitys & Threats

8 Low or No-Cost Sources of Threat Intelligence

Here’s a list of sites that for little or no cost give you plenty of ideas for where to find first-rate threat intelligence.
Source: Vulnerabilitys & Threats

Frequent Software Releases, Updates May Injure App Security

The more frequently you release apps, the more security vulnerabilities you are likely to introduce in the code, a new study confirms.
Source: Vulnerabilitys & Threats

6 Steps for Sharing Threat Intelligence

Industry experts offer specific reasons to share threat information, why it’s important – and how to get started.
Source: Vulnerabilitys & Threats