Sunday, February 17, 2019
  • Google +
  • Linkedin
  • Twitter
  • Email
  • Where I work
  • Advertise here
  • Free SIEM solution

Security Newsfeeds

Cyber Security Newsfeeds from around the world

  • Home
  • Hacktivism
  • Strategic Threats
  • Cyber Crime
  • Security Blogs
  • Economic Threats
  • Free Security Analytics

Category: Adaptive Response

Detection Only Solutions Aren’t Enough For Today’s Security Teams

April 27, 2018 Auto Bot

Last week I had the opportunity to speak with several CISOs about what they are doing to deal with cyberattacks, breaches and internal threats. A consistent theme I heard is that detection only solutions aren’t enough. They need more practi…

Continue Reading

How to Stay Out of the Security Shelfware Trap

April 11, 2018 Auto Bot

The RSA Conference is just around the corner, and with it, one of the true spectacles of the security industry. If you visit the show floor of exhibitors you will find a seemingly endless sea of security vendors and products stretching in a…

Continue Reading

Simplifying PCI DSS 3.2 Compliance with Preempt

February 9, 2018 Auto Bot

If your organization handles credit cards, you are no doubt familiar with  Payment Card Industry Data Security Standard (PCI DSS) compliance. PCI DSS is a set of requirements and procedures that have been established in order to streng…

Continue Reading

Fixing Account Lockouts With Adaptive Policies

January 4, 2018 Auto Bot

Dealing with account lockouts is one of the unhappy facts of life for many IT teams. And while  resolving lockouts isn’t particularly difficult, it is the sheer volume of incidents that often weighs down IT teams. In fact a recent surv…

Continue Reading

How Identity, Behavior & Risk Enable Security in the New Digital Age

December 7, 2017 Auto Bot

Enterprises are deploying more cloud services, embracing DevOps, leveraging on-premises applications and exploring other productivity and cost optimization solutions. As a result, it is becoming harder for them to know who within the organi…

Continue Reading

Evolving Employee Security Measures from “Weak Link” to “Front Line Defense”

December 1, 2017 Auto Bot

It’s easy to think that attackers have gained an unfair advantage over security professionals. The network perimeter has virtually dissolved, compelling enterprises to simultaneously work to keep the bad guys out while tackling multiple ins…

Continue Reading

Stopping Breaches Requires Asking the Right Questions

October 26, 2017 Auto Bot

In a very short period of time, machine learning (ML) has had a major impact on the field of cybersecurity. Machine learning has proven to be adept at finding threats in ways that traditional signatures never could, whether detecting malwar…

Continue Reading

Defending Against Credential Compromise (VIDEO)

September 29, 2017 Auto Bot

Credential Compromise has been a leading attack vector for the last five years. There are a variety of ways that attackers can do this. It could be by guessing passwords, phishing emails, spyware,  or even pulling credentials out of me…

Continue Reading

Recent Articles

  • Tenable Doubles Cyber Exposure Technology Integrations to Help Customers Manage and Measure Cyber Risk Holistically February 17, 2019
  • With rise in cybercrime, firms take cover February 17, 2019
  • Des piratages et des bug bounties #veille (17 fév 2019) February 17, 2019
  • Bomber, handlers used peer-to-peer service? February 17, 2019
  • Find any Exploit with one command February 17, 2019
  • Attackers place crypto-jacking apps in Microsoft App Store February 17, 2019
  • UK concludes it can mitigate risk from Huawei equipment use in 5G: FT February 17, 2019
  • China, US head for cybersecurity showdown in Europe – Business Day February 17, 2019
  • Pakistan Army, Foreign Ministry Websites Hacked; Neighbour Blames India for Cyber Attack – News18 February 17, 2019
  • Cross-site Scripting (XSS) in mobius1-selectr (npm) with medium severity https://snyk.io/vuln/SNYK-JS-MOBIUS1SELECTR-173698 February 17, 2019

About This Site

This site is provided free, as is, without support and without ads. It is useful for Security teams who need to keep up to date with Infosec news. Information is automatically fetched and there is no guarantee of accuracy on any content on this site.

Ken Gilmour | Theme: News Portal by Mystery Themes.