Is there a way to perform penetration testing on traffic coming into a specified port?

All pen testing applications I’ve been able to find so far seems to rely upon “hooking up” to a browser. The problem we have is that our automation tests simulate the browser since it’s only executing REST calls and we peel o… Continue reading Is there a way to perform penetration testing on traffic coming into a specified port?

5G Security in an API-Driven Economy

Over the last six years, solution architects have been designing the transformation of Service Provider’s networks to significantly reduce the timing of service and feature deployment lifecycles, standardizing on real-time service provisioning, … Continue reading 5G Security in an API-Driven Economy

IoT Complexity Creating New Hacker Opportunities

The internet of things (IoT) is not a glimpse into a high-tech future. It’s already here, changing the way we live and work forever. Gartner predicts that more than 14 billion connected “things” will be in use this year, rising to 25 billion in two ye… Continue reading IoT Complexity Creating New Hacker Opportunities

Wandel Weaponizes Waste with Lego and a Raspberry Pi

Before 3D printers, there was LEGO. And the little bricks are still useful for putting something together on the quick. Proof is YouTuber [Matthias Wandel]’s awesome bottle cap shooter build that uses rudimentary DIY computer vision to track you and then launch a barrage of plastic pieces at you.

This …read more

Continue reading Wandel Weaponizes Waste with Lego and a Raspberry Pi

Set Expectations and Boundaries With Your Security Program to Minimize Risk

Good communication, clear expectations and enforced boundaries are all key to the success of your security program.

The post Set Expectations and Boundaries With Your Security Program to Minimize Risk appeared first on Security Intelligence.

Continue reading Set Expectations and Boundaries With Your Security Program to Minimize Risk

How IBM X-Force IRIS Prepared for the Ukraine Election

More than a month before the first round of the Ukraine election in March, we decided that we couldn’t afford to sit on our heels until an attack was launched.

The post How IBM X-Force IRIS Prepared for the Ukraine Election appeared first on Security Intelligence.

Continue reading How IBM X-Force IRIS Prepared for the Ukraine Election

Most IT Shops Have Latent Cyberthreats in Their Backups

Traditional solutions aren’t stopping cyberthreats from compromising critical network systems It’s alarming but true: Your organization is under assault. Cybercriminals have their sights set on your IT systems, and no matter what steps you take to pro… Continue reading Most IT Shops Have Latent Cyberthreats in Their Backups

Threat Modeling: Protecting Security Infrastructures in 2019

A pressing challenge throughout 2019 is cybersecurity professionals must manage industry shifts as they protect security infrastructures. These industry trends and issues are compounded by a lack of visibility into the location and security of data inv… Continue reading Threat Modeling: Protecting Security Infrastructures in 2019

As IT security automation increases, so does the need for highly skilled staff

The adoption of automation for IT security functions is on the rise across the US, UK and APAC, the latest DomainTools/Ponemon report has shown. The report, which is based on answers from over 1,400 IT and IT security practitioners who participate in a… Continue reading As IT security automation increases, so does the need for highly skilled staff