2018 In Review: Memcache and Drupalgeddon Attackers don’t just utilize old, unpatched vulnerabilities, they also exploit recent disclosures at impressive rates. This year we witnessed two… Daniel Smith | December 20, 2018
2018 In Review: Schools Under Attack As adoption of education technologies expanded in 2018, school networks were increasingly targeted by ransomware, data theft and denial of… Daniel Smith | December 19, 2018
Automating Cyber-Defense AI has potential to make the lives of security professionals a lot easier – but it should be approached with… Radware | December 14, 2018
Cybersecurity as a Selling Point: Retailers Take Note UK-based retailers were no strangers to data breaches in 2018. In June, Dixons Carphone announced a breach of 5.9 million… Jeff Curley | December 13, 2018
Marriott: The Case for Cybersecurity Due Diligence During M&A If ever there was a perfectly packaged case study on data breaches, it’s Marriott’s recently disclosed megabreach. Last week, the… Mike O'Malley | December 4, 2018
Hadoop YARN: An Assessment of the Attack Surface and Its Exploits Rate of Hadoop YARN exploits is slowing but still at a concerning 350,000 events per day 1065 servers are exposed… Pascal Geenens | November 15, 2018
Hacking Democracy: Vulnerable Voting Infrastructure and the Future of Election Security It’s been two years since international interference sabotaged the United States’ election security, and still the vulnerability of our voting… Mike O'Malley | November 6, 2018
It only takes 6,000 smart phones to take down our Public Emergency Response System? There are fewer scenarios which illustrate an evildoer’s heart than those designed for mass carnage. We are all familiar with… Carl Herberger | June 28, 2018
Hey there Security Professional…..How do YOU mitigate attacks? The last several months have been historic by any measure. U.S. banks and financial institutions around the world have come under… Carl Herberger | July 19, 2017
Cloud WAF: Why a Checkbox Isn’t Enough I remember when I first learned about Web application firewall technology. It seemed like magic to me: A device that… Daniel Lakier | May 10, 2017
Digital Transformation Requires a Security Rethink Over the past few years digital transformation has become a hot topic with both business and IT leaders. Organizations that… Zeus Kerravala | May 3, 2017
A fifth of millennials would rather the U.S. government see what’s on their phone than their significant other Breaches of personal data have big consequences. Ask any user of Ashley Madison. Ask executives at Sony. Ask Hillary Clinton’s… Radware | April 18, 2017