At RSA, Akamai put focus on fake sites, API vulnerabilities

At the RSA Conference Akamai launched a new security platform for fake websites and touted its focus on protecting application protocol interfaces, or APIs. The post At RSA, Akamai... Read more »

InfoBlox discovers rare Decoy Dog C2 exploit

Domain security firm InfoBlox discovered a command-and-control exploit that, while extremely rare and complex, could be a warning growl from a new, as-yet anonymous state actor. The post InfoBlox... Read more »

Juggling critical infrastructure for data centers, hospitals and more, with an eye on resilience

Joseph Vijay, CEO of Intelli-Systems, talks about the challenges of supporting critical infrastructure, and right-sizing data center power portfolios without disruption. The post Juggling critical infrastructure for data centers,... Read more »

Google’s 2FA app update lacks end-to-end encryption, researchers find

Data synced between devices with the new Google Authenticator app update could be viewed by third parties. Google says the app works as planned.  The post Google’s 2FA app... Read more »

Threat actor APT28 targets Cisco routers with an old vulnerability

The U.S., Europe and Ukraine are reportedly targets in this malware threat. Learn how to protect affected Cisco routers. The post Threat actor APT28 targets Cisco routers with an... Read more »

Information security incident reporting policy

PURPOSE This policy from TechRepublic Premium provides guidelines for the reporting of information security incidents by company employees. The goal is to facilitate the security response and remediation process... Read more »

Forrester Wave™: Security Analytics Platforms, Q4 2022 Report

Download the Forrester Wave™: Security Analytics Platforms report to understand the security analytics and SIEM landscape today. The report named Splunk Enterprise Security a “Leader” in security analytics platforms... Read more »

Adopting Splunk’s Analytics-Driven Security Platform as Your SIEM

Early detection, rapid response and collaboration are needed to mitigate advanced threats faced by today’s enterprise security teams. This white paper explores a better approach to security, and how... Read more »

Gartner SOAR Market Guide

As a pure-play technology, Security Orchestration, Automation and Response (SOAR) Solutions continues to mature, but remains a relatively niche market. It is being consumed into other markets such as... Read more »

10 Essential Capabilities of a Modern SOC

In the last two years, enormous unpredictability has led to radical changes in the way we live and work. For organizations both public and private, digital transformation has gone... Read more »
Subscribe to our Newsletter