Avoid the siren song of big data and collect only what you need. This is the big takeaway from a 200-million record direct marketing list.
Stories by J.M. Porup
Mimikatz is a leading post-exploitation tool that dumps passwords from memory, as well as hashes, PINs and Kerberos tickets.
The Doomsday Clock, once a ritual feature of the Cold War, warns that cybersecurity issues like IoT and cyber-enabled information warfare endanger humanity.
Letting old domain names expire might save a few bucks a year, but lets attackers register your old domain and pretend to be you.
Deepfakes swap celebrities' faces into porn videos and put words in politicians' mouths, but they could do a lot worse.
Shiny buttons that go "ping!" considered harmful.
You need to apply Meltdown and Spectre patches to pretty much everything in your enterprise. And you need to start now. We help you prioritize.
Android and iOS devices are vulnerable to the latest hardware security flaw, and not all are easily patched. The good news: Exploits are hard (maybe) and so far none are known.
AWS's new GuardDuty and Macie offerings unleash the power of machine learning to secure your data. Are they right for your enterprise?