DNS over HTTPS misuse or abuse: How to stay secure

Firefox and Chrome have recently begun supporting external DNS resolvers in the cloud. The use of these DNS services bypasses controls that enterprise IT organizations put in place to prevent end users from visiting unauthorized Internet destinations. … Continue reading DNS over HTTPS misuse or abuse: How to stay secure

What is open threat intelligence and what is driving it?

In this podcast recorded at RSA Conference 2020, Todd Weller, Chief Strategy Officer at Bandura Cyber, discusses the modern threat intelligence landscape and the company’s platform. The Bandura Cyber Threat Intelligence Protection Platform: Aggre… Continue reading What is open threat intelligence and what is driving it?

Coming (Very) Soon: DevSecOps Days Virtual Summit

Another RSA Conference is now in the books, as is the live version of our annual event, DevOps Connect: DevSecOps Days, a daylong lineup of industry experts speaking on all things Dev, Sec, Ops and variations of the three. It was highly successful in … Continue reading Coming (Very) Soon: DevSecOps Days Virtual Summit

Automate manual security, risk, and compliance processes in software development

The future of business relies on being digital – but all software deployed needs to be secure and protect privacy. Yet, responsible cybersecurity gets in the way of what any company really wants to do: innovate fast, stay ahead of the competition, and … Continue reading Automate manual security, risk, and compliance processes in software development

Corporate cybersecurity concerns and spend continue to rise, but so do breaches

More than 50 percent of security and IT leaders agree that they are very concerned about the security of corporate endpoints given the prevalence of sophisticated attack vectors like ransomware, disruptionware, phishing and more, according to a survey … Continue reading Corporate cybersecurity concerns and spend continue to rise, but so do breaches

Recycling State-Sponsored Malware for Fun and Profit

What if criminals could reuse malware written by the NSA or Iran, and repurpose it to attack their own targets?
The post Recycling State-Sponsored Malware for Fun and Profit appeared first on Security Boulevard.
Continue reading Recycling State-Sponsored Malware for Fun and Profit

Security operations and the evolving landscape of threat intelligence

In this podcast recorded at RSA Conference 2020, we’re joined by the ThreatQuotient team talking about a threat-centric approach to security operations, the evolution of threat intelligence and the issues surrounding it. Our guests are: Chris Jac… Continue reading Security operations and the evolving landscape of threat intelligence

Forrester: Keeping Smart Cities Safe From Hacks

As cities grow more connected, municipal operators must deal with new risks like ransomware, IoT hacks and more. Continue reading Forrester: Keeping Smart Cities Safe From Hacks

Exploring the impact that hybrid cloud is having on enterprise security and IT teams

While enterprises rapidly transition to the public cloud, complexity is increasing, but visibility and team sizes are decreasing while security budgets remain flat to pose a significant obstacle to preventing data breaches, according to FireMon’s… Continue reading Exploring the impact that hybrid cloud is having on enterprise security and IT teams

RSA Conference 2020: 36,000 attendees, 704 speakers and 658 exhibitors

RSA Conference concluded its 29th annual event in San Francisco last Friday. More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center last week to explore the Human Element in cybersecurity through hundreds of keynote … Continue reading RSA Conference 2020: 36,000 attendees, 704 speakers and 658 exhibitors