Latest

Fresh from the feed

Filter by timeframe and category to zero in on the moves that matter.

(IN)SECURE Magazine Issue 42
news
(IN)SECURE Magazine Notifications RSSabout 23 hours ago

Articles in this issue include: - Six infosec tips I learned from Game of Thrones - Dissecting the newly-discovered desire for control and privacy - Incident response and failure of the "Just Fix It" attitude - How to learn information security - Who are you? The impact of security breaches on authentication - Thecus N5550 NAS Server inside and out - Report: Hack In The Box Amsterdam 2014 - Ensuring the integrity of Rostelecom’s Wi-Fi network - What inspired you to start hacking? - Beyond Heartbleed: Closing SSL implementation gaps within our own networks - Ironclad incident response - Hands-on fun at HacKid 2014 - Are you ready for the day when prevention fails? - Why privacy engineering is needed

#ai
#open_source
Score · 2.90
(IN)SECURE Magazine Issue 49
news
(IN)SECURE Magazine Notifications RSSabout 23 hours ago

Articles in this issue include: - Privacy by design: What it is and where to build it - Harnessing artificial intelligence to build an army of virtual analysts - Building and implementing an incident response program from scratch - Take it to the boardroom: Elevating the cybersecurity discussion - Cyber security control maturity: What it is, and why you should care - Have I been hacked? The indicators that suggest you have - Demanding accountability: The need for cyber liability - Adding the cloud to your rainy day plan - The slings and arrows of encryption technology

#ai
Score · 2.90
(IN)SECURE Magazine Issue 50
news
(IN)SECURE Magazine Notifications RSSabout 23 hours ago

Articles in this issue include: - Securing the future: Best practices for keeping corporate information safe during an M&A - Executive hot seat: Ron Green, Executive VP, CISO at MasterCard - 7 tips to get the absolute best price from security vendors - How CISOs can bridge the gap between their organizations’ IT and security needs - Risk management: Risks are lurking everywhere - Report: Infosecurity 2016 - Internet of Fail: How modern devices expose our lives - Executive hot seat: Sumedh Thakar, Chief Product Officer at Qualys - Security: Missing from DevOps thinking? - The life of a social engineer: Hacking the human - What 17 years as an infosec trainer have taught me

#ai
#product
#open_source
Score · 2.90
(IN)SECURE Magazine Issue 52
news
(IN)SECURE Magazine Notifications RSSabout 23 hours ago

Articles in this issue include: - SCADA cybersecurity: A long history of errors - Healthcare security: Combating advanced threats - Do nott let your security education and awareness to take the back seat - The devil is in the details: What your metadata says about you - ICS cybersecurity: Futurism vs the here and now - Will cybersecurity change with a change in administration? - Review: IS Decisions UserLock - "Build security in from the start" for app developers - Executive hot seat: Lior Frenkel, CEO at Waterfall Security Solutions - Narrowing the attack surface: A strategic approach to security - Black Friday sales and enterprise data: Compromised information on the dark web - Commonly overlooked threat vectors - Kaspersky Lab sets up a global ICS-CERT - A checklist for people who understand cyber security

#ai
Score · 2.90
(IN)SECURE Magazine Issue 53
news
(IN)SECURE Magazine Notifications RSSabout 23 hours ago

Articles in this issue include: - How to leverage the benefits of open source software in a secure way - Antivirus 2017: Security with a hint of surveillance - Evolving PKI for the Internet of Things - 7 real-world steps to security nirvana - The HTTPS interception dilemma: Pros and cons - Deception security doesnt have to be onerous or expensive - Report: BSides Ljubljana 0x7E1 - 5 spring cleaning tips for your Identity and Access Management program

#open_source
Score · 2.90
(IN)SECURE Magazine Issue 54
news
(IN)SECURE Magazine Notifications RSSabout 23 hours ago

Articles in this issue include: - The death of passwords: Cybersecurity fake news? - Breaking the secure enough mindset - Cyber hygiene: The more you know - What's an IT architect, and could you become one? - Report: Infosecurity Europe 2017 - Is your dragline dragging in security threats? - Businesses finally realize that cyber defenses must evolve - A simplified guide to PCI DSS compliance

#open_source
Score · 2.90
(IN)SECURE Magazine Issue 55
news
(IN)SECURE Magazine Notifications RSSabout 23 hours ago

Articles in this issue include: - Building a successful information security monitoring program in an age of overwhelming data - AI for cybersecurity: Promises and limitations - Report: Black Hat USA 2017 - Designing security policies to fit your organization’s needs - KPN CISO paints a greater security picture - Has healthcare misdiagnosed the cybersecurity problem? - Review: Acunetix 11 - Why end-to-end encryption is about more than just privacy - Journey to the cloud: Automated, continuous, visible - How to catch a phish

#ai
#open_source
Score · 2.90
(IN)SECURE Magazine Issue 57
news
(IN)SECURE Magazine Notifications RSSabout 23 hours ago

Articles in this issue include: - Achieving zero false positives with intelligent deception - Expected changes in IT/OT convergence and industrial security - Testing machine learning products requires a new approach - Why do we need a risk-based approach to authentication? - Healthcare organizations and the cloud: Benefits, risks, and security best practices - A deep dive into blockchain and Bitcoin

#ai
#product
Score · 2.90
(IN)SECURE Magazine Issue 59
news
(IN)SECURE Magazine Notifications RSSabout 23 hours ago

Articles in this issue include: - The importance of career pathing in the cybersecurity industryy - Securing healthcare organizations: The challenges CISOs facey - Fingerprinting HTTP anomalies to dissect malicious operationsy - How to keep cryptominers from opening up your IT container boxesy - Report: Black Hat USA 2018y - Vulnerability research and responsible disclosure: Advice from an industry veterany - Managing migration mayhem: A roadmap for successy - For the love of a good IT book: The No Starch Press storyy - Overcoming the threat of ransomware with zero-day recoveryy - Infosec and the future: Dr. Giovanni Vigna on lessons learned over 25 yearsy

#ai
#research
#open_source
Score · 2.90
(IN)SECURE Magazine Issue 60
news
(IN)SECURE Magazine Notifications RSSabout 23 hours ago

Articles in this issue include: - How to make the CFO your best cybersecurity friend - Review: Specops Password Policy - Break out of malware myopia by focusing on the fundamentals - Securing our future in the age of IoT - Blind spots and how to see them: Observability in a serverless environment - There are no real shortcuts to most security problems - Bridging the priority gap between IT and security in DevOps - Are you ready? A good incident response plan can protect your organization - Privacy laws do not understand human error: Securing unstructured data in the age of data privacy regulations - The future of OT security in critical infrastructure

Score · 2.90
(IN)SECURE Magazine Issue 62
news
(IN)SECURE Magazine Notifications RSSabout 23 hours ago

Articles in this issue include: - What's your company's risk exposure? - The modern threat landscape and expanding CISO challenges - Product showcase: Veriato Cerebral user & entity behavior analytics software - Building a modern data registry: Go beyond data classification - What happened to trust and transparency in cybersecurity? - Prioritising risks in a climate of geopolitical threats - An intelligence-driven approach to cyber threats - Is curiosity killing patient privacy? Combatting insider threats in the healthcare contact center - Protecting applications against DFA attacks - The SEC demands better disclosure for cybersecurity incidents and threats

#ai
#product
Score · 2.90
(IN)SECURE Magazine Issue 63
news
(IN)SECURE Magazine Notifications RSSabout 23 hours ago

Articles in this issue include: - Identifying evasive threats hiding inside the network - Inside the NIST team working to make cybersecurity more user-friendly - Report: Black Hat USA 2019 - Healthcare blind spot: Unmanaged IoT and medical devices - What the education industry must do to protect itself from cyber attacks - Solving security problems: Security advice for those with limited resources - Review: Specops uReset - True passwordless authentication is still quite a while away - Six criteria for choosing the right security orchestration vendor - Ensuring supply chain security: 5 IT strategies for choosing vendors wisely - Have you thought about the often-overlooked mobile app threat?

#ai
#open_source
Score · 2.90
(IN)SECURE Magazine Issue 64
news
(IN)SECURE Magazine Notifications RSSabout 23 hours ago

Articles in this issue include: - Could audio warnings augment your ability to fight off cyberattacks? - Your supplier’s BEC problem is your BEC problem - Product Showcase: SpyCloud Active Directory Guardian - Unmask cybercriminals through identity attribution - Phishing attacks are a complex problem that requires layered solutions - Winning the security fight: Tips for organizations and CISOs - Want to build a SOC? Here is what you need to know beforehand - Product showcase: Alsid for AD - When is the right time to red team? - IoT is an ecosystem, as secure as its weakest link

#product
Score · 2.90
(IN)SECURE Magazine Issue 65
news
(IN)SECURE Magazine Notifications RSSabout 23 hours ago

Articles in this issue include: - A case for establishing a common weakness enumeration for hardware security - Things to keep in mind when raising capital for your cybersecurity venture - Burner phones are an eavesdropping risk for international travelers - Hardware hacks: The next generation of cybercrime - California’s IoT cybersecurity bill: What it gets right and wrong - 7 signs your cybersecurity is doomed to fail in 2020 - How to test employee cyber competence through pentesting - Smart cities are on the rise: What are the dangers? - Modern security product certification best practices - Why outsourcing your DPO is an effective insurance policy

#ai
#product
Score · 2.90
(IN)SECURE Magazine Issue 66
news
(IN)SECURE Magazine Notifications RSSabout 23 hours ago

Articles in this issue include: - Let us be realistic about our expectations of AI - Full-time bug hunting: Pros and cons of an emerging career - Crowdsourced pentesting is not without its issues - Changing the mindset of the CISO: From enforcer to enabler - Review: Specops Key Recovery - Is the future of information security and tech conferences virtual? - Cybersecurity is a board level issue: 3 CISOs tell why - The top four Office 365 security pain points - On my mind: Transitioning to third party cloud services

#ai
Score · 2.90
(IN)SECURE Magazine Issue 68
news
(IN)SECURE Magazine Notifications RSSabout 23 hours ago

Articles in this issue include: - Physical cyber threats: What do criminals leave when they break in? - Review: Group-IB Fraud Hunting Platform - The transportation sector needs a standards-driven, industry-wide approach to cybersecurity - Tips for boosting the “Sec” part of DevSecOps - When it comes to vulnerability triage, ditch CVSS and prioritize exploitability - Homomorphic encryption: Myths and misconceptions - How to motivate employees to take cybersecurity seriously - Enable secure remote workspaces without trashing your entire IT infrastructure - Protecting productivity within the disappearing perimeter - Closing the data divide: How to create harmony among data scientists and privacy advocates - Database encryption: Protecting the crown jewels - Can we put a stop to cyber harassment? - Preparing for the CMMC onslaught - For SOC teams, the analytics and automation hype is real - Three ways MITRE ATT&CK can improve your organizational security

#product
Score · 2.90
(IN)SECURE Magazine Issue 69
news
(IN)SECURE Magazine Notifications RSSabout 23 hours ago

Articles in this issue include: - Why threat hunting is obsolete without context - Review: Group-IB Threat Hunting Framework - Navigating the waters of maritime cybersecurity - Defending against Windows RDP attacks - The evolution of the modern CISO - Understanding the cloud shared responsibility model - Why is patch management so difficult to master? - Preventing security issues from destroying the promise of IoT - Reformulating the cyber skills shortage - Cybersecurity industry analysis: Another recurring vulnerability we must correct - For CISOs and artificial intelligence to evolve, trust is a must - Quantum computing is imminent, and enterprises need crypto agility now - When the adversarial view of the attack surface is missing, digital transformation becomes riskier

#ai
Score · 2.90
(IN)SECURE Magazine Issue 70
news
(IN)SECURE Magazine Notifications RSSabout 23 hours ago

Articles in this issue include: - How to develop a skilled cybersecurity team - Securing your WordPress website against ransomware attacks - The warning signs of burnout and how to deal with it - How to prevent corporate credentials ending up on the dark web - Risky business: Steps for building an effective GRC program - ​A ​remedial approach to destructive IoT hacks - Zero trust: Bringing security up to speed for the “work-from-anywhere” age - What is the HIPAA Security Rule? Three safeguards to have in place - Why automated pentesting won’t fix the cybersecurity skills gap - What are the post-pandemic security concerns for IT pros and their organizations - Vulnerability management is facing three core problems: Here’s how to solve them - How building a world class SOC can alleviate security team burnout - Top tips for preventing SQL injection attacks

#ai
Score · 2.90
(IN)SECURE Magazine Issue 72
news
(IN)SECURE Magazine Notifications RSSabout 23 hours ago

Articles in this issue include: - Review: Hornetsecurity 365 Total Protection Enterprise Backup - 7 threat detection challenges CISOs face and what they can do about it - How to set up a powerful insider threat program - Top 5 security analytics to measure - How to avoid security blind spots when logging and monitoring - Photo gallery: Cyber Week 2022 - Review: Enzoic for Active Directory - An offensive mindset is crucial for effective cyber defense - The SaaS-to-SaaS supply chain is a wild, wild mess - How the blurring of the supply chain opens your doors to attackers—and how you can close them

#ai
Score · 2.90
Becoming an AI-detective is a job I never wanted and wish I could quit | Samantha Floreani
news
The Guardianabout 23 hours ago

My social media feed is now a hellish stream of puerile AI slop. Am I stubborn to want to hang on to reality? Recently, a friend sent me a video of a man dressed as a pickle. Following a high-octane car chase, the pickle flung himself out of the car and flailed down the highway. It was stupid and we laughed. But it also wasn’t real. When I pointed out to my friend that the video was AI-generated, she was taken by surprise, noting she’s usually pretty good at spotting them. She was also frustrated: “I hate having to be on the constant lookout for AI trash,” she lamented in the chat. And I feel that. Becoming an AI detective is a job I never wanted and wish I could quit. Continue reading...

#ai
Score · 3.00
Page 1 of 98