The idea for this blog post came to me during a discussion around some recent research performed by Cisco’s Talos threat research group. The…
Security
-
-
Computerworld | Jul 24, 2018 From advanced authentication to new privacy controls, Windows 10 offers users solid security reasons to upgrade. Copyright © 2018…
-
Researchers from Ruhr-Universität Bochum & New York University Abu Dhabi have uncovered a new attack against devices using the Long-Term Evolution (LTE) network protocol.…
-
Application SecurityNewsSecurity
The difference between red team engagements and vulnerability assessments | Salted Hash Ep 34
CSO Online | Jul 3, 2018 In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges…
-
CSO Online | May 1, 2018 What are the current dangers in mobile technology and what are the strategies to keep yourself protected? Join…
-
Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm’s recent honeypot…