Enemy Unknown: Handling Customised Targeted Attacks

Detecting and preventing threats in real-time
Computer security products are designed to detect and protect against threats such as computer viruses, other malware and the actions of hackers.
A common approach is to identify existing threats and to cre… Continue reading Enemy Unknown: Handling Customised Targeted Attacks

Assessing next-generation protection

Malware scanning is not enough. You have to hack, too.
Latest report now online.
The amount of choice when trialling or buying endpoint security
is at an all-time high. It has been 36 years since ‘anti-virus’ first appeared
and, in the last five years,… Continue reading Assessing next-generation protection

An Apple a Day Won’t Improve Your Security Hygiene, But a Cyber Doctor Might

Internal assessments and audits are necessary, but they have their limitations. Some outside assistance could help improve your security hygiene and inoculate you from the nastiest of cyber bugs.

The post An Apple a Day Won’t Improve Your Security Hygiene, But a Cyber Doctor Might appeared first on Security Intelligence.

Continue reading An Apple a Day Won’t Improve Your Security Hygiene, But a Cyber Doctor Might

When Combating Emerging Social Media Attacks, Don’t Try to Swim Against the Current

The lure of social media is too much to fight against. Instead of pushing back, we need to work with what we’ve got and do our best to educate employees about potential social media attacks.

The post When Combating Emerging Social Media Attacks, Don’t Try to Swim Against the Current appeared first on Security Intelligence.

Continue reading When Combating Emerging Social Media Attacks, Don’t Try to Swim Against the Current

Should you trust that Chrome extension? Use CRXcavator to decide

Duo Security has released CRXcavator, a tool that can help end users and enterprises make an informed decision about installing a specific Chrome extension. About CRXcavator CRXcavator was created as an internal tool by Duo’s Corporate Security Enginee… Continue reading Should you trust that Chrome extension? Use CRXcavator to decide

The System Development Life Cycle: A Phased Approach to Application Security

By completing the phases of the system development life cycle (SDLC), security teams can integrate processes and technologies into the development process and improve application security.

The post The System Development Life Cycle: A Phased Approach to Application Security appeared first on Security Intelligence.

Continue reading The System Development Life Cycle: A Phased Approach to Application Security

New Year, New Risks: 3 Application Security Resolutions You Should Adopt in 2019

To ring in the new year, application security teams should resolve to implement more security into the development process, prioritize consumer trust and pay more attention to false negatives.

The post New Year, New Risks: 3 Application Security Resolutions You Should Adopt in 2019 appeared first on Security Intelligence.

Continue reading New Year, New Risks: 3 Application Security Resolutions You Should Adopt in 2019

How well do email security gateways protect against targeted attacks?

Email security test explores how and when services detect and stop threats.
Latest report now online.
This new email protection test shows a wide variation in the abilities of the services that we have assessed.
You might see the figures as being disap… Continue reading How well do email security gateways protect against targeted attacks?

How Dimitry Snezhkov Balances the Yin and Yang of Penetration Testing

Dimitry Snezhkov didn’t touch a computer until he was 18. Now he spends his days penetration testing to uncover security gaps and his nights meditating on the balance of life.

The post How Dimitry Snezhkov Balances the Yin and Yang of Penetration Testing appeared first on Security Intelligence.

Continue reading How Dimitry Snezhkov Balances the Yin and Yang of Penetration Testing