Latest Posts

6dc5fbf4195307a7504ede26fd385662

A Call to Structure

February 15, 2019 Added by:Chris O'Brien

One of the most significant challenges you face when building a threat Intelligence team is about how to best take on the ever-growing amount of Threat Intel.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

What CEOs Need to Know About the Future of Cybersecurity

February 14, 2019 Added by:Steve Durbin

CEOs need to take the lead and take stock now in order to ensure that their organizations are better prepared and engaged to deal with these ever-emerging challenges.

Comments  (0)

71fd135c31a6d0bc64f3b46c190a4590

Who’s Responsible for Your Cyber-Security?

February 12, 2019 Added by:Matt Johnson

Cyber security is everybody’s responsibility – make sure that staff have the tools, and the knowledge, to do it properly.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

CERT/CC Warns of Vulnerabilities in Marvell Avastar Wireless SoCs

February 08, 2019 Added by:Ionut Arghire

The CERT Coordination Center (CERT/CC) has issued a vulnerability note providing information on a series of security issues impacting Marvell Avastar wireless system on chip (SoC) models.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Mozilla Concerned of Facebook’s Lack of Transparency

February 05, 2019 Added by:Ionut Arghire

Mozilla is concerned about Facebook’s lack of transparency regarding political advertising, Chief Operating Officer Denelle Dixon said last week in a letter to the European Commission.

Comments  (0)

4fffaa4acdf2dde64272fc40fe7c0f99

OWASP: What Are the Top 10 Threats and Why Does It Matter?

January 30, 2019 Added by:Nitzan Miron

Since the founding of the Open Web Application Security Project (OWASP) in 2001, it has become a leading resource for online security best practices.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Magento Patches Command Execution, Local File Read Flaws

January 29, 2019 Added by:Ionut Arghire

Magento recently addressed two vulnerabilities that could lead to command execution and local file read, a SCRT security researcher reveals.

Comments  (0)

71fd135c31a6d0bc64f3b46c190a4590

The Biggest Security Hurdles in Your Business, and How to Overcome Them

January 23, 2019 Added by:Matt Johnson

Many organisations are still left in the dark when it comes to exactly what the most common, and pressing cyber security challenges are.

Comments  (0)

368febea925e4f73f6df3d1fa3c8d577

Four Technologies that will Increase Cybersecurity Risk in 2019

January 17, 2019 Added by:Srinivas Mukkamala

While advances in technology provide many benefits, they also open new threat vectors and the potential for attacks that can spread quickly over connected ecosystems.

Comments  (0)

E35eb0b731ef951516e38fd155abfdf4

Strategies for Winning the Application Security Vulnerability Arms Race

January 17, 2019 Added by:Anna Chiang

Security and development teams need to collaborate closely to ensure that enterprise web and mobile applications are free of vulnerabilities that can lead to costly data breaches.

Comments  (0)