Is It Ethical To Buy Breached Data?

Research that’s done on malicious breaches of data presents a unique conundrum for the security professionals who are doing the investigating: should access to sets of breached raw data become available to public users and, if so, how? In light … Continue reading Is It Ethical To Buy Breached Data?

Exposed Hacking Training Videos Provide Insight Into Hacking Ops 

A state-sponsored hacking group linked to Iran has been caught red-handed, demonstrating how to break into email accounts and steal sensitive data. The group accidentally exposed one of its servers, which gave researchers at IBM’s X-Force Incident Res… Continue reading Exposed Hacking Training Videos Provide Insight Into Hacking Ops 

How To Improve Asset Management and Security

The future of asset management requires organizations invest in digitization, which has the added benefit of improving security You would be amazed at how many organizations still use archaic technologies to keep track of their workloads and vital pie… Continue reading How To Improve Asset Management and Security

Eye on the End User: Application Layer Security

The application layer is where users interact with your apps, so its security should be paramount. Here are a few considerations Securing applications can be a struggle at the best of times. Today, developers need to ensure that every level of their a… Continue reading Eye on the End User: Application Layer Security

Cloud Security: 5 Serious Emerging Cloud Computing Threats to Avoid

Data breaches that resulted from cloud misconfigurations cost businesses nearly $3.18 trillion in 2019, according to DivvyCloud — here’s what to know to protect your business The Covid-19 pandemic is…
The post Cloud Security: 5 Serious E… Continue reading Cloud Security: 5 Serious Emerging Cloud Computing Threats to Avoid

Eliminate Threats to Your Domain with a Registry Lock

DNS attacks are up 34%, according to IDC’s annual threat report. Here’s what to know about the growing need for domain safety. In 2019, several leading security organizations, including corporations…
The post Eliminate Threats to Your Do… Continue reading Eliminate Threats to Your Domain with a Registry Lock

Post Quantum Cryptography: Data Security in a Post-Quantum World

Just because quantum computing is a few years away doesn’t mean that you should avoid thinking about how to deal with this emerging threat now with quantum resistant algorithms Every…
The post Post Quantum Cryptography: Data Security in a Post… Continue reading Post Quantum Cryptography: Data Security in a Post-Quantum World