How to Defend Your Organization Against Fileless Malware Attacks

Fighting fileless malware attacks will take some serious effort and careful coordination among a variety of tools and techniques.

The post How to Defend Your Organization Against Fileless Malware Attacks appeared first on Security Intelligence.

Continue reading How to Defend Your Organization Against Fileless Malware Attacks

7 Security Trends to Watch in the New Year

In time for the New Year, David Strom shares seven things security professionals need to be thinking about and how they could impact their organization.
The post 7 Security Trends to Watch in the New Year appeared first on Security Boulevard.
Continue reading 7 Security Trends to Watch in the New Year

Is Your Site Protected Against Drupal Security Flaws?

This past summer saw a pair of Drupal security flaws exposed and patched. Is your website secure?

The post Is Your Site Protected Against Drupal Security Flaws? appeared first on Security Intelligence.

Continue reading Is Your Site Protected Against Drupal Security Flaws?

Space Rogue: A Security Rebel Turned Pen Tester

Two decades ago, Cris Thomas testified before Congress about various cybersecurity issues he uncovered as a white hat hacker. Today, he works as a penetration testing specialist for IBM X-Force Red.

The post Space Rogue: A Security Rebel Turned Pen Tester appeared first on Security Intelligence.

Continue reading Space Rogue: A Security Rebel Turned Pen Tester

What Are the Legalities and Implications of ‘Hacking Back’?

The concept of “hacking back” opens up a wide range of cyber defense tools to IT and security managers. Lawmakers are interested in new rules that allow for more flexibility with these activities.

The post What Are the Legalities and Implications of ‘Hacking Back’? appeared first on Security Intelligence.

Continue reading What Are the Legalities and Implications of ‘Hacking Back’?