State of the Internet Security – Credential Stuffing

Credential stuffing, and the botnets behind this activity, is the primary focus of the State of the Internet Security Report, Issue 4, 2018. Credential stuffing, the use of botnets to try to login to a site with stolen or randomly…
The post State of … Continue reading State of the Internet Security – Credential Stuffing

Why Security Skills Should Be Taught, Not Hired

To alleviate the cybersecurity hiring gap, CISOs should look to tap new pools of talent in adjacent industries and help new hires develop their security skills through thorough, regular training.

The post Why Security Skills Should Be Taught, Not Hired appeared first on Security Intelligence.

Continue reading Why Security Skills Should Be Taught, Not Hired

Reflecting on the Memcached Reflection Attacks: A Wake-Up Call for Developers

The memcached vulnerability isn’t new, but attackers exploited it in late February to launch what might be the largest DDoS attack on record.

The post Reflecting on the Memcached Reflection Attacks: A Wake-Up Call for Developers appeared first on Security Intelligence.

Continue reading Reflecting on the Memcached Reflection Attacks: A Wake-Up Call for Developers

Your RSA Conference 2018 Survival Guide: Plan Ahead and Party On

To get the most out of your RSA Conference experience, plan ahead, arrive early, build time into your schedule to unwind with peers and, perhaps most importantly, stay hydrated.

The post Your RSA Conference 2018 Survival Guide: Plan Ahead and Party On appeared first on Security Intelligence.

Continue reading Your RSA Conference 2018 Survival Guide: Plan Ahead and Party On