Spirent Extends CyberFlood with Data Breach Emulation for Holistic and Hyper-Realistic Security Testing of Networks and Devices August 6, 2018 Hugh Taylor Off Industry News, First Technology to Fully Assess Data Breach Readiness and Provide Automated Purple Team Testing BLACK...
Indentive Prioritizes Consumer Security for Its State-of-the-Art IoT Platform August 6, 2018 Hugh Taylor Off Industry News, Security partner Irdeto to provide advanced Cloakware protection and anti-hacking for Indentive’s home IoT gateway...
The Recent Salesforce.com Incident and the Potential of Customer-Controlled Encryption August 6, 2018 Hugh Taylor Off Articles and Opinion, By Anthony James Salesforce privately announced that data in the marketing cloud may have been...
FBI struggles to retain top cyber talent August 5, 2018 Hugh Taylor Off Cyber Policy in the News, FBI struggles to retain top cyber talent FBI struggles to retain top cyber talent The...
The New National Risk Management Center: What’s Good. What’s Still Needed August 5, 2018 Hugh Taylor Off Articles and Opinion, Featured, Homeland Security secretary Kirstjen Nielsen announced the formation of a new National Risk Management Center...
News & Comment: Massive Coinhive Cryptojacking Campaign Touches Over 200,000 MikroTik Routers August 5, 2018 Hugh Taylor Off Cyber Policy in the News, Security researchers have unearthed a massive cryptojacking campaign that targets MikroTik routers and changes their...
News & Comment: Malicious Android apps infected with Windows keyloggers pulled from Google Play | ZDNet August 5, 2018 Hugh Taylor Off Cyber Policy in the News, Malicious Android apps infected with Windows keyloggers pulled from Google Play | ZDNet Google pulled...
Hackers breached US electric utilities: analysts August 2, 2018 Hugh Taylor Off Cyber Policy in the News, Hackers breached US electric utilities: analysts BY MORGAN CHALFANT - 08/02/18 06:00 AM EDT From THE HILL Security...
New open source effort: Legal code to make reporting security bugs safer August 2, 2018 Hugh Taylor Off Cyber Policy in the News, New open source effort: Legal code to make reporting security bugs safer New open source...
All Ahead Full… Bureaucracy: The DoD’s New “Do Not Buy” Software List August 2, 2018 Hugh Taylor Off Articles and Opinion, Featured, Another day, another head scratcher from the DoD regarding cyber security policies. BleepingComputer.com reported on...