Business climate may be stabilizing for tech companies

New CompTIA poll finds members are receiving inquiries around cybersecurity, migrating to the cloud, and managed services. Read More

Be prepared: Why you need an incident response policy

Smart security teams have updated incident response plans in place before a security breach happens. Read More

Developers agree: Application security processes have a negative impact on productivity

86% of developers polled in a recent survey said every single aspect of appsec hinders their ability to push code. Read More

ThreatQuotient Integrates with Intel 471 Cybercrime Intelligence

Integration equips organisations with real-time insight and proactive capabilities to mitigate the impact of existing and emerging threats within the cybercriminal underground London, UK – 30th June 2020 – ThreatQuotient™, a leading security operations platform innovator, today announced an integration with Intel 471, the premier provider of cybercrime intelligence for…

Botnet Encyclopedia helps security teams analyze suspicious activity in data centers

New resource lists source IPs, connect-back servers, and attack flows for established campaigns and emerging threats. Read More

5 Essentials for Enabling Zero Trust Security

Workloads have moved beyond physical corporate networks & traditional perimeter defenses. Many organizations now have plans to continue at least some form of remote work longer term. Endpoint threat v… Read More

Nonprofit launches new programs to increase diversity in cybersecurity industry

Cybersecurity group pivots from speaking engagements and scholarships to analyzing skill gaps and connecting candidates with employers. Read More

COVID-19 ‘Breach Bubble’ Waiting to Pop?

The COVID-19 pandemic has made it harder for banks to trace the source of payment card data stolen from smaller, hacked online merchants. On the plus side, months of quarantine have massively decreased demand for account information that thieves buy and use to create physical counterfeit credit cards. But fraud…

Why organizations often have trouble containing cyberattacks

Many companies are hampered by the use of too many security tools and the lack of specific playbooks for common attacks, says IBM Security. Read More

How to protect your remote desktop environment from brute force attacks

An RDP compromise provides a cybercriminal with a backdoor for ransomware and other types of malware, says security provider ESET. Read More