Threat Research Report: The State of Cryptomining
A fantastic detailed write-up of the State of Cryptomining. – JJM
A fantastic detailed write-up of the State of Cryptomining. – JJM
With so many people now being asked to work-from-home as part of the evolving COVAD-19 precautions, I figured it was worthwhile to put together a few tried-and-true practices to keep you productive and sane while spending an unexpected few weeks in the home office.
{JJM} I’ve been beating the drum about this for a while. As an industry, we need to consider how long it takes for us to find/replace the mountious number of …
{JJM}There are strong cases to be made that by empowering developers to scan their code as often as they want, the number of vulnerabilites drops significantly.
{JJM} This is a great write-up on why we need to be concerned with quantum computing/cryptography NOW, regardless of what NIST recommends.
One of the most important parts of a web application is the authentication mechanism, which secures the site and also creates boundaries for each user account. However, during my years …
Experts from Nokia, iboss and Sectigo talk 5G mobile security for internet of things (IoT) devices in this webinar YouTube video (transcript included).
Thanks to Black Hat for publishing the Black Hat 2019 tremendous conference videos on their YouTube Channel Permalink The post Black Hat USA 2019, Rebecca Lynch ‘s ‘Woke Hiring Won’t …
Spear phishing is the number one cyber-threat to organizations in the European Union, according to the European Cybercrime Centre (EC3), a group of cybersecurity experts set up by Europol to …
The end of the year is coming, and it’s time for security decision-makers to make plans for 2020 and get management approval. Typically, this entails making a solid case regarding …
How tying and measuring security investments to business impacts can elevate executives’ understanding and commitment to cyber-risk reduction.
The bug is identified as CVE-2019-18408, a high-priority ‘use-after-free’ bug when dealing with a failed archive.
Mission-critical systems can’t just be switched off to apply security updates — so patching can take weeks if not years.
There have been a lot of studies this year examining the cybersecurity workforce and skills shortage, but the (ISC)2 Cybersecurity Workforce Study 2019 has taken a different approach to analyzing …
Advanced Persistent Threats groups were once considered a problem that concerns Fortune 100 companies only. However, the threat landscape of the recent years tells otherwise—in fact, every organization, regardless of …
Not all managed security service providers are created equal. These questions can reveal whether you are hiring the right people to help secure your business.
A few tried-and-true practices to keep you productive and sane while spending an unexpected few weeks in the home office.