A vulnerability in Cisco’s widely deployed IOS software that was disclosed in the recent WikiLeaks dump of CIA exploits has triggered the company to release a critical warning for its Catalyst networking customers.
The U.S. Department of Homeland Security has ordered that passengers on flights departing for the U.S from 10 airports in the Middle East and Africa will have to carry personal electronics larger than a smartphone as checked baggage,...
Every CISO knows that cloud apps are being used by employees. Some are approved apps but most are not. What every CISO doesn't know is the full extent of the actions employees are taking in those cloud apps and how those actions
Two teams of researchers managed to win the biggest bounties at this year's Pwn2Own hacking contest by escaping from the VMware Workstation virtual machine and executing code on the host operating system.
Today’s detection deficit between attackers and defenders is near an all-time high – and the gap is only getting wider. While many factors contribute to this deficit, among the top is the fragmentation of people, processes, and...
Most everyone knows that as cloud adoption increases, the maturity of cloud security must also increase. But, before investing in the latest and greatest tools, we always recommend that CISOs start by defining what outcomes are
The FBI is actively investigating Russia's attempts to influence the 2016 U.S. presidential election and possible cooperation from President Donald Trump's campaign, agency director James Comey confirmed.
It's almost four years since Edward Snowden leaked U.S. National Security Agency documents revealing the extent of the organization's surveillance of global internet traffic, but he's still making the headlines in Germany.
Many organizations are facing a reality where their security investments have been focused on-prem but their users, devices, or apps are moving off-prem. A common question we hear from CISOs is: "How do we determine when it's time to
Secusmart, the BlackBerry subsidiary that secures the German Chancellor Angela Merkel's smartphone, will roll out a version of its SecuSuite security software compatible with Samsung Electronics' Knox platform later this year.
Companies that use security products to inspect HTTPS traffic might inadvertently make their users' encrypted connections less secure and expose them to man-in-the-middle attacks, the U.S. Computer Emergency Readiness Team warns.
Gain actionable insights on how to defend your websites and APIs for the coming year's onslaught of automated threats. Join the conversation with EMA and Distil Networks as they dive into the latest Distil Networks Bad Bot Report data