API Evangelist Partners

These are my partners who invest in API Evangelist each month, helping underwrite my research, and making sure I'm able to keep monitoring the API space as I do.


3scale makes it easy to open, secure, distribute, control and monetize APIs, that is built with performance, customer control and excellent time-to-value in mind.


Efficiently turn APIs into real-time experiences, using a proxy-as-a-service that turns any request-answer API into real-time event-driven data feeds without a line of server-side code.

API Security News

These are the news items I've curated in my monitoring of the API space that have some relevance to the API security conversation and I wanted to include in my research. I'm using all of these links to better understand how the space is security (or not) their API infrastructure, and addressing the biggest problem we face online today.

Title Source Visit
ISC Releases Security Advisories for DHCP, BIND (2018-01-17) www.us-cert.gov
Let's Encrypt Flaw Allowed Hackers to Hijack Certificates (2018-01-15) www.infosecurity-magazine.com
DNS (2018-01-12) medium.com
Security camera Canary adds package detection and a new skill for Amazon Alexa (2018-01-08) techcrunch.com
I’m harvesting credit card numbers and passwords from your site. Here’s how. (2018-01-06) medium.com
SparkPost Tools (2018-01-04) tools.sparkpost.com
VueJS Route Security and Authentication (2018-01-04) medium.com
Harnessing the Power of Network Meta Data: Finding Malware (2018-01-03) blogs.cisco.com
The Argument for Risk (2018-01-02) www.darkreading.com
OWASP Dependency (2017-12-29) dzone.com
2017’s biggest cybersecurity facepalms (2017-12-29) www.engadget.com
Automating API security testing with a DevSecOps approach (2017-12-29) sdtimes.com
Why Every Business Needs Two (2017-12-29) auth0.com
Rest Assured — Ways to Avoid Security Issues When Using RESTful (2017-12-28) medium.com
The impact on network security through encrypted protocols – QUIC (2017-12-27) blogs.cisco.com
Five RESTFul Web Design Patterns Implemented in ASP.NET Core 2.0 Part 5: Security (2017-12-23) medium.com
Azure Security Audits With Pester (2017-12-22) dzone.com
Web Services Security: Providers and Consumers of APIs (2017-12-21) medium.com
Twitter Expands 2FA Options to Third (2017-12-21) www.infosecurity-magazine.com
Why Network Visibility Is Critical to Removing Security Blind Spots (2017-12-21) www.darkreading.com
Machine Learning for Cybercriminals, Part 2 (2017-12-21) dzone.com
Cron (2017-12-21) www.infosecurity-magazine.com
2018 Security Predictions (Part 6) (2017-12-20) dzone.com
Twitter now supports 2 (2017-12-20) thenextweb.com
Twitter adds more verification options for two (2017-12-20) www.theverge.com
Twitter adds support for app (2017-12-20) techcrunch.com
TelegramRAT Scurries Around Defenses Via the Cloud (2017-12-20) www.infosecurity-magazine.com
4 Reasons to Make API Security Your Business’s New Year’s Resolution (2017-12-20) medium.com
IAM Attacks, IoT Hubs and API Security Spend, Oh My! We Present Our 2018 Predictions (2017-12-20) www.forumsys.com
Facebook lists all the security emails it sends to fight phishing (2017-12-20) www.engadget.com
Two Additional Ways to Improve API Security for Fintech startups (2017-12-20) www.finextra.com
Ooma acquires AI (2017-12-20) techcrunch.com
2018 Security Predictions (Part 5) (2017-12-19) dzone.com
Industry experts tell you how to (2017-12-19) medium.com
The future of source code security is consensus (2017-12-19) techcrunch.com
The 2017 OWASP Top 10 Update (2017-12-19) dzone.com
Data Breach Briefing: The Run (2017-12-19) www.bricata.com
Hackers take control of security firm’s domain, steal secret data (2017-12-18) arstechnica.com
Security IQ:  How to Survive the Holiday Phishing Season (2017-12-18) www.carbonblack.com
Hack the Air Force 2.0 Bug Bounty Kicks Off with $10K Payout (2017-12-18) www.infosecurity-magazine.com
Survey Shows Many Americans Are Cyber (2017-12-18) www.infosecurity-magazine.com
How does a WAF mitigate vulnerabilities? (2017-12-18) f5.com
US Government Pays $10,650 Bug Bounty in 'Hack the Air Force' Event (2017-12-18) www.darkreading.com
User ‘Gross Negligence’ Leaves Hundreds of Lexmark Printers Open to Attack (2017-12-18) kasperskycontenthub.com
2018 Security Predictions (Part 4) (2017-12-18) dzone.com
Toughen up Soft Certificate Pinning with Approov (2017-12-18) www.approov.io
Analyze Database Audit Logs for Security and Compliance Using Amazon Redshift Spectrum (2017-12-17) aws.amazon.com
Why Your IAM's Definition Of “User” Could Be Costing You Millions (2017-12-15) auth0.com
Get Developers and Your AppSec Program Ready for DevSecOps in 2018 (2017-12-13) dzone.com
2 Million Fake Net Neutrality Comments Stole American Identities (2017-12-13) www.darkreading.com
Security updates for Jenkins core (2017-12-13) jenkins.io
Bitfinex Restores Services After Massive DDoS Attack (2017-12-13) btcmanager.com
Rest in Peace, ICO Bounty Programs (2017-12-13) medium.com
Healthcare Faces Poor Cybersecurity Prognosis (2017-12-13) www.darkreading.com
Cyberattacks are becoming big opportunities for some small businesses (2017-12-13) www.washingtonpost.com
Security Compliance: The Less You Spend the More You Pay (2017-12-12) www.darkreading.com
AWS re:Invent Announces New Security Service: Amazon GuardDuty (2017-12-12) dzone.com
Securing Medical IoT Devices (2017-12-12) nordicapis.com
2018 Security Predictions (Part 2) (2017-12-11) dzone.com
Staying Secure on Heroku with the Snyk Add (2017-12-11) snyk.io
Necurs Botnet Returns to Top 10 Malware List (2017-12-11) www.infosecurity-magazine.com
The Dangers of a 'Trust and Forget' Approach to Data Security (2017-12-08) dzone.com
Cybercrime Now Driven by Four Distinct Groups (2017-12-08) www.infosecurity-magazine.com
Is Anything Secure Anymore? (2017-12-07) medium.com
What is spear phishing? (2017-12-07) usa.kaspersky.com
3 Application Security Predictions for 2018 (2017-12-07) medium.com
Man (2017-12-07) www.darkreading.com
Uber used bug bounty program to launder blackmail payment to hacker (2017-12-07) arstechnica.com
Why Third (2017-12-07) www.darkreading.com
Can Penetration Tests Actually Help Overcome the Cybersecurity Crisis? (2017-12-06) dzone.com
NIST Releases New Cybersecurity Framework Draft (2017-12-06) www.darkreading.com
Why Cybersecurity Must Be an International Effort (2017-12-06) www.darkreading.com
cybersecurity (2017-12-06) www.nist.gov
Connected Rental Cars Leak Personal Driver Data (2017-12-06) www.infosecurity-magazine.com
Majority of Retailers Lack Fully (2017-12-06) www.infosecurity-magazine.com
AppSec in Review Podcast: How Developers Respond to Security Findings (2017-12-06) dzone.com
Enabling Two (2017-12-05) dzone.com
Study: Simulated Attacks Uncover Real (2017-12-05) www.darkreading.com
API and Security Trends for 2018 (2017-12-05) www.bankinfosecurity.com
Coming Full Circle on IoT (In)Security (2017-12-05) www.forumsys.com
Next steps to securing APIs and microservices (2017-12-05) www.ca.com
How to Improve OAuth Security With HMAC Validation (2017-12-05) dzone.com
Improving Threat Detection in a Big Data World (2017-12-04) databricks.com
Docker Security: It's a Layered Approach (2017-12-04) dzone.com
Most Consumers Aware of Connected Car Security Issues (2017-12-04) www.infosecurity-magazine.com
Elastic Beam (2017-12-04) medium.com
Security Roundup: Cloud Security (2017-12-04) dzone.com
Improving Threat Detection in a Big Data World (2017-12-04) databricks.com
The Rising Dangers of Unsecured IoT Technology (2017-12-04) www.darkreading.com
Redefining perimeter network security: The future is a hybrid (2017-12-04) www.csoonline.com
Introducing a New Addition to Cisco’s Security Impact Rating (2017-12-04) blogs.cisco.com
Morrisons Found Liable for Insider Data Leak (2017-12-04) www.infosecurity-magazine.com
Is 2018 the Year for Security With Deception? (2017-12-04) dzone.com
How Bug Bounties and Crowd Sourced Security Changed The World for The Better (2017-12-04) medium.com
GitHub (2017-12-03) github.com
AWS Debuts Amazon GuardDuty for Cloud Threat Detection (2017-12-03) en.brinkwire.com
GitHub (2017-12-02) github.com
Developers Care About Security, but the Infosec Team Cares More (2017-12-02) thenewstack.io
Three Uber security managers reportedly resigned today (2017-12-01) techcrunch.com
IT Staff Blame Themselves for Security Risk (2017-12-01) www.infosecurity-magazine.com
Deception: Why It's Not Just Another Honeypot (2017-12-01) www.darkreading.com
'Blocking and Tackling' in the New Age of Security (2017-12-01) www.darkreading.com
The Critical Difference Between Vulnerabilities Equities & Threat Equities (2017-11-30) www.darkreading.com
OWASP Top 10 2017 is Here! (2017-11-30) blog.stackpath.com
AWS Introduces Continuous Threat Monitoring, Detection Service (2017-11-30) blog.executivebiz.com
DISA Seeks Feedback on Business Case Analysis for Cyber Threat Indicator Sharing (2017-11-30) blog.executivebiz.com
Hyperstone – Secure fingerprint USB is made possible with controller and API software (2017-11-30) www.electropages.com
Announcing Banyan Security Mesh for Amazon's AWS Elastic Container Service (ECS) (2017-11-30) www.prweb.com
Protecting Against S3 Cloud Storage Leaks With a New Approach (2017-11-29) duo.com
First US Federal CISO Shares Security Lessons Learned (2017-11-29) www.darkreading.com
Only a Quarter of Insider Threats Are Hostile (2017-11-29) www.infosecurity-magazine.com
Second (2017-11-29) www.infosecurity-magazine.com
Amazon is previewing an IOT security service (2017-11-29) techcrunch.com
AWS Debuts Amazon GuardDuty for Cloud Threat Detection (2017-11-29) www.eweek.com
Improving Cybersecurity in Healthcare Part II: Control (2017-11-29) blogs.cisco.com
Why Security Depends on Usability (2017-11-29) www.darkreading.com
Dissecting a Breach: The Process of Incident Response (2017-11-29) blogs.cisco.com
AWS launches GuardDuty, its new intelligent threat detection service (2017-11-28) techcrunch.com
Git Some Security: Locking Down GitHub Hygiene (2017-11-28) www.darkreading.com
Secure fingerprint USB encrypts stored data (2017-11-28) www.eenewseurope.com
Breach Recovery Checklist For You And Your Company (2017-11-28) www.bmc.com
Hackers hunting for open cryptocurrency wallets, scanning computers worldwide (2017-11-28) newsline.com
Developers Can Do More to Up Their Security Game: Report (2017-11-27) www.darkreading.com
Uber's Security Slip (2017-11-27) www.darkreading.com
Federal Websites Still Lack Basic Security (2017-11-27) www.infosecurity-magazine.com
Security business Barracuda Networks acquired for $1.6 billion (2017-11-27) techcrunch.com
Single Sign On: Feature or Threat? (2017-11-27) jask.ai
8 Low or No (2017-11-27) www.darkreading.com
Security Testing With JMeter (2017-11-27) dzone.com
AWS Shared Responsibility Model: Cloud Security (2017-11-24) dzone.com
Once you have a student's name, birthday and SSN, the US Department of Education will give you EVERYTHING else (2017-11-24) boingboing.net
Name+DOB+SSN=FAFSA Data Gold Mine (2017-11-24) krebsonsecurity.com
Move API Security Testing Into Dev/QA as an Automated Part of the CI Process (2017-11-23) dzone.com
Defenses vs. Injection Attacks (2017-11-23) dzone.com
The 7 Key Functions of a Modern Intrusion Detection Platform (2017-11-23) dzone.com
ICO: UK Users Were Hit by Uber Breach (2017-11-23) www.infosecurity-magazine.com
3 Pillars of Cyberthreat Intelligence (2017-11-22) www.darkreading.com
API Security: Best practices to ensure secure API (2017-11-22) medium.com
Top Sites Expose Visitors to Breaches by Tracking Keystrokes (2017-11-22) www.infosecurity-magazine.com
New OWASP Top 10 List Includes Three New Web Vulns (2017-11-21) www.darkreading.com
DMARC Implementation Lags as Email Fraud Surges (2017-11-21) www.infosecurity-magazine.com
The Solution to IoT is Blockchain Security. (2017-11-21) medium.com
The Risk of Overconfidence in the Cybersecurity Perimeter (2017-11-21) www.bricata.com
Securing Webtasks Part 2: Using Middleware (2017-11-21) auth0.com
Researcher informs drone maker DJI about bugs, gets called a ‘hacker’ and threatened (2017-11-20) thenextweb.com
Four Years Later, We Have a New OWASP Top 10 (2017-11-20) www.bleepingcomputer.com
DJI threatens legal action after researcher reports bug (2017-11-20) www.engadget.com
DJI’s bug bounty program starts with a stumble (2017-11-20) www.theverge.com
GitHub Rolls Out Security Alerts for Developers (2017-11-20) www.infosecurity-magazine.com
DevSecOps and GDPR: Why Open Source Risk Management Has Never Been More Important (2017-11-20) dzone.com
Banks To Restrict API Access To 'Whitelisted' Fintechs (2017-11-20) paymentscompliance.com
Apache Kylin Gets Table Level ACL Management (2017-11-19) www.i-programmer.info
100% of Businesses Have Faced a Mobile Cyberattack (2017-11-17) www.infosecurity-magazine.com
Tips to Protect the DNS from Data Exfiltration (2017-11-17) www.darkreading.com
Internet of Warnings: How Smart Technology Can Threaten Your Business’s Security (2017-11-17) readwrite.com
Crooks Turn to Delivering Ransomware via RDP (2017-11-16) www.darkreading.com
CA Technologies Leverages Samsung SDS Nexsign for API Management Security (2017-11-16) mobileidworld.com
Heuristic vs Signature (2017-11-16) dzone.com
NeuVector Launches New Version of Container Firewall Security Solution (2017-11-16) www.dabcc.com
Barracuda improve public cloud services with latest cloud generation firewall capabilities (2017-11-16) wwpi.com
Barracuda Announces New Cloud Generation Firewall Capabilities (2017-11-15) markets.businessinsider.com
NSA Veterans Land $1.5 Million in Funding for Startup (2017-11-15) www.darkreading.com
Motherboard's excellent, accessible guide to internet security (2017-11-15) boingboing.net
Barracuda Announces New Cloud Generation Firewall Capabilities (2017-11-15) news.sys-con.com
5 Best Practices for Security Notifications (2017-11-15) www.sparkpost.com
Enabling Collaborative Security Through Openness (2017-11-15) blogs.cisco.com
CyberArk Automates and Simplifies Protection Against Privileged Account Exploitation (2017-11-15) www.businesswire.com
Red Hat Developer Program introduces new topic on secure programming (2017-11-15) developers.redhat.com
Microsoft Uses Neural Networks to Make Fuzz Tests Smarter (2017-11-15) www.darkreading.com
Years after regulatory crackdown, some security cameras still open to hackers (2017-11-15) www.washingtonpost.com
Cheat Sheet: Addressing OWASP Top 10 Vulnerabilities in MuleSoft APIs (2017-11-15) dzone.com
ThreatConnect Provides a Report on Healthcare and Medical Industry Threats (2017-11-14) www.threatconnect.com
Account takeover: Protect your business from this emerging threat (2017-11-14) blog.siftscience.com
Cyberattacks on small businesses continue to rise: Are you protected? (2017-11-14) blogs.cisco.com
PNC's upcoming APIFest focused on cybersecurity (2017-11-13) www.bizjournals.com
Phishing Biggest Threat to Google Account Security (2017-11-13) kasperskycontenthub.com
Securing Golang API using Json Web Token (JWT) (2017-11-13) medium.com
How Leaders Are Pursuing DevOps Securely (2017-11-12) dzone.com
Battling the Misconceptions Around Network Security Requirements (2017-11-12) dzone.com
How Distil Empowers SecOps and Devs to Stop Bots With JavaScript (2017-11-10) dzone.com
Why Common Sense Is Not so Common in Security: 20 Answers (2017-11-10) www.darkreading.com
6 Steps for Sharing Threat Intelligence (2017-11-10) www.darkreading.com
AWS Beefs Up Security Features After S3 Misconfigurations (2017-11-10) www.silicon.co.uk
How to secure ASP.Net Web APIs using authorization filters (2017-11-10) www.infoworld.com
4 Security Measures Companies Implement After a Breach (2017-11-10) auth0.com
Playbook Fridays: Have You Been Pwned? (2017-11-09) www.threatconnect.com
Hypervisors: Now a Tool to Protect against Security Blind Spots (2017-11-09) www.darkreading.com
'Goldilocks' Legislation Aims to Clean up IoT Security (2017-11-09) www.darkreading.com
IoT is Insecure, Get Over It! Say Researchers (2017-11-08) kasperskycontenthub.com
Most Orgs Agonize Over IoT Security (2017-11-08) www.infosecurity-magazine.com
For threat correlation across endpoint, network, and cloud – connect the dots (2017-11-08) blogs.cisco.com
Diving into OceanLotus: Web Crawling Data Brings Compromised Infrastructure to the Surface (2017-11-08) www.riskiq.com
Security updates for Jenkins core (2017-11-07) jenkins.io
Amazon S3 security update tries to protect admins from their own mistakes (2017-11-07) thenextweb.com
Less Than One (2017-11-07) www.darkreading.com
New tools help could help prevent Amazon S3 data leaks (2017-11-07) techcrunch.com
Best Practices for Dashboards in Cybersecurity and Threat Intelligence (2017-11-07) www.threatconnect.com
Prevention or Cure? Focusing your Cybersecurity Efforts and Investments (2017-11-06) blogs.cisco.com
Lori MacVittie of F5 Networks: Who’s in Charge of Automated Security? (2017-11-06) thenewstack.io
Cognitive Mindhacks: How Attackers Spread Disinformation Campaigns (2017-11-06) www.darkreading.com
8 Older Companies Doing New Things in Security (2017-11-06) www.darkreading.com
Delivering a Secure API layer with Open Banking (2017-11-06) summits.brighttalk.com
Stealthwatch Cloud: Securing the public cloud, without undercutting it (2017-11-06) blogs.cisco.com
How you can detect hackers in your encrypted traffic (2017-11-06) thenextweb.com
Quarter of UK Employees Have 'Purposefully Leaked Business Data' (2017-11-06) www.infosecurity-magazine.com
HIPAA’s Security Rule: The Beginner’s Guide (2017-11-06) www.bmc.com
Another misconfigured Amazon S3 server leaks data of 50,000 Australian employees (2017-11-04) www.scmagazine.com
LinkedIn’s Private Bug Bounty Program: Reducing Vulnerabilities by Leveraging Expert Crowds (2017-11-03) security.linkedin.com
Global CISOs Unprepared for Evolving Threats (2017-11-03) www.infosecurity-magazine.com
What endpoint security systems do companies need? (2017-11-03) searchnetworking.techtarget.com
4 Ways the Next Generation of Security Is Changing (2017-11-03) www.darkreading.com
Cybersecurity Pros Can’t Keep Pace with Threat Landscape (2017-11-03) www.infosecurity-magazine.com
How to Protect Yourself From Security Oversights (2017-11-03) auth0.com
Security vs. convenience? IoT requires another level of thinking about risk (2017-11-02) arstechnica.com
IoT Security Concerns Loom Even as Adoption Continues (2017-11-02) www.infosecurity-magazine.com
Announcing PCI Compliance for Heroku Shield (2017-11-02) blog.heroku.com
The State of Serverless Security — Fall/2017 (2017-11-02) medium.com
Containerization Makes Security and Compliance Instantly Easier (2017-11-02) thenewstack.io
Realizing a Multi (2017-11-02) blogs.cisco.com
End (2017-11-02) www.scmagazine.com
Extend Your Security to the Cloud with Confidence (2017-11-02) blogs.cisco.com
Operationalizing Carbon Black Response with Splunk (Part 2): Advanced Data Analysis (2017-11-02) www.redcanary.com
Facebook says security investments will affect profitability (2017-11-01) hosted.ap.org
How to Keep Your API Keys Safe (2017-11-01) skillsmatter.com
Cisco and Google give developers cloud speed & scale, coupled with enterprise (2017-10-31) blogs.cisco.com
Stop Counting Vulnerabilities & Start Measuring Risk (2017-10-31) www.darkreading.com
DNS Security Fundamentals — What is Protecting Your DNS and How? (2017-10-31) admin.dyn.com
Industrial security: Master your fear of the unknown (2017-10-30) blogs.cisco.com
Google’s reCaptcha Cracked Again (2017-10-30) kasperskycontenthub.com
Cybersecurity Isn’t Always Easy & You’re Not Alone (2017-10-30) www.carbonblack.com
Attach an IAM Role to an EC2 Instance with CloudFormation (2017-10-28) medium.com
Passwords Use Alone Still Trumps Multi (2017-10-27) www.darkreading.com
What to do in case of a global security breach (2017-10-27) usa.kaspersky.com
Two (2017-10-26) www.theverge.com
DomainTools 101: The Art of Tracking Threat Actors (2017-10-26) blog.domaintools.com
A Checklist for Securing the Internet of Things (2017-10-26) www.darkreading.com
Add new users to EC2 and give SSH Key access (2017-10-26) medium.com
How to Quickly Differentiate Between Malicious and Harmless Traffic Using the Cisco Security Packet Analyzer (2017-10-25) blogs.cisco.com
Many (2017-10-25) medium.com
How to securely store API keys (2017-10-25) medium.com
Leveraging Crowd Effectively: Bug Bounty Programs for Cybersecurity & Best Practices (2017-10-25) thegovlab.org
Blockchain will make things even harder for blackhat hackers (2017-10-25) thenextweb.com
Cisco Traffic Analysis & Encrypted Threat Analytics (2017-10-24) blogs.cisco.com
10 Steps for Stretching Your IT Security Budget (2017-10-24) www.darkreading.com
Google Play Bug Bounty Program Debuts (2017-10-23) www.darkreading.com
Google and others back Internet of Things security push (2017-10-23) www.engadget.com
Google Launches Bug Bounty Program for Apps (2017-10-23) www.infosecurity-magazine.com
Google launched a new bug bounty program to root out vulnerabilities in third (2017-10-22) www.theverge.com
US Consumers Willing to Trade eCommerce Convenience for Security (2017-10-20) www.infosecurity-magazine.com
Architecting a More Secure Future (2017-10-20) blogs.cisco.com
DOSarrest releases new API (2017-10-19) globenewswire.com
Facebook is struggling to meet the burden of securing itself, security chief says (2017-10-19) arstechnica.com
GDPR and Educating Employees on Cybersecurity (2017-10-19) www.thetechedvocate.org
Find your unprotected Amazon S3 buckets with this free tool (2017-10-19) thenextweb.com
Google Play Bounty Promises $1,000 Rewards for Flaws in Popular Apps (2017-10-19) kasperskycontenthub.com
IoT Deployment Security Top Concern for Enterprises (2017-10-19) www.darkreading.com
Is security on the verge of a fuzzing breakthrough? – Naked Security (2017-10-19) nakedsecurity.sophos.com
Business Critical Security (2017-10-19) blogs.cisco.com
Google Advanced Protection Trades Ease (2017-10-19) kasperskycontenthub.com
CISOs: Striving Toward Proactive Security Strategies (2017-10-19) www.darkreading.com
Microsoft hits back at Google’s approach to security patches (2017-10-19) www.theverge.com
Cybersecurity & Graph Technology: An Excellent Fit (2017-10-19) neo4j.com
Security Spending Goes Up as Budgets Are Slashed (2017-10-19) www.infosecurity-magazine.com
FBI Asks Businesses to Share Details About DDoS Attacks (2017-10-18) kasperskycontenthub.com
Red Canary Introduces Atomic Red Team, a New Testing Framework for Defenders (2017-10-18) www.redcanary.com
Google Rolls Out Advanced Protection for High (2017-10-17) www.infosecurity-magazine.com
DHS Mandates DMARC, HTTPS for All US Federal Agencies (2017-10-17) www.infosecurity-magazine.com
The KRACK Wi (2017-10-17) thenextweb.com
Google now offers special security program for high (2017-10-17) arstechnica.com
Google launches “strongest security” opt (2017-10-17) techcrunch.com
New Tool Debuts for Hacking Back at Hackers in Your Network (2017-10-17) www.darkreading.com
Google introduces Advanced Protection for those at high risk of targeted online attacks (2017-10-17) www.theverge.com
Google's refined Security Checkup identifies account vulnerabilities (2017-10-16) www.engadget.com
AWS WAF Now Supports Geographic Match (2017-10-16) aws.amazon.com
DHS to Require All Fed Agencies to Use DMARC, HTTPS, and STARTTLS (2017-10-16) www.darkreading.com
This Week in Programming: GitHub Will Provide Security Alerts for Code Dependencies (2017-10-14) thenewstack.io
Protect your webhooks with Laravel Shield (2017-10-13) laravel-news.com
Google Busy Removing More Malicious Chrome Extensions from Web Store (2017-10-13) kasperskycontenthub.com
Cybersecurity is Everyone’s Responsibility: 5 ways to turbo charge your security practices (2017-10-13) blogs.cisco.com
H.R.4036 (2017-10-13) www.congress.gov
Getting the Most Out of Cyber Threat Intelligence (2017-10-13) www.darkreading.com
Dangers of CSV injection (2017-10-13) flowingdata.com
Why cybersecurity in the workplace is everyone’s business (2017-10-12) blogs.cisco.com
Taking the Necessary Cybersecurity Steps Forward with Federal Government Programs (2017-10-12) blogs.cisco.com
6 Steps to Finding Honey in the OWASP (2017-10-12) www.darkreading.com
RiskIQ Research Connects Large Infrastructure Serving Fake Adobe Flash Mobile Apps (2017-10-12) www.riskiq.com
GitHub will soon warn developers of insecure dependencies (2017-10-11) techcrunch.com
Github launches new tools to say when your project’s dependencies get pwned (2017-10-11) thenextweb.com
Many Paths to Cybersecurity for Women (2017-10-11) blog.rackspace.com
Can Machine Learning Outsmart Malware? (2017-10-11) www.darkreading.com
In (2017-10-11) www.infosecurity-magazine.com
How Systematic Lying Can Improve Your Security (2017-10-11) www.darkreading.com
Security in Your DNA: Tips for Securing Your Network (2017-10-11) blogs.cisco.com
Security Tops Use Cases for Endpoint Data (2017-10-11) www.darkreading.com
Designing an Enterprise Role (2017-10-10) medium.com
Collaboration, IoT, Security & Drones: How Cisco’s Cross (2017-10-10) blogs.cisco.com
Important security updates for Jenkins core and plugins (2017-10-10) jenkins.io
Accenture left four servers of sensitive data completely unprotected (2017-10-10) www.engadget.com
Internal Accenture Data, Customer Information Exposed in Public Amazon S3 Bucket (2017-10-10) kasperskycontenthub.com
Unstructured Data: The Threat You Cannot See (2017-10-10) www.darkreading.com
Artificial Intelligence: Experts Talk Ethical, Security Concerns (2017-10-10) www.darkreading.com
Using Cloud Functions for a Managed REST API with API Key Access (2017-10-09) medium.com
37,000 Chrome users downloaded a fake Adblock Plus extension (2017-10-09) www.engadget.com
How to Quickly Automate a Response Playbook With Carbon Black (2017-10-09) www.redcanary.com
More Businesses Accidentally Exposing Cloud Services (2017-10-09) www.darkreading.com
Introducing Mythril: A framework for bug hunting on the Ethereum blockchain (2017-10-09) medium.com
Despite Publicity, Database Misconfigurations Grow Voluminous (2017-10-06) www.infosecurity-magazine.com
Password Policies Remain Archaic Across Organizations (2017-10-06) www.infosecurity-magazine.com
Security Industry Failing to Establish Trust (2017-10-06) kasperskycontenthub.com
Rise in Insider Threats Drives Shift to Training, Data (2017-10-06) www.darkreading.com
Is It Possible to Stop Modern Hackers? A Challenge for Telecom Operators. (2017-10-06) blogs.cisco.com
OAuth 2.0 Threat Landscapes – FACILELOGIN (2017-10-05) medium.facilelogin.com
Change management: Equifax highlighted the vulnerability gap between disclosure and patch (2017-10-05) www.bricata.com
Private, Public, or Hybrid? Finding the Right Fit in a Bug Bounty Program (2017-10-05) www.darkreading.com
URL Obfuscation: Still a Phisher's Phriend (2017-10-05) www.darkreading.com
SEC hack came as internal security team begged for funding (2017-10-04) arstechnica.com
What Security Teams Need to Know about the NIAC Report (2017-10-04) www.darkreading.com
“The 101” – Episode 11 – What is the Difference Between Commodity and Advanced Malware? (2017-10-04) www.carbonblack.com
Securing the Digital Institute – Deakin University: A Case Study in Cyber Security Excellence (2017-10-04) blogs.cisco.com
Cloudflare CTO Goes Inside the Cloudbleed Bug (2017-10-04) kasperskycontenthub.com
10 Reasons Your Cybersecurity Strategy Needs a Regular Checkup (2017-10-04) blog.rackspace.com
Securing Webtasks Part 1: Shared Secret Authorization (2017-10-04) auth0.com
Pulse (2017-10-03) www.infosecurity-magazine.com
70% of US Employees Lack Security and Privacy Awareness (2017-10-03) www.darkreading.com
Cisco RV340 Dual WAN VPN Security Router: Tolly Report – Most Downloaded (2017-10-02) blogs.cisco.com
Why security is the key to media production and broadcast innovation? (2017-10-02) blogs.cisco.com
UN Opens New Office to Monitor AI Development and Predict Possible Threats (2017-10-02) thegovlab.org
Threat Analysis: Don’t Forget About Kangaroo Ransomware (2017-10-02) www.carbonblack.com
Data Governance: What Are the Components to Keep Data Secure? (2017-10-02) blog.rackspace.com
Oracle announces a new automated database that can patch cybersecurity flaws itself (ORCL, AMZN) (2017-10-01) www.businessinsider.com
CSRC (2017-10-01) csrc.nist.gov
Apache Spot (2017-10-01) spot.incubator.apache.org
Google plans to upgrade two (2017-09-29) www.theverge.com
Threatpost News Wrap, September 29, 2017 (2017-09-29) kasperskycontenthub.com
ICANN Postpones Major Internet Security Update (2017-09-29) www.infosecurity-magazine.com
How Data Protection Manager (DPM) Works (2017-09-29) auth0.com
Security for Continuous Integration. (2017-09-28) www.hugeinc.com
coreos/clair: Vulnerability Static Analysis for Containers (2017-09-28) github.com
Next Generation Intrusion Prevention (2017-09-28) www.bricata.com
When it Comes to Network Security, Your Best Defense is Security Everywhere! (2017-09-27) blogs.cisco.com
7 SIEM Situations That Can Sack Security Teams (2017-09-27) www.darkreading.com
Do You Know How Secure Your Software Vendors Are? (2017-09-26) blogs.cisco.com
yeti (2017-09-26) github.com
YETI (2017-09-26) yeti-platform.github.io
How Security Metrics Fail Us & How We Fail Them (2017-09-26) www.darkreading.com
Oracle Patches Apache Struts, Reminds Users to Update Equifax Bug (2017-09-26) kasperskycontenthub.com
Securing APIs with API Gateway (2017-09-26) medium.com
Evaluating Machine Learning in Security Software (2017-09-26) thenewstack.io
Exposure of your sensitive data isn’t a bug, it’s a feature (2017-09-25) techcrunch.com
Breached Password Detection: Protect Your Users’ Data Before It’s Too Late (2017-09-25) auth0.com
Chris Vickery on Amazon S3 Data Leaks (2017-09-25) kasperskycontenthub.com
Cloudflare now offers unmetered DDoS attack mitigation (2017-09-25) techcrunch.com
PassGAN: Password Cracking Using Machine Learning (2017-09-25) www.darkreading.com
Forum Sentry API Security Gateway protects all customers against Apache OptionsBleed (2017-09-22) www.forumsys.com
1.4 Million New Phishing Sites Launched Each Month (2017-09-22) www.darkreading.com
Why network security is like a beehive (2017-09-22) blogs.cisco.com
Incident Response Fundamentals – Communication (2017-09-22) blogs.cisco.com
Launching the State of Open Source Security Survey (2017-09-20) snyk.io
Get Serious about IoT Security (2017-09-20) www.darkreading.com
CryptoMove protects sensitive data by fragmenting it and moving it around (2017-09-19) techcrunch.com
Infrared signals in surveillance cameras let malware jump network air gaps (2017-09-19) arstechnica.com
Facial Recognition Rated Far More Ineffective Than Touch ID by Hackers (2017-09-19) www.infosecurity-magazine.com
Cybersecurity Tools in Financial Services have become Part of the Problem (2017-09-19) www.bricata.com
Threat Stack snares $45 million investment as spotlight shines brightly on security (2017-09-19) techcrunch.com
Resources for an information security budget discussion (2017-09-19) usa.kaspersky.com
How I Bypassed Open Redirection Tokens Using HTTP Parameter Pollution. (2017-09-18) medium.com
Rogue WordPress Plugin Allowed Spam Injection (2017-09-15) kasperskycontenthub.com
Security Orchestration & Automation: Parsing the Options (2017-09-15) www.darkreading.com
Why I’m Suing the FCC (2017-09-15) medium.com
Attacking Developers Using 'Shadow Containers' (2017-09-15) www.darkreading.com
3 Things to Know About AWS S3 Security to Stay Out of the Headlines (2017-09-13) blog.rackspace.com
New security features for your Stripe account (2017-09-12) stripe.com
Equifax's data breach response has its own security flaw (2017-09-11) www.engadget.com
Paul Vixie Explains How CISOs Can Use DNS to Up Security (2017-09-11) www.darkreading.com
Virginia is replacing some of its electronic voting machines over security concerns (2017-09-10) www.theverge.com
Inaudible Voice Commands Can Hack Siri, Google Now & Alexa (2017-09-10) medium.com
The Latest: Expert: Equifax website raises security concerns (2017-09-08) hosted.ap.org
Cloud Security Hype Fails to Match Deployments (2017-09-08) www.darkreading.com
If Blockchain Is the Answer, What Is the Security Question? (2017-09-08) www.darkreading.com
Using Alternate Data Streams to Bypass User Account Controls (2017-09-08) www.redcanary.com
Data Integrity: Recovering from Ransomware and Other Destructive Events (2017-09-07) nccoe.nist.gov
Securing Microservices and APIs with NGINX and Signal Sciences (2017-09-07) www.nginx.com
Threat Intelligence Collaboration on the Rise (2017-09-07) www.infosecurity-magazine.com
SMBs Largely Unprepared for IoT, Ransomware Attacks (2017-09-07) www.infosecurity-magazine.com
Understanding Medical Device Security (2017-09-07) blogs.cisco.com
Bitdefender Bug Bounty Program Goes Public with Bugcrowd (2017-09-07) www.darkreading.com
Samsung’s bug bounty program will pay rewards of up to $200,000 (2017-09-07) www.theverge.com
Not All Threats Are Created Equal: Using Automation to Prioritize and Monitor Digital Threats At Scale (2017-09-07) www.riskiq.com
Apple says its developer service was affected by a bug not a security breach (2017-09-06) techcrunch.com
Security Pros See New Requirements for Cyber (2017-09-06) www.infosecurity-magazine.com
A rebuke from the US army has DJI focused on improving security (2017-09-06) www.theverge.com
Workplace IoT Puts Companies on Notice for Smarter Security (2017-09-06) www.darkreading.com
WireX Variant Capable of UDP Flood Attacks (2017-09-06) kasperskycontenthub.com
Lenovo settles with the FTC for pre (2017-09-05) mashable.com
72% of Educational Institutions Lack Designated InfoSec Staff (2017-09-05) www.darkreading.com
Four Million Time Warner Cable Records Left on Misconfigured AWS S3 (2017-09-05) kasperskycontenthub.com
Are your web and mobile APIs putting your business at risk? (2017-09-05) tyk.io
Thousands of Military Vets’ Details Exposed in S3 Privacy Snafu (2017-09-04) www.infosecurity-magazine.com
Security lapse exposed thousands of military contractor files (2017-09-04) www.engadget.com
Instagram API Security – Too Little Too Late (2017-09-01) www.forumsys.com
Threatpost News Wrap, September 1, 2017 (2017-09-01) kasperskycontenthub.com
How Effective Boards Drive Security Mandates (2017-09-01) www.darkreading.com
You shouldn't use your phone number for 2 (2017-09-01) www.businessinsider.com
HackerOne Expects $100m Paid Out in Bounties by 2020 (2017-09-01) www.infosecurity-magazine.com
Security Researchers Lose Faith in HTTP Public Key Pinning (2017-09-01) thenewstack.io
Session Hijacking Bug Exposed GitLab Users Private Tokens (2017-08-31) kasperskycontenthub.com
New Facebook, Instagram Bugs Demonstrate Social Media Risk (2017-08-31) www.darkreading.com
FDA Recalls 465K Pacemakers Tied to MedSec Research (2017-08-31) kasperskycontenthub.com
Using an audience’s own data to highlight both play and security (2017-08-31) flowingdata.com
Half of Global Firms Failing on PCI Compliance (2017-08-31) www.infosecurity-magazine.com
The FCC.gov Website Lets You Upload Malware Using Its Own Public API Key (2017-08-30) medium.com
Andy Rubin describes the taste of crow after Essential spills customer data (2017-08-30) techcrunch.com
Customer (2017-08-30) blogs.cisco.com
'Onliner' malware spambot targets 711 million email accounts (2017-08-30) www.engadget.com
API Security and MySQL — A match made in Hell (2017-08-30) www.forumsys.com
465k patients told to visit doctor to patch critical pacemaker vulnerability (2017-08-30) arstechnica.com
FDA Approves Firmware Fix for St Jude Pacemakers (2017-08-30) www.infosecurity-magazine.com
API Security (2017-08-29) danielwille.blogspot.com
Google Reminding Admins HTTP Pages Will Be Marked ‘Not Secure’ in October (2017-08-29) kasperskycontenthub.com
Researchers Figure Out How to Blind ISPs from Smart Home Device Traffic (2017-08-29) kasperskycontenthub.com
Secure and Manage AWS Lambda Endpoints with Kong (2017-08-29) blog.mashape.com
Microservices and Cloud (2017-08-29) forums.juniper.net
DJI Launches Drone Bug Bounty Program (2017-08-29) kasperskycontenthub.com
Chinese Drone Giant DJl Launches Bug Bounty Program (2017-08-29) www.infosecurity-magazine.com
16 times people were brilliantly trolled using AirDrop (2017-08-28) mashable.com
New York's Historic FinSec Regulation Covers DDoS, Not Just Data (2017-08-28) www.darkreading.com
Threat Analysis: Word Documents with Embedded Macros Leveraging Emotet Trojan (2017-08-28) www.carbonblack.com
DJI update removes plugins that shared user data without their knowledge (2017-08-28) www.theverge.com
GSA partners with HackerOne for first federal civilian bug bounty (2017-08-28) www.fedscoop.com
Why bug bounty programs are worth the risk (2017-08-28) fcw.com
DOD bug bounty programs pay off (2017-08-28) gcn.com
Why Offering Bug Bounties Will Be Widespread, Even in Government (2017-08-28) www.govtech.com
Air Force launches bug bounty program (2017-08-28) techcrunch.com
Identifying Security Vulnerabilities in Department of Defense Websites – Hack the Pentagon (2017-08-28) www.usds.gov
Bug Bounty List (2017-08-28) www.bugcrowd.com
10 Time (2017-08-28) www.darkreading.com
The Right Way to Manage Secrets with AWS (2017-08-28) segment.com
New Critical Infrastructure Security Recommendations from NIAC (2017-08-27) duo.com
A Call for New Voices on the Security Conference Circuit (2017-08-25) www.darkreading.com
The State of Real (2017-08-25) duo.com
Sharing Threat Intelligence Using STIX (2017-08-25) www.threatconnect.com
Why It’s Still A Bad Idea to Post or Trash Your Airline Boarding Pass (2017-08-24) krebsonsecurity.com
Insecure IoT Devices Pose Physical Threat to General Public (2017-08-24) www.darkreading.com
Google’s App Engine gets a firewall (2017-08-24) techcrunch.com
Sift Science + Dwolla = Real (2017-08-24) blog.siftscience.com
72% of Government Agencies Hit with Security Incidents (2017-08-23) www.darkreading.com
The Changing Face & Reach of Bug Bounties (2017-08-23) www.darkreading.com
How to Secure APIs from HTTP Method Attacks (2017-08-23) www.forumsys.com
Take incident response to the next level with AMP for Endpoints and Cognitive Threat Analytics (2017-08-23) blogs.cisco.com
API security testing (2017-08-23) assertible.com
Always assume URLs are public and NOT secure (2017-08-22) medium.com
Industrial Cobots Might Be The Next Big IoT Security Mess (2017-08-22) kasperskycontenthub.com
DDoS Attacks on the Rise Again: Akamai (2017-08-22) www.infosecurity-magazine.com
Top 5 Cyber Practices To Keep You Safe (2017-08-22) www.bmc.com
NIST’s New Security and Privacy Controls For IoT, MFA and SSO (2017-08-21) duo.com
Why security leadership is essential for your company (2017-08-20) thenextweb.com
Threat Analysis: Carbon Black Threat Research Dissects PNG Dropper (2017-08-18) www.carbonblack.com
Threat Round (2017-08-18) blogs.cisco.com
Four Pillars of API Security (2017-08-18) www.forumsys.com
Dissecting Security Hardware at Black Hat and DEF CON (2017-08-18) duo.com
Changing the security landscape for entrepreneurs (2017-08-17) techcrunch.com
Facebook Doles Out $100K Prize for Internet Defense Prize (2017-08-17) www.darkreading.com
Improving Cloud Security Visibility with ChatOps (2017-08-17) www.datadoghq.com
Can the security community grow up? (2017-08-17) techcrunch.com
This smart lock fiasco proves the Internet of Stupid is alive and well (2017-08-16) readwrite.com
Default Security for Elasticsearch and the Elastic Stack (2017-08-16) www.elastic.co
Insider Threats Loom Large for Security Pros (2017-08-16) www.darkreading.com
Google Removes Chrome Extension Used in Banking Fraud (2017-08-16) kasperskycontenthub.com
Explainer: HuMachine Intelligence (2017-08-16) usa.kaspersky.com
Webroot Acquires Security Training Platform (2017-08-15) www.darkreading.com
Seven More Chrome Extensions Compromised (2017-08-15) kasperskycontenthub.com
Attacks on enterprise security: Microsoft services as a weapon (2017-08-15) usa.kaspersky.com
IoT Medical Devices a Major Security Worry in Healthcare, Survey Shows (2017-08-15) www.darkreading.com
Smart locks rendered dumb by automatic update fail (2017-08-15) www.engadget.com
In Search of the Security Unicorn: Unified, Adaptive Defense (2017-08-15) www.darkreading.com
Hypergrid Case Study: Provision Cloud Services with Governance and Security Policies (2017-08-15) thenewstack.io
Update gone wrong leaves 500 smart locks inoperable (2017-08-14) arstechnica.com
Amazon Tackles Security of Data in S3 Storage (2017-08-14) www.darkreading.com
Amazon Macie helps businesses protect their sensitive data in the cloud (2017-08-14) techcrunch.com
JASK Employs Artificial Intelligence to Automate Smarter Security (2017-08-14) thenewstack.io
Why legislation alone won’t solve the insecurity of the Internet of Things (2017-08-11) readwrite.com
OpenShift Commons Briefing #90: Network Visibility and Runtime Security for OpenShift and Kubernetes (2017-08-11) blog.openshift.com
Containers and Security: What’s the Effect and Who’s Responsible? (2017-08-11) thenewstack.io
Russian hackers can reportedly take over unsecured hotel WiFi (2017-08-11) www.engadget.com
Many Factors Conspire in ICS/SCADA Attacks (2017-08-11) kasperskycontenthub.com
9 of the Biggest Bug Bounty Programs (2017-08-11) www.darkreading.com
HBO reportedly offered hackers a $250,000 ‘bug bounty payment’ (2017-08-10) www.theverge.com
API Security – Taking the plunge (2017-08-10) www.forumsys.com
High Schooler Nets $10,000 For Google Bug (2017-08-10) kasperskycontenthub.com
60% of Infosec Execs Are Boosting SOC Deployments (2017-08-10) www.darkreading.com
Introducing mobile prompts for two (2017-08-10) blogs.dropbox.com
Beware of Security by Press Release (2017-08-10) krebsonsecurity.com
OpenDNSSEC 2.1.3 (2017-08-10) packetstormsecurity.com
5 Ways to Make Threat Analysis Actionable (2017-08-10) www.threatconnect.com
Four ways to build a culture of security (2017-08-09) www.ca.com
SMBs Practice Better IoT Security Than Large Enterprises Do (2017-08-09) www.darkreading.com
What’s New in OpenShift 3.6 – PCI Product Applicability (2017-08-09) blog.openshift.com
Deep Dive into AMP and Threat Grid integration with Cisco Email Security (2017-08-09) blogs.cisco.com
NIST Update: Passphrases In, Complex Passwords Out (2017-08-09) duo.com
Automating Defenses Against Assembly (2017-08-08) www.darkreading.com
AlienVault plug (2017-08-08) techcrunch.com
API Security and OWASP Top 10 (2017-08-07) www.forumsys.com
Open Source Threat Intel: GOSINT (2017-08-07) blogs.cisco.com
FireEye: There Was No Breach, Attacker Fabricated Documents (2017-08-07) www.infosecurity-magazine.com
An AI Engine for API Security at Scale (2017-08-07) thenewstack.io
Important security updates for multiple Jenkins plugins (2017-08-06) jenkins.io
The UK government has issued new cybersecurity guidelines for smart cars (2017-08-06) www.theverge.com
What Women in Cybersecurity Really Think About Their Careers (2017-08-04) www.darkreading.com
VergeSense’s AI sensing hardware tackles facility management (2017-08-04) techcrunch.com
Siemens, DHS warn of “low skill” exploits against CT and PET Scanners (2017-08-04) arstechnica.com
CERT (2017-08-03) github.com
Three Steps to Strong Enterprise Security (2017-08-03) www.darkreading.com
Making Infosec Meetings More Inclusive (2017-08-03) www.darkreading.com
Three things every IoT manufacturer should do to improve security (2017-08-02) readwrite.com
Viral Images: Securing Images and Video uploads to your systems (2017-08-02) cloudinary.com
Using Intelligence to Optimize Your Data Defense Strategy (2017-08-02) www.darkreading.com
Leveraging Machine Learning and AI to Combat Online Attacks (2017-08-02) www.darkreading.com
Measuring Security Effectiveness Body (2017-08-02) www.darkreading.com
ChAP: Chaos Automation Platform – Netflix TechBlog – Medium (2017-08-01) medium.com
Legislation Proposed to Secure Connected IoT Devices (2017-08-01) kasperskycontenthub.com
New Bill Seeks Basic IoT Security Standards (2017-08-01) krebsonsecurity.com
US Senators Propose IoT Security Legislation (2017-08-01) www.darkreading.com
Greg Martin: Security operations is broken, and AI can fix it (2017-08-01) jask.ai
Track Laravel Model Changes with Laravel Auditing (2017-08-01) laravel-news.com
How Netflix DDoS’d Itself To Help Protect the Entire Internet (2017-07-31) www.wired.com
FCC says sharing DDoS attack details undermines security (2017-07-31) www.engadget.com
International Threat Intelligence and Info (2017-07-31) www.infosecurity-magazine.com
Healthcare Execs Report Rise in Data Breaches and HIPAA Violations (2017-07-31) www.darkreading.com
FCC says its specific plan to stop DDoS attacks must remain secret (2017-07-31) arstechnica.com
Wannacry Inpires Worm (2017-07-28) www.darkreading.com
Whitelists and Indirection Go Together Like Chocolate and Peanut Butter (2017-07-28) medium.com
Microsoft Turns Up $250,000 Bug Bounty for Windows (2017-07-27) www.infosecurity-magazine.com
Why data security is really everyone’s challenge today (2017-07-27) readwrite.com
Google Chrome is making it much easier to inspect security certificates (2017-07-27) thenextweb.com
Microsoft launches Windows Bounty program, offering awards up to $250,000 (2017-07-26) techcrunch.com
Microsoft expands bug bounty program to cover any Windows flaw (2017-07-26) arstechnica.com
Facebook’s CSO: the security industry needs to change (2017-07-26) techcrunch.com
Facebook Offers $1 Million for New Security Defenses (2017-07-26) www.darkreading.com
Securing APIs in Continuous Delivery (2017-07-26) medium.com
Manifesto: A New Open Source Container Metadata Tool from Aqua Security (2017-07-26) thenewstack.io
Hunting Malicious Domains: Introducing DomainTools Threat Profile (2017-07-25) blog.domaintools.com
Using AI to Break Detection Models (2017-07-25) www.darkreading.com
Hacking the Internet of Things – It’s as Simple as ABC (2017-07-25) www.bmc.com
Get a Snapshot of your Digital Footprint to Understand your Attack Surface (2017-07-25) www.riskiq.com
Don't Pass on the New NIST Password Guidelines (2017-07-25) auth0.com
How dangerous are the threat of kill chain attacks on IoT? (2017-07-24) readwrite.com
Introducing Iris With Collaboration Features (2017-07-24) blog.domaintools.com
Majority of Security Pros Let Productivity Trump Security (2017-07-24) www.darkreading.com
Compliance and Employee Behavior Bother Data Security (2017-07-24) www.infosecurity-magazine.com
Using Virtual Networks To Secure Your Resources (2017-07-21) www.stackery.io
Threat Round (2017-07-21) blogs.cisco.com
API Hooking – Evading Detection with Stealthy Techniques (2017-07-21) www.infosecurity-magazine.com
Cisco Warns of Coming “Destruction of Service” Attacks (2017-07-21) www.infosecurity-magazine.com
Tor Unpeels Bug Bounty Program (2017-07-20) www.infosecurity-magazine.com
Tor Project Opens Bounty Program To All Researchers (2017-07-20) kasperskycontenthub.com
Threats with Escalating Impact: Announcing the Cisco 2017 Midyear Cybersecurity Report (2017-07-20) blogs.cisco.com
Threat Hunting for Dridex Attacks: Top Questions from Security Teams (2017-07-20) www.redcanary.com
Debunking Myths about Privacy and Security in the Fintech Industry (2017-07-19) staging.www.yodlee.com
Senator Calls For Use Of DMARC To Curb Phishing (2017-07-19) kasperskycontenthub.com
A Hacker's Dream: American Password Reuse Runs Rampant (2017-07-19) www.infosecurity-magazine.com
Protecting Your Border or Offering a Service to Others? Part 1 (2017-07-19) blogs.cisco.com
CoinDash Hacked During its ICO (2017-07-18) kasperskycontenthub.com
Devil's Ivy Open (2017-07-18) www.infosecurity-magazine.com
Google launches new security features to protect users from unverified apps (2017-07-18) techcrunch.com
How to Detect and Stop URL Parameter Tampering (2017-07-18) www.forumsys.com
How to Prevent SSL Vulnerabilities using Powerful API Security (2017-07-18) www.forumsys.com
Experts in Lather Over ‘gSOAP’ Security Flaw (2017-07-18) krebsonsecurity.com
IoT Security Incidents Rampant and Costly (2017-07-18) www.darkreading.com
Moving Beyond the Perimeter: Part 2 (2017-07-18) duo.com
FBI: IoT Toys Could Present a Privacy and Safety Risk (2017-07-18) www.infosecurity-magazine.com
Hackers Are Stress (2017-07-17) continuum.cisco.com
IoT 'Smart' Alarm has Vulnerabilities that Could Help Black Hat Burglars (2017-07-17) www.infosecurity-magazine.com
OWASP API Security Project (2017-07-16) www.owasp.org
How Do I Utilize DNSSEC? (2017-07-14) admin.dyn.com
AsTech Offers a $5 Million Security Breach Warranty (2017-07-14) www.darkreading.com
WikiLeaks Reveals CIA Tool Acting as SMS Proxy on Android (2017-07-14) www.infosecurity-magazine.com
Assessing the Current State of Serverless Security (2017-07-13) thenewstack.io
Attackers Using Automated Scans to Takeover WordPress Installs (2017-07-13) kasperskycontenthub.com
How to Use Windows API Knowledge to Be a Better Defender (2017-07-13) www.redcanary.com
Introducing Token Exchange for Box Platform (2017-07-13) medium.com
Experts Warn Too Often AWS S3 Buckets Are Misconfigured, Leak Data (2017-07-13) kasperskycontenthub.com
More than Half of Ex (2017-07-13) www.infosecurity-magazine.com
Cisco acquires network security startup Observable Networks (2017-07-13) techcrunch.com
Cisco Firepower NGFW Delivers Unparalleled Threat Defense in NSS Labs Testing (2017-07-12) blogs.cisco.com
US government removes Kaspersky from approved vendors list (2017-07-12) www.engadget.com
Rust Security (2017-07-12) blog.versioneye.com
Telegram (2017-07-11) kasperskycontenthub.com
shieldfy/API (2017-07-11) github.com
Securing the AtSea App with Docker Secrets (2017-07-11) blog.docker.com
UK cybersecurity firm Darktrace has raised another $75 million at an $825 million valuation (2017-07-11) www.businessinsider.com
IoT Devices Plagued by Lesser (2017-07-10) www.darkreading.com
Two (2017-07-10) www.theverge.com
Attack on Critical Infrastructure Leverages Template Injection (2017-07-07) blogs.cisco.com
IRS to Launch Educational Phishing Series (2017-07-07) www.darkreading.com
Security in a SD (2017-07-06) www.kentik.com
New Google Security Controls Tighten Third (2017-07-06) www.darkreading.com
G Suite admins can now whitelist connected apps (2017-07-06) techcrunch.com
The Promised LAN (2017-07-06) blog.domaintools.com
ETA: Why We Strive for Security That Doesn’t Compromise Privacy (2017-07-06) blogs.cisco.com
What is a Brute Force Attack? (2017-07-05) blog.highwinds.com
The Problem with Data (2017-07-03) www.darkreading.com
The Case for Crowdsourcing Security Buying Decisions (2017-06-30) www.darkreading.com
Google’s new experiment, Triangle, lets you block individual apps from using mobile data (2017-06-29) techcrunch.com
4 Cybersecurity Principles That Withstand the Test of Time (2017-06-29) www.carbonblack.com
Carbon Black Threat Research Technical Analysis: Petya / NotPetya Ransomware (2017-06-28) www.carbonblack.com
Industrial robotics security is really, really terrible (2017-06-28) boingboing.net
Average Bug Bounty Payments Growing (2017-06-28) kasperskycontenthub.com
Defining Security: The Difference Between Safety & Privacy (2017-06-28) www.darkreading.com
Finding Scams Through Suspect Web Components (2017-06-28) www.riskiq.com
How one company is using analytics and AI to sniff out potential security breaches (2017-06-28) thenextweb.com
Influencer: The Case For DMARC Is Clear. So Why Doesn’t Everyone Use It? (2017-06-28) admin.dyn.com
Dropbox collects privacy settings into a security checkup page (2017-06-27) www.engadget.com
Security startup Cloudflare has a plan to fund other startups (2017-06-27) www.businessinsider.com
No (2017-06-27) www.darkreading.com
Pinterest enables two (2017-06-27) www.engadget.com
Pinterest begins rolling out two (2017-06-27) www.theverge.com
Snap Map security concerns (2017-06-27) usa.kaspersky.com
Maturing Your Cybersecurity Program (2017-06-27) www.threatconnect.com
Maturing Your Cybersecurity Program (2017-06-27) www.threatconnect.com
DDoS Aftershock: SEO Damage (2017-06-26) www.apicasystem.com
Five Guidelines for Measuring and Reporting on Your Security Operations Program (2017-06-26) www.redcanary.com
New EU Privacy Laws Will Complicate B2B Data Sharing (2017-06-26) kasperskycontenthub.com
Now in Digital Footprint: New Views into Web Server and Website Security (2017-06-25) www.riskiq.com
Virgin Media thinks 800,000 users should change their router passwords (2017-06-23) mashable.com
Securing Your Data in the Transformation to Digital (2017-06-23) blogs.cisco.com
A Steady Drumbeat for Simple, Open and Automated (2017-06-23) blogs.cisco.com
Secure Practices for Microservices – Dev and Ops (2017-06-23) www.nginx.com
Cloud(ed) Judgment: OneLogin’s Breach Continues to Fuel the Security Debate (2017-06-23) www.forumsys.com
Threat Intelligence Sharing: The New Normal? (2017-06-23) www.darkreading.com
NSA Advocates Data Sharing Framework (2017-06-23) kasperskycontenthub.com
Detecting Encrypted Malware Traffic (Without Decryption) (2017-06-23) blogs.cisco.com
Demystifying Intelligence Analysis (2017-06-23) www.threatconnect.com
Nuclear Plants, Hospitals at Risk of Hacked Radiation Monitoring Devices (2017-06-22) www.darkreading.com
Most General Counsels Fret over Data Security (2017-06-22) www.darkreading.com
Cloud Security Lessons from the Voter Data Leak (2017-06-22) www.darkreading.com
News in Networking: Intent (2017-06-22) www.kentik.com
Securing Application Secrets with EC2 Parameter Store (2017-06-22) blog.rackspace.com
How hackers can steal your 2FA email account by getting you to sign up for another website (2017-06-22) boingboing.net
OAuth 2.0 Threat Landscapes (2017-06-22) medium.com
Microsoft Extends Edge Bug Bounty Program Indefinitely (2017-06-21) kasperskycontenthub.com
Control Your Own Security (2017-06-21) blogs.cisco.com
Introducing Threat Grid for Meraki MX (2017-06-21) blogs.cisco.com
Improving Cybersecurity in Healthcare: Visibility (2017-06-21) blogs.cisco.com
Getting Started with the ThreatConnect Query Language (TQL) (2017-06-21) www.threatconnect.com
IT Security Vulnerability vs Threat vs Risk: What’s the Difference? (2017-06-21) www.bmc.com
Organizations Are Detecting Intrusions More Quickly (2017-06-20) www.darkreading.com
Internet (2017-06-20) kasperskycontenthub.com
Security without Compromise: How Cisco Engineers Used Machine Learning to Solve an Impossible Problem (2017-06-20) continuum.cisco.com
Trust, but Verify: Apex Metadata API and Security (2017-06-20) 25.56451
Cloud Security & the Power of Shared Responsibility (2017-06-20) www.darkreading.com
How Python Coders Tried to Kill my Supposedly Secure JavaScript API Service (2017-06-20) medium.com
Threat Hunting: The Thrill of the Hunt (2017-06-20) www.carbonblack.com
Routers: Both Targets And Perpetrators In DDoS Attacks (2017-06-19) www.apicasystem.com
Invisible Invaders: Why Detecting Bot Attacks Is Becoming More Difficult (2017-06-19) www.darkreading.com
Venezuela accuses Twitter of censoring after government accounts are suspended (2017-06-19) mashable.com
Bug Hunting: Drilling Into the Internet of Things (IoT) (2017-06-19) duo.com
EU proposes banning encryption backdoors (2017-06-19) www.engadget.com
Twitter's 2 (2017-06-16) mashable.com
The internet of insecure things (2017-06-16) thenextweb.com
Addressing Human Security Issues: Cause Award Honoree IST Research (2017-06-16) www.elastic.co
Hospital Email Security in Critical Condition as DMARC Adoption Lags (2017-06-14) www.darkreading.com
What is DDoS? (2017-06-14) blog.stackpath.com
Survey: 58% of Security and Development Teams Play Nice (2017-06-14) www.darkreading.com
Relentless Attackers Try Over 100,000 Times Before They Breach a System (2017-06-14) www.darkreading.com
IoT Brings New Value, New Risks (2017-06-13) blogs.cisco.com
Common Security Mistake #1: Lack of Visibility (2017-06-13) www.redcanary.com
Ditch the Big Ass Spreadsheet with Continuous Security Compliance (2017-06-13) www.darkreading.com
Deep Learning's Growing Impact on Security (2017-06-13) www.darkreading.com
FIN7 Hitting Restaurants with Fileless Malware (2017-06-13) kasperskycontenthub.com
GitHub (2017-06-12) github.com
FTC Issues Advice on Mobile Phone Data Security, Identity Theft (2017-06-12) www.darkreading.com
Analysing attacks on a WordPress XML (2017-06-12) blog.appsecco.com
Grammar of the IAM Policy Language (2017-06-12) docs.aws.amazon.com
Will Deception as a Defense Become Mainstream? (2017-06-11) www.darkreading.com
How an IoT DDoS warning system helps predict cyberattacks (2017-06-11) www.techrepublic.com
Three Perspectives on the Evolution of Container Security (2017-06-09) thenewstack.io
What’s the Cost of Endpoint Detection & Response? (2017-06-09) www.redcanary.com
New Attack Method Delivers Malware Via Mouse Hover (2017-06-09) www.darkreading.com
Opsec and #blacklivesmatter: how Trump is motivating activists to learn and practice digital security (2017-06-09) boingboing.net
A new network. A halt to hack attacks. (2017-06-08) blogs.cisco.com
Hide & Seek: Security Teams Lack Visibility in the Cloud (2017-06-08) www.darkreading.com
ICS cybersecurity: A view from the field (2017-06-08) kasperskycontenthub.com
The President’s New EO Gets the Gist of NIST (2017-06-08) www.forumsys.com
Internet cameras have hard (2017-06-07) arstechnica.com
Miercom Report: Secured Network Infrastructure (2017-06-07) blogs.cisco.com
Ransomware and the Importance of Server Hardening (2017-06-07) blog.rackspace.com
Making cybersecurity a part of the smart city process (2017-06-06) blogs.cisco.com
Slack, Telegram, Other Chat Apps Being Used as Malware Control Channels (2017-06-06) www.darkreading.com
Juniper Networks Opens Software (2017-06-06) www.itbusinessedge.com
Trustworthy Systems: Securing our network infrastructure (2017-06-06) blogs.cisco.com
The Internet of Vulnerable Things (2017-06-06) blogs.cisco.com
DigitalOcean Adds a Scalable Firewall Service to Its Cloud Feature Portfolio (2017-06-06) thenewstack.io
Following the Money Hobbled vDOS Attack (2017-06-06) krebsonsecurity.com
Connected Cars: Secure by design (2017-06-01) usblog.kaspersky.com
Cisco and IBM Team Up on Security (2017-05-31) www.darkreading.com
Google will review web apps that want access to its users data (2017-05-13) www.pcworld.com
Dynamic Security Analysis with OWASP ZAP (2017-05-12) kuridotcom.wordpress.com
Stealing Voice Prints (2017-05-12) www.schneier.com
4 Things That Every Developer Should Know About Security (2017-05-12) dzone.com
APAC Banks Say No To Suppliers Who Fail Cybersecurity Audits (2017-05-11) www.cxotoday.com
Using DNS, Threat Intelligence and Network Context In Your Security Lifecycle (2017-05-11) community.infoblox.com
What Developers Dont Know About Security Can Hurt You (2017-05-11) www.darkreading.com
Updating developer identity guidelines and registration processes to protect users (2017-05-11) developers.googleblog.com
Cisco Patches Leaked 0-day in 300+ Of Its Switches (2017-05-10) www.itsecurityguru.org
Cisco Releases Security Update (2017-05-10) www.us-cert.gov
Which of the OWASP Top 10 Caused the World’s Biggest Data Breaches? (2017-05-09) snyk.io
What Is a Host Header Attack? (2017-05-09) dzone.com
How to secure your server in 5 minutes (2017-05-08) feedproxy.google.com
5 Steps to Implementing Intelligent Asset Strategies (Part 4): Threat Detection (2017-05-07) dzone.com
Enterprise Smartwatch Makers Must Shore Up Security: Analysts (2017-05-07) www.cxotoday.com
The biggest security problems with robotics (2017-05-05) www.itsecurityguru.org
All You Need To Know About The Google Docs Phishing Attack (2017-05-05) auth0.com
Protecting You Against Phishing (2017-05-05) security.googleblog.com
DCs new data policy balances privacy, security amp; openness. (2017-05-04) sunlightfoundation.com
Verizon Secures The Perimeter With New Cloud-Based Security Service For Business Customers (2017-05-04) www.crn.com
Minimizing IoT security casualties through API management (2017-05-04) internetofthingsagenda.techtarget.com
Why OAuth Phishing Poses A New Threat to Users (2017-05-04) www.darkreading.com
Google Was Warned About This Week’s Mass Phishing Email Attack Six Years Ago (2017-05-04) motherboard.vice.com
Google Docs Phishing Scam a Game Changer (2017-05-04) www.darkreading.com
Spam campaign targets Google users with malicious link (2017-05-03) www.reuters.com
Google Users Hit with Possibly the Most Effective Phishing Scam Yet (2017-05-03) continuum.cisco.com
Google has fixed the massive Google Docs phishing attack (2017-05-03) www.theverge.com
Google Docs Phishing Attack Abuses Legitimate Third-Party Sharing (2017-05-03) www.darkreading.com
Small Budgets Cripple Cybersecurity Efforts of Local Governments (2017-05-03) www.darkreading.com
Steps to Make Stronger Passwords (2017-05-03) resources.infosecinstitute.com
PSA: This Google Doc scam is spreading fast and will email everyone you know (2017-05-03) techcrunch.com
Google Docs phishing scam spreads widely, reportedly shut down quickly (2017-05-03) www.siliconbeat.com
Announcing Updated API for RiskIQ PassiveTotal (2017-05-03) www.riskiq.com
Researchers Hack Industrial Robot (2017-05-03) www.darkreading.com
Don’t Open That Google Doc Unless You’re Positive It’s Legit (2017-05-03) www.wired.com
Assembling a Container Security Program (2017-05-03) dzone.com
IoT, Privacy, and Security: Innovation Vs. Regulation (2017-05-02) www.cioreview.com
Protecting Azure Resources With Resource Manager Locks (2017-05-02) dzone.com
The average DDoS attack cost for businesses rises to over $2.5m (2017-05-02) www.zdnet.com
Forum Systems to Share API Security Insights at KuppingerCole’s European Identity Cloud Conference (2017-05-02) www.forumsys.com
New Tools Allow Voice Patterns To Be Cloned To Produce Realistic But Fake Sounds Of Anyone Saying Anything (2017-05-02) www.techdirt.com
1000 days of UDP amplification DDoS attacks (2017-05-02) www.lightbluetouchpaper.org
Gartner Analyst To Mid-Market CIOs: Look At Service Providers As Part Of Your Security Strategy (2017-05-01) www.crn.com
Education, Healthcare Government Targeted by Stolen RDP Logins (2017-05-01) duo.com
OWASP Top Ten Web App Risks Are Being Updated (2017-04-29) dzone.com
Tweet: If for whatever reason your data is protected or monitored, itrsquo;s normal to have some form of API security. https://t.co/pd08VoefBM (2017-04-28) twitter.com
A Day in the Life of a Security Avenger (2017-04-28) www.darkreading.com
Tweet: Meet the Postman, @keen_io, and Elastic Beam teams! We#039;ll discuss API monitoring and security. Reserve your spot: https://t.co/F1WvQKnDax (2017-04-27) twitter.com
Are You Monitoring Your API Security? (2017-04-27) apimetrics.io
Introducing Orbit from @Cloudflare. Protecting #IoT devices from being exploited for #DDoS attacks (2017-04-27) blog.cloudflare.com
5 Things Solution Providers Need To Know About Brickerbot, The Newest IoT Malware (2017-04-27) www.crn.com
How Clever thinks about security and privacy (2017-04-27) blog.clever.com
Cloudflare launches service to secure IoT devices from external hacks (2017-04-27) www.pcworld.com
Denial-of-service, web app attacks plague banks (2017-04-27) www.americanbanker.com
Phishing Attacks: How To Avoid Getting Hooked (2017-04-26) www.cxotoday.com
What Are Injection Attacks? (2017-04-26) dzone.com
Ransomware incidents surge, education a hot bed for data breaches, according to Verizon (2017-04-26) www.zdnet.com
Cyber risks for Industrial environments continue to increase (2017-04-26) resources.infosecinstitute.com
I Got Hacked So You Dont Have To (2017-04-25) www.gq.com
Social-Engineer Toolkit - TrustedSec - Information Security (2017-04-25) www.trustedsec.com
8 DDoS Attacks That Made Enterprises Rethink IoT Security (2017-04-24) www.crn.com
The Year of Data Breaches: Why Encryption and Reformatting SSDs Is Not Enough (2017-04-24) dzone.com
Linksys Routers Vulnerable to DDoS Attacks (2017-04-22) www.pcmag.com
Can an IoT device ever be secure? (2017-04-21) www.itsecurityguru.org
Top 10 Open-Source Security Tools Released by Tech Giants (2017-04-21) resources.infosecinstitute.com
Tracing Spam from E-mail Headers (2017-04-21) www.schneier.com
IoT Security is Hard: Here’s What You Need to Know (2017-04-21) hackaday.com
Chrome Blocks Crafty URL Phishing Method (2017-04-20) www.pcmag.com
Niantic still hasn’t solved Pokemon GO’s biggest problem (2017-04-20) www.slashgear.com
Anti-DDoS Attack Protection With the ELK Stack (2017-04-20) dzone.com
Token Migration Plan Pt.1 (2017-04-19) blog.storj.io
3 Tips for Updating an Endpoint Security Strategy (2017-04-19) www.darkreading.com
Security Evaluation Models (2017-04-18) resources.infosecinstitute.com
Namespaces: A key to container security (2017-04-17) sdtimes.com
“Managed” Is No Longer a Dirty Word: Taking a Fresh Look at Outsourcing Security (2017-04-17) www.redcanary.com
SQL Injection and Cross-Site Scripting (2017-04-17) www.codeproject.com
Surveillance and our Insecure Infrastructure (2017-04-17) www.schneier.com
Part Three: Bug Bounty  Programs —  Is Your Organization Ready? (2017-04-17) www.okta.com
Attacking the Cloud (2017-04-13) resources.infosecinstitute.com
95% of Organizations Have Employees Seeking to Bypass Security Controls (2017-04-13) www.darkreading.com
Cyber security breaches have cost billions in shareholder value (2017-04-13) disruptiveviews.com
Cloudflare Rate Limiting - Insight, Control, and Mitigation against Layer 7 DDoS Attacks (2017-04-13) blog.cloudflare.com
2017 Security Protocols Workshop (2017-04-13) www.schneier.com
New Breed of DDoS Attack On the Rise (2017-04-13) www.darkreading.com
Cyber breaches have cost shareholders billions since 2013: report (2017-04-12) www.reuters.com
The Quadfecta of Data Protection (2017-04-12) www.itsecurityguru.org
How Innovative Companies Lock Down Data (2017-04-12) www.darkreading.com
The Rise of the IoT Botnet: Beyond the Mirai Bot (2017-04-12) resources.infosecinstitute.com
Steps for Establishing Your AWS Security Roadmap (2017-04-11) dzone.com
Changes to OWASP Top 10 (2017-04-11) dzone.com
Partners: Dallas Emergency Siren Hack Illustrates The Need For Regular Security Assessments (2017-04-11) www.crn.com
There’s Gold in Those Endpoints: Threat Mining vs Threat Hunting (2017-04-11) www.redcanary.com
OWASP Top 10 Update: Long Overdue Or Same-Old, Same-Old? (2017-04-11) www.darkreading.com
Kaspersky Lab identifies ransomware actors focusing on targeted attacks against businesses (2017-04-10) www.itsecurityguru.org
Salesforce Data Security Model — Explained Visually (2017-04-10) developer.salesforce.com
Malicious Torrent File Conducts Distributed WordPress Password Attack (2017-04-10) www.itsecurityguru.org
Guidelines for Reducing API Security Threats (2017-04-08) www.cioreview.com
New Malware Intentionally Bricks IoT Devices (2017-04-07) www.itsecurityguru.org
Partners Warn Against Application Layer DDoS Attacks Targeting IoT Devices (2017-04-07) www.crn.com
Never under-estimate the threat from insider cyber attacks (2017-04-07) disruptiveviews.com
IoT security sucks, here’s how to fix it (2017-04-07) thenextweb.com
How Boards Can Prioritize Cybersecurity in Corporate Governance (2017-04-07) dzone.com
Advanced DNS Protection is Now Available for Organizations of All Sizes (2017-04-07) community.infoblox.com
New Bots Seek to Permanently Damage IoT Devices (2017-04-07) continuum.cisco.com
Okta Goes Public In First Big Cybersecurity IPO Of The Year (2017-04-07) www.crn.com
The troubles with APIs: security, discovery, bulk loading (2017-04-06) www.zdnet.com
F-Secure buys Little Flocker to upgrade its Mac security play (2017-04-06) techcrunch.com
23% of Security Pros are Blind to Encrypted Traffic Threats (2017-04-06) www.itsecurityguru.org
Teaching Hospitals at Greater Data Breach Risk (2017-04-06) www.darkreading.com
Brute Forcing HS256 Is Possible: The Importance of Using Strong Keys in Signing JWTs (2017-04-05) dzone.com
Why banks need a guard tower in the war against cyberattacks (2017-04-05) www.americanbanker.com
Clever Physical ATM Attack (2017-04-05) www.schneier.com
Sex toy with in-built camera can be easily hacked (2017-04-04) www.bbc.co.uk
Acoustic Attack Against Accelerometers (2017-04-04) www.schneier.com
Office 365 Gets Data Governance, Threat Intelligence Tools (2017-04-04) www.darkreading.com
The growing cyber threats and the technologies being used to defend against them (2017-04-04) www.itsecurityguru.org
Our Unwavering Commitment to Security, Post-McAfee (2017-04-03) newsroom.intel.com
FBI Warns Healthcare Entities of Threats to FTP Servers (2017-03-29) www.itsecurityguru.org
IoD and Barclays: More than a third of businesses lack a formal strategy against cyber attack (2017-03-29) www.itsecurityguru.org
How Trump can Keep America’s Grid Safe from Hackers (2017-03-29) www.itsecurityguru.org
Google Play faces cat and mouse game with sneaky Android malware (2017-03-24) www.pcworld.com
Cortex API Documentation (2017-03-23) blog.thehive-project.org
Senators reintroduce a bill to improve cybersecurity in cars (2017-03-23) techcrunch.com
Why OAuth 2.0 Is Vital to IoT Security (2017-03-23) nordicapis.com
Who’s responsible for IoT security? (2017-03-22) 360.here.com
Crash exploitability analysis on Google Cloud Platform: security in plaintext (2017-03-22) cloudplatform.googleblog.com
3,000 Industrial Plants Per Year Infected with Malware (2017-03-22) www.itsecurityguru.org
Longstanding, unpatched Bluetooth vulnerability lets burglars shut down Google security cameras (2017-03-22) boingboing.net
Embedded security a high priority for IoT designers (2017-03-22) www.itsecurityguru.org
4 Habits From Consulting Every Security Professional Should Steal (2017-03-22) dzone.com
Google project hopes to provide election security globally (2017-03-21) thehill.com
Hacked Sites Up By 32% in 2016 Over 2015, Says Google (2017-03-21) www.darkreading.com
The dawn of the DDoS of Things (DoT) (2017-03-21) www.itsecurityguru.org
Google and Jigsaw to offer election cyber protection – free of charge (2017-03-21) disruptiveviews.com
3,000 Industrial Plants Per Year Infected with Malware (2017-03-21) www.darkreading.com
Auto-ISAC and Booz Allen’s Effort to Get Carmakers to Work Together Against Hack (2017-03-20) cyware.com
Bdrive secures files in the cloud with fingerprints and fragmentation (2017-03-20) www.pcworld.com
Security Protocols 2017 (2017-03-20) www.lightbluetouchpaper.org
Network Layer DDoS Attacks Hit Record Levels: Imperva (2017-03-18) www.securityweek.com
HTTPS Interception Weakens TLS Security (2017-03-17) www.us-cert.gov
Enterprises using IoT arent securing sensitive data (2017-03-17) www.information-age.com
We have your data: how to fight ransomware (2017-03-17) blog.datagravity.com
Govt. Cybersecurity Contractor Hit in W-2 Phishing Scam (2017-03-17) krebsonsecurity.com
GitLab Critical Security Update Pre-Announcement (2017-03-17) about.gitlab.com
The Technical Impacts of a Virtual Private Network (2017-03-16) resources.infosecinstitute.com
Two-thirds of enterprises use advanced tech without securing data: report (2017-03-16) thehill.com
How to protect your Twitter account against app hacks (2017-03-15) www.theverge.com
Security in the Microservices Paradigm (2017-03-15) dzone.com
PowerShell Remoting Artifacts: An Introduction (2017-03-15) resources.infosecinstitute.com
Many smartphone owners don’t take steps to secure their devices (2017-03-15) www.pewresearch.org
An Abridged Guide To Security In DNS (2017-03-14) dyn.com
Balancing Privacy and Security in Germany (2017-03-14) www.lawfareblog.com
RiskIQ Data Sets: Powering Threat Investigations Around the World (2017-03-14) www.riskiq.com
Qualys Brings Web Application Security Automation to a New Level by... (2017-03-14) inbusiness.ae
Jonathan Zdziarski Joins Apple (2017-03-14) www.zdziarski.com
Apple hires security researcher Jonathan Zdziarski (2017-03-14) techcrunch.com
Docker Secrets Management (2017-03-14) blog.codeship.com
The Akamai Waf | Now Protecting Apis (2017-03-13) blogs.akamai.com
SoapUI: Security Testing (2017-03-13) resources.infosecinstitute.com
Leveraging The FFIEC Cybersecurity Assessment Tool (CAT) To Improve Corporate Culture and Raise Security Posture (2017-03-11) ctovision.com
Two-Factor Authentication: Who Has It and How to Set It Up (2017-03-10) www.pcmag.com
Dahua, Hikvision IoT Devices Under Siege (2017-03-10) krebsonsecurity.com
A Challenge to WikiLeaks: Disclose Software Vulnerabilities on a Responsible Timeline (2017-03-10) www.carbonblack.com
IoT Liability: How Organizations Can Hold Themselves Accountable (2017-03-10) www.darkreading.com
Newer car tech opens doors to CIA attacks (2017-03-10) www.pcworld.com
Datadog + SOC 2: Reaffirming our commitment to security (2017-03-10) www.datadoghq.com
Consumer Reports Proposes Open Source Security Standard To Keep The Internet Of Things From Sucking (2017-03-10) www.techdirt.com
Defense Against Doxing (2017-03-10) www.schneier.com
CIA’s Weeping Angel provides a stark warning to device manufacturers on IoT security (2017-03-09) www.itsecurityguru.org
Securing Todays Elastic Attack Surface (2017-03-09) www.darkreading.com
Most Federal Government Websites Lack Basic Security (2017-03-09) www.darkreading.com
Share The Love: Using ThreatConnect as a Threat Intelligence Sharing Platform for ISACs, ISAOs, and their Members (2017-03-09) www.threatconnect.com
Google Releases Security Update for Chrome (2017-03-09) www.us-cert.gov
Humanising the Internet of Things (2017-03-09) www.itsecurityguru.org
How to Protect Your Web Application Against DDoS Attacks by Using Amazon Route 53 and an External Content Delivery Network (2017-03-08) aws.amazon.com
The White House’s favorite ‘secure’ messaging app is riddled with bugs (2017-03-08) thenextweb.com
The Drive for Standardization (2017-03-08) blog.fortinet.com
4 ways cyber attackers may be hacking your IoT devices (2017-03-08) thenextweb.com
An Authoritative Guide to CORS (Cross-Origin Resource Sharing) for REST APIs (2017-03-08) www.programmableweb.com
Why Printers Still Pose a Security Threat (2017-03-08) www.darkreading.com
Nest Adds 2-Factor Authentication (2017-03-08) www.pcmag.com
Nest Adds a Security Feature It Should Have Had All Along (2017-03-07) gizmodo.com
ThreatConnect Announces Seven Partner Integrations (2017-03-07) www.dbta.com
Security considerations in a DevOps pipeline (2017-03-07) blog.cloudpassage.com
WordPress 4.7.3 Fixes Cross Site Scripting Vulnerabilities (2017-03-07) shopmatrix.eu
Testing products for data privacy and security (2017-03-06) boingboing.net
Consumer Reports to grade tech products on security, privacy (2017-03-06) www.pcworld.com
Journalists: How hacking details matter (2017-03-06) blog.erratasec.com
CA to acquire security testing firm Veracode for $614M (2017-03-06) www.pcworld.com
Security News This Week: An IoT Teddy Bear Leaked Millions of Parent and Child Voice Recordings (2017-03-04) www.wired.com
WhiteHat Certified Secure Developer Program (2017-03-04) dzone.com
Tweet: We#039;re on the hunt for an experienced Security Compliance Analyst to oversee regulatory initiatives. Apply now:hellip; https://t.co/A9w9hvbZ1S (2017-03-03) twitter.com
Healthcare facilities widely compromised by Medjack, malware that infects medical devices to steal your information (2017-03-03) boingboing.net
HackerOne Offers Free Service for Open Source Projects (2017-03-03) www.darkreading.com
Businesses Blame Rivals for Staging DDoS Attacks (2017-03-03) www.itsecurityguru.org
Cloudpets Data Breach Affects Over 820,000 Customers (2017-03-03) auth0.com
Trustwave discovers hidden backdoor in Chinese IoT devices (2017-03-03) www.itsecurityguru.org
Buzzword Watch: Prosilience (2017-03-02) www.schneier.com
Hack Brief: A Slack Bug Could Have Been Everyone’s Worst Office Nightmare (2017-03-02) www.wired.com
Boeing data breach traced to employee who needed help from their spouse (2017-03-02) www.itsecurityguru.org
Medical Devices Are the Next Security Nightmare (2017-03-02) www.wired.com
Australia’s ‘Essential Eight’ Sets the Standard for Sensitive Data Protection and Breach Notification (2017-03-02) www.carbonblack.com
ThreatConnect Adds Seven Key Partners to its more than 100 Current... (2017-03-02) worldnews.se
Severe Security Vulnerabilities in Home, Business and Industrial Robots (2017-03-02) www.itsecurityguru.org
Whitelist Evasion Example: Threat Detection #723 (2017-03-02) www.redcanary.com
Tweet: Obsessed with the security of customer data? Ditto. We#039;re really excited to introduce you to Message Body Redactiohellip; https://t.co/2c0CC4lv4d (2017-03-01) twitter.com
Tweet: Quantifying the Impact of quot;Cloudbleedquot;: https://t.co/YrZlzAZKhj (2017-03-01) twitter.com
Proactively Responding to #CloudBleed with Splunk (2017-02-28) www.splunk.com
Targeted Attacks On Critical Infrastructure On The Rise (2017-02-28) www.cxotoday.com
Zones of Trust: A New Way of Thinking about IoT Security (2017-02-28) www.darkreading.com
Tweet: RT @SlideWiki: Kurt talking about API security and using #kong https://t.co/egN8UWCV7K #SlideWiki hackathon V3.0 @VUamsterdam https://t.co/hellip; (2017-02-27) twitter.com
Patients put at risk after 700,000 sensitive hospital letters go missing including test results from biopsies and patient treatment plans (2017-02-27) www.itsecurityguru.org
Could you hack into a car? If so, a cyber security career awaits! (2017-02-27) www.itsecurityguru.org
Internet-Connected Teddy Bear Leaked 2 Million Recordings of Parents and Kids (2017-02-27) motherboard.vice.com
Cloudflare Cyber Security Bug – CloudBleed (2017-02-27) www.eagleeyenetworks.com
Fintechs assure customers their data unaffected by Cloudbleed (2017-02-27) www.americanbanker.com
Data Handling Requirements (2017-02-27) resources.infosecinstitute.com
Debugging CDNs: A Need for Change (2017-02-27) blog.catchpoint.com
CloudFlare states Adafruit not part of the @Cloudflare issue(s) #cloudbleed @adafruit (2017-02-27) blog.adafruit.com
Cloudflare leak: Please reset your CCID password (2017-02-24) creativecommons.org
iPhone Robbers Try to iPhish Victims (2017-02-24) krebsonsecurity.com
Suspect Arrested In Connection With Mirai Botnet (2017-02-24) www.darkreading.com
DigitalOcean, Your Data, and the Cloudflare Vulnerability (2017-02-24) www.digitalocean.com
Missteps in Securing Autonomous Vehicles (2017-02-24) www.codeproject.com
Ransomware takes center stage at the RSA Conference (2017-02-24) blog.datagravity.com
Cloudflare’s bug bounty program is terrible (2017-02-24) thenextweb.com
How to secure your data after the Cloudflare leak (2017-02-24) techcrunch.com
Cloudflare Leaked Web Customer Data For Months (2017-02-24) www.darkreading.com
Cloudflare data leakage doesn’t reveal 1Password secrets (2017-02-24) www.macworld.com
Partners: Cloudflare Software Bug Shows Need For Better Business Data Security Measures (2017-02-24) www.crn.com
Security should be top priority for mobile developers to protect consumers (2017-02-24) www.itsecurityguru.org
Tweet: No 1Password data was put at risk through the bug reported earlier today. https://t.co/S7G62Qw85Q (2017-02-23) twitter.com
Tweet: Incident report on memory leak caused by Cloudflare parser bug - https://t.co/rTZ4bFw3uJ (2017-02-23) twitter.com
Incident report on memory leak caused by Cloudflare parser bug (2017-02-23) blog.cloudflare.com
Netflix Debuts Stethoscope Open-Source Security Tool (2017-02-23) www.darkreading.com
Survey: Most Attackers Need Less Than 12 Hours To Break In (2017-02-23) www.darkreading.com
Tweet: After three years of Bug Bounty, @GitHubEng shared their blueprint for dealing with reports big and small.hellip; https://t.co/A1bLuZtC6K (2017-02-22) twitter.com
Using RASP to Make Bug Bounty Programs More Efficient (2017-02-22) dzone.com
Meet Securitybot: Open Sourcing Automated Security at Scale (2017-02-22) blogs.dropbox.com
Serverless REST API with Angular, Persistence and Security (2017-02-22) auth0.com
SGIP White Paper Addresses Protecting Smart Grids from Electromagnetic Phenomena (2017-02-22) www.remotemagazine.com
Cross-Site Request Forgery is dead! (2017-02-21) scotthelme.co.uk
Cisco Accelerates Digital Network Transformation with New Virtualization and Security Technologies (2017-02-21) newsroom.cisco.com
RSAC 2017: BeyondCorp - How Google Protects Its Corporate Security Perimeter Without Firewalls (2017-02-21) duo.com
5 Cybersecurity Need-to-Knows When Preventing Expensive Data Breaches (2017-02-20) ctovision.com
Responsive Cookie Law Consent Notification (Miscellaneous) (2017-02-19) codecanyon.net
Seven Critical Steps to Revamp Your Enterprise Data Security (2017-02-17) dzone.com
Alphabets Eric Schmidt: Security Is Key For Preserving Internet As We Know It (2017-02-16) www.crn.com
Study: Majority of Oil and Gas Orgs Are Highly Vulnerable, Few Have Plans to Fix It (2017-02-16) continuum.cisco.com
Launching our public bug bounty program (2017-02-16) medium.com
A Developer’s Stages of Grief After a Failed Security Assessment: Part One (2017-02-16) dzone.com
Man in the Cloud Attacks: Prevention and Containment (2017-02-15) resources.infosecinstitute.com
IoT Security: A Ways To Go, But Some Interim Steps For Safety (2017-02-15) www.darkreading.com
The Human Factor Remains Strong In Data Breach Incidents (2017-02-15) www.cxotoday.com
F-Secure Sense IoT Security Device Coming Soon (2017-02-15) www.pcmag.com
Anomali Talks Threat Intelligence Info Sharing (2017-02-14) www.darkreading.com
London (API Summit) Calling: Is Your Modern Architecture Secure? (2017-02-14) www.forumsys.com
Intel Security Mends Cybersecurity Fragmentation with Unifying Strategy (2017-02-14) newsroom.intel.com
New Approach to Continuous Docker Container Security (2017-02-14) dzone.com
WordPress: A million sites defaced in attacker ‘feeding frenzy’ (2017-02-14) business-reporter.co.uk
ElasticSearch Ransomware Attacks Highlight Need for Better Security (2017-02-14) dzone.com
Majority of Companies Still Struggle to Find Qualified Security Candidates (2017-02-13) continuum.cisco.com
Qualys brings web application security automation to a new level (2017-02-13) www.helpnetsecurity.com
Attackers Deface 1.5M Sites Using WordPress API Vulnerability (2017-02-13) continuum.cisco.com
Yelp’s bug bounty improves security and attracts talent (2017-02-13) techcrunch.com
Tenable Network Security expands partner ecosystem (2017-02-13) www.comms-dealer.com
Channel Beat: ForeScout Technologies Announces a Partner Program, Cisco Umbrella Provides Secure Internet Gateway In Cloud (2017-02-10) www.crn.com
WordPress security weak spot lets hackers infiltrate and vandalise (2017-02-10) www.cbronline.com
Network Security Policy (2017-02-09) resources.infosecinstitute.com
Sports Direct hid data breach from staff (2017-02-09) www.bbc.co.uk
RSA 2017 prediction: endpoint security (2017-02-09) www.isvoc.com
Windows Trojan hacks into embedded devices to install Mirai (2017-02-09) www.pcworld.com
Hanwha Techwin Smart Security Manager (2017-02-09) ics-cert.us-cert.gov
New Platform for Security Analysts (2017-02-09) dzone.com
Enterprise firewalls are man-in-the-middling HTTPS sessions like crazy, and weakening security (2017-02-08) boingboing.net
Sophos Acquisition Targets Endpoint Security (2017-02-08) www.darkreading.com
Yahoo hit with data-breach class-action lawsuit claiming credit-card details stolen (2017-02-08) www.siliconbeat.com
HackerOne scores $40 million investment as bug bounty platform growth continues (2017-02-08) techcrunch.com
Visualizing 2016’s Top Threats (2017-02-08) blog.opendns.com
Facebook Aims To Shape Stronger Security Practices (2017-02-08) www.darkreading.com
Load balancing combines DDOS prevention with application performance (2017-02-08) itknowledgeexchange.techtarget.com
Dutch Voter Guide Website Leak Highlights Privacy Concerns (2017-02-08) www.darkreading.com
Is Multifactor Authentication The Best Way To Secure Your Accounts? Myths And Reality (2017-02-08) auth0.com
How Retail Firms Can Counter Cyber Threats In The Digital Age (2017-02-08) www.cxotoday.com
Draft: Financial Services – Financial API - Part 1: Read Only API Security Profile (2017-02-07) openid.net
802.11s Security and Google WiFi (2017-02-07) security.googleblog.com
Should Service Providers Turn DDoS Prevention into a Service? (2017-02-07) gigaom.com
Researchers’ quantum hacking machine may help protect against quantum computing hacks (2017-02-07) www.itsecurityguru.org
Akamai fortifies security solutions portfolio (2017-02-07) www.totaltele.com
Akamai Fortifies Web Security Solutions Portfolio (2017-02-07) www.benzinga.com
Akamai Beefs Up Web Security Services Line (2017-02-07) www.channelpartnersonline.com
Cryptkeeper Bug (2017-02-07) www.schneier.com
The Web Bluetooth Security Model (2017-02-06) medium.com
Darknet Forum Launches Its Own Bug Bounty Program (2017-02-06) continuum.cisco.com
A Hacker Just Pwned Over 150,000 Printers Left Exposed Online (2017-02-06) www.itsecurityguru.org
Email authentication: improving awareness and adoption with “Deliverability Checkup” (2017-02-06) blog.mailup.com
WordPress REST API Vulnerability is Being Actively Exploited, Hundreds of Thousands of Sites Defaced (2017-02-06) wptavern.com
Cybercriminals are biting into Android users’ banking data while banks not moving fast enough to adopt preventative technology (2017-02-06) www.itsecurityguru.org
Securing IoT devices from within (2017-02-06) gcn.com
When youre under cyberattack, silence isnt golden (2017-02-04) www.americanbanker.com
WordPress Quietly Fixes Serious Security Flaw (2017-02-03) www.darkreading.com
Banks Still Not Confident To Detect Cybersecurity Breach: Study (2017-02-03) www.cxotoday.com
How Google Took on Mirai, KrebsOnSecurity (2017-02-03) krebsonsecurity.com
50 Percent of Americans Don’t Trust Institutions to Protect Their Data (2017-02-03) www.itsecurityguru.org
IRS Warns Of New W-2 Phishing Attacks (2017-02-03) www.darkreading.com
InterContinental confirms payment card breach at 12 U.S. hotels (2017-02-03) www.reuters.com
Popular hacking tool, Metasploit security kit can now hack IoT devices... (2017-02-03) www.computermagazine.com
Children’s Medical Center Pays $3.2 Million Penalty Over Data Breach (2017-02-02) cyware.com
WordPress REST API Content Injection (2017-02-02) securityshelf.com
Metasploit Can Now Be Directly Linked To Hardware For Vulnerability Testing (2017-02-02) www.darkreading.com
Review of Approov for Mobile API Security (2017-02-02) nordicapis.com
NHS staff trigger Google cyber-defences (2017-02-01) www.bbc.co.uk
Disclosure of Additional Security Fix in WordPress 4.7.2 (2017-02-01) wp-cron.com
Real-Time Security for AWS (2017-02-01) dzone.com
WordPress Web API Vulnerability (2017-02-01) blogs.akamai.com
HPE Acquires Niara To Create What Keerti Melkote Is Calling The Industrys Top Visibility And Attack Detection System (2017-02-01) www.crn.com
Google Paid $3 Million To Bug Hunters In 2016 (2017-01-31) www.darkreading.com
Are IoT Devices Putting Your Organization at Risk? (2017-01-31) www.businessnewsdaily.com
An Introduction to Threat Intelligence Feeds (2017-01-31) dzone.com
Tax Identity Theft Awareness Week (2017-01-31) www.us-cert.gov
Feature announcement: two-factor authentication (2017-01-31) postmarkapp.com
Easy-to-exploit authentication bypass flaw puts Netgear routers at risk (2017-01-31) www.pcworld.com
Over 300 Bn Passwords Will Be Prone To Cyber Attacks By 2020: Report (2017-01-31) www.cxotoday.com
Why Do Spammers Love The Internet Of Things? (2017-01-31) ctovision.com
Cops use pacemaker data as evidence to charge homeowner with arson, insurance fraud (2017-01-30) www.networkworld.com
Data Asset Protection (2017-01-30) resources.infosecinstitute.com
Retailers, it’s time to reduce the hacker threat (2017-01-30) www.itsecurityguru.org
Securing APIs With Zato and Vault: Part I (2017-01-30) dzone.com
Netflix Scam Spreads Ransomware (2017-01-30) www.darkreading.com
Yahoo under SEC investigation for keeping the lid on data breaches for years (2017-01-23) thenextweb.com
BRIEF-Yahoo faces SEC probe over data breaches - CNBC, citing DJ (2017-01-22) www.reuters.com
Handling HTTPS Requests With Akka-HTTPS Server (2017-01-20) dzone.com
The command-line, for cybersec (2017-01-20) blog.erratasec.com
Comodo: Massive Talent Shortage Driving Business To Security-As-a-Service Providers (2017-01-20) www.crn.com
Barracuda Networks Brings DevOps Processes to IT Security (2017-01-20) www.itbusinessedge.com
Army bug bounty program pays hackers #039;around $100,000#039; (2017-01-20) thehill.com
App Security Improvements: Looking back at 2016 (2017-01-19) security.googleblog.com
IC3 Warns of Employment Scams Targeting College Students (2017-01-19) www.us-cert.gov
The 4 Top Barriers To Effective Incident Response (2017-01-19) www.darkreading.com
Security Awareness Training for the European Union General Data Protection Regulation (EU GDPR) (2017-01-19) resources.infosecinstitute.com
Building and Securing Koa and Angular 2 with JWT (2017-01-19) auth0.com
Dont Fall for This Sophisticated Gmail Phishing Scam (2017-01-19) www.pcmag.com
Hacking the Army (2017-01-19) techcrunch.com
Number Of Data Breach Disclosures Jumped 40% in 2016 (2017-01-19) www.darkreading.com
An Introduction to tmux (2017-01-19) resources.infosecinstitute.com
Attackers start wiping data from CouchDB and Hadoop databases (2017-01-19) www.pcworld.com
OptoNews: New blog posts on security in automation (2017-01-18) blog.opto22.com
Google reveals how it flagged 25,000 Android apps for malware (2017-01-18) thenextweb.com
Confessions of a “Hacker” and How to Protect Your Enterprise (2017-01-18) www.bmc.com
Mobile Security Gap Threatens Enterprises (2017-01-18) www.darkreading.com
Self-Service IT Thrives in the Clouds (2017-01-18) www.bmc.com
Endpoint Detection and Response: 3 Ways to Implement an EDR Capability in Your Security Program (2017-01-18) www.redcanary.com
Apex Predator: Everything You Need To Know About Alias Solutions (2017-01-17) dyn.com
API Security: An Overview (2017-01-17) dzone.com
Most Businesses Fail To Secure Customer Data: Study (2017-01-16) www.cxotoday.com
Critical flaw lets hackers take control of Samsung SmartCam cameras (2017-01-16) www.pcworld.com
EZVIZ Husky review: This weatherproof camera gives you an eye on the outside of your home (2017-01-16) www.pcworld.com
10 Security Vulnerabilities That Broke the World Wide Web in 2016 (2017-01-16) resources.infosecinstitute.com
It turns out that halfway clever phishing attacks really, really work (2017-01-13) boingboing.net
5 Fundamental Security Features your Industrial Assets Must Have (2017-01-13) blog.opto22.com
TruffleHog Sniffs Github for Secret Keys (2017-01-13) hackaday.com
Setting up DMARC to Defeat Email Abuse (2017-01-13) bhconsulting.ie
Dont Let Your Apps and Databases Become a Ransomware Targets: How to Protect Your Database (2017-01-13) dzone.com
Tweet: Amazon CloudWatch Logs receives Provisional FedRAMP-High Authorization to Process Sensitive Government Log Data.hellip; https://t.co/bTaIcBgkWy (2017-01-12) twitter.com
GitHub - google/key-transparency: A transparent and secure way to look up public keys. (2017-01-12) github.com
Twofish Power Analysis Attack (2017-01-12) www.schneier.com
Corporate financial data theft and customer information breaches are top two cyber concerns plaguing enterprises (2017-01-12) www.itsecurityguru.org
How we secure our infrastructure: a white paper (2017-01-12) cloudplatform.googleblog.com
Security Through Transparency (2017-01-12) security.googleblog.com
Security overtakes availability as main priority for application deployment (2017-01-12) www.itsecurityguru.org
EU Dissatisfied With US Clarification On Yahoo Secret Email Scan (2017-01-12) www.darkreading.com
Improving Visibility in Security Operations with Search-Driven Lookups (2017-01-11) blogs.splunk.com
Browser Autofill – Convenient, but Dangerous to Your Security (2017-01-11) www.eagleeyenetworks.com
Latest Trends in Cybersquatting (2017-01-11) resources.infosecinstitute.com
ISC Releases Security Updates for BIND (2017-01-11) www.us-cert.gov
Google’s Cloud Platform gets a new key management service (2017-01-11) techcrunch.com
Managing encryption keys in the cloud: introducing Google Cloud Key Management Service (2017-01-11) cloudplatform.googleblog.com
Google Cloud Platform launches Key Management Service in beta (2017-01-11) marketingnewsweb.wordpress.com
Credit Freeze: The New Normal In Data Breach Protection? (2017-01-11) www.darkreading.com
New Cybersecurity Regulation for NY Financial Services (2017-01-11) duo.com
Troy Hunt: A data breach investigation blow-by-blow (2017-01-10) www.troyhunt.com
The Best Techniques to Avoid Phishing Scams (2017-01-10) resources.infosecinstitute.com
Security talks at Google during the RSA Conference (2017-01-10) cloudplatform.googleblog.com
Gogo Inflight Wi-Fi Boosts Security with Bug Bounty Program (2017-01-10) www.eweek.com
FTC Offers $25K for IoT Security Fix (2017-01-10) www.pcmag.com
Extortionists Wipe Thousands of Databases, Victims Who Pay Up Get Stiffed (2017-01-10) krebsonsecurity.com
Bug Uncovered in St. Jude Medical Pacemakers, Defibrillators (2017-01-10) www.pcmag.com
Tweet: The GitHub Bug Bounty is turning three, which makes it about 95% potty trained. Let#039;s celebrate with payout bonuses! https://t.co/FbMRcNcjDd (2017-01-09) github.com
The Porcupine Attack: investigating millions of junk requests (2017-01-09) blog.cloudflare.com
Stock-tanking in St. Jude Medical security disclosure might have legs (2017-01-09) www.pcworld.com
Foundational Security Operations Concepts (2017-01-09) resources.infosecinstitute.com
Communications and Network Security (2017-01-09) resources.infosecinstitute.com
The Secrets of Wi-Fi Credentials (2017-01-09) www.codeproject.com
Security Governance Principals (2017-01-09) resources.infosecinstitute.com
Krebs’s Immutable Truths About Data Breaches (2017-01-09) krebsonsecurity.com
The CISSP CBK Domains: Info and Updates (2017-01-09) resources.infosecinstitute.com
Ransomware Attackers Are Going Old School with Social Engineering (2017-01-06) continuum.cisco.com
FTC Charges D-Link With Unsecure Routers And IP Cameras (2017-01-06) www.darkreading.com
OWASP Security Knowledge Framework: The Missing Tutorial (2017-01-06) dzone.com
New Android Malware Attacks Your Wireless Router Through Your Phone (2017-01-06) www.itsecurityguru.org
FTC Sues D-Link Over Insecure Routers, Cameras (2017-01-06) www.pcmag.com
D-Link Calls The FTCs Router And IP Camera Security Allegations Baseless (2017-01-06) www.crn.com
The Advantages and Benefits of Automating Web Security (2017-01-06) resources.infosecinstitute.com
Think Like a Hacker (2017-01-05) community.infoblox.com
The U.S. government showed just how easy it is to hack drones (2017-01-05) www.recode.net
The BC/DR Impact of GDPR (2017-01-05) www.itsecurityguru.org
UPDATE 1-U.S. sues D-Link, alleges lax security in routers, cameras (2017-01-05) www.reuters.com
MongoDB and Ransomware (2017-01-05) www.compose.com
FTC Files Complaint Against D-Link Over Router, Camera Security Issues (2017-01-05) www.crn.com
Feds allege security flaws in D-Link routers, cameras (2017-01-05) thehill.com
Mitigating Access Control Attacks (2017-01-05) resources.infosecinstitute.com
The (In)Security of IoT (2017-01-05) www.forumsys.com
Penetration Testing and the Law (2017-01-05) resources.infosecinstitute.com
Ghost Hosts Bypass URL Filtering (2017-01-05) www.darkreading.com
CISSP Risk Management Concepts 2 (2017-01-05) resources.infosecinstitute.com
Data breach exposes US Army doctor details (2017-01-04) www.itsecurityguru.org
FTC Launches Contest For Technology Tool To Protect Home IoT Devices (2017-01-04) www.darkreading.com
IT security sucks — part 2 (2017-01-04) blog.cloudpassage.com
System Configuration of Biometrics-The Network Topologies (2017-01-04) resources.infosecinstitute.com
The Maximus Smart Motion Security Light looks like it could light up a prison yard (2017-01-04) www.pcworld.com
Hackers could explode horribly insecure smart meters, pwn home IoT (2017-01-04) www.itsecurityguru.org
The FTC’s Internet of Things (IoT) Challenge (2017-01-04) krebsonsecurity.com
Bitdefender’s second Bitdefender Box sniffs your home’s network to detect hackers (2017-01-04) www.macworld.com
The future for APIs - how management and security will have to come of... (2017-01-04) www.idgconnect.com
FTC launches $25K internet-of-things security challenge (2017-01-04) thehill.com
Connect and HTTP Strict Transport Security (2017-01-03) blogs.adobe.com
Topps, maker of sports cards, discloses data breach (2017-01-03) www.itsecurityguru.org
Class Breaks (2017-01-03) www.schneier.com
The Age of Resilience – Security in 2017 (2017-01-02) techcrunch.com
OWL Insecure Internet of Energy Monitors (2017-01-02) hackaday.com
German fintech company N26 left red-faced after security hole discovered (2017-01-02) disruptiveviews.com
Be Prepared for Many More Data Breaches This Year (2017-01-02) www.cxotoday.com
The economics of mandatory security breach reporting to authorities (2016-12-30) cybersecurity.oxfordjournals.org
Risky business: Fine-grained data breach prediction using business profiles (2016-12-30) cybersecurity.oxfordjournals.org
Secure Messaging Takes Some Steps Forward, Some Steps Back: 2016 In Review (2016-12-29) www.eff.org
InterContinental Hotels Probes Possible Card System Breach (2016-12-29) www.darkreading.com
Effects of the 2011 DigiNotar Attack (2016-12-29) www.schneier.com
Introducing Advanced Features in Zoho Vault to Curb Security Threats and Boost Productivity (2016-12-29) www.zoho.com
NH Department of Health and Human Services Announces Data Breach (2016-12-29) www.itsecurityguru.org
The Bug Bounty Model: 21 Years Counting (2016-12-29) www.darkreading.com
Most Young Gig Economy Companies Way Behind On Protecting User Data: 2016 In Review (2016-12-29) www.eff.org
WordPress: block anonymous Rest API access (2016-12-28) www.ghacks.net
The 10 Biggest Data Breaches Of 2016 (2016-12-28) www.crn.com
Mozilla Releases Security Update (2016-12-28) www.us-cert.gov
Hide My WP - Amazing Security Plugin for WordPress! (2016-12-27) www.telechargementsz.com
The carrot and stick of data breaches (2016-12-27) techcrunch.com
8 Boldest Security Predictions For 2017 (2016-12-27) www.darkreading.com
WordPress: block anonymous Rest API access (2016-12-27) hacker-bot.tumblr.com
Ciscos Vision of Next Generation Cybersecurity (2016-12-19) guardtime.com
Project Wycheproof (2016-12-19) security.googleblog.com
LinkedIns skill learning unit Lynda.com hit by hack (2016-12-19) www.pcworld.com
In the Eye of Hailstorm (2016-12-19) blog.opendns.com
Insurers handling hundreds of breach claims (2016-12-18) www.bbc.co.uk
Britain urged to increase cyber security in financial services (2016-12-18) www.reuters.com
Top 5 REST API Security Guidelines (2016-12-18) news.securemymind.com
Bug Bounty: Is It The Right Solution to Catching Security Threats? (2016-12-18) dzone.com
What the Galactic Empire Could Learn From OWASP (2016-12-17) stormpath.com
Using Authy Two-Factor Authentication in Node.js and AngularJS (2016-12-16) dzone.com
Stolen Yahoo User Data Sold for $300K (2016-12-16) www.pcmag.com
Feedback from The Apache Software Foundation on the Free and Open Source Security Audit (FOSSA) (2016-12-16) blogs.apache.org
NAB accidentally sends out overseas customers banking details (2016-12-16) www.newsjs.com
Yahoo Data Breach: What Do I Do Now? (2016-12-15) www.privacyrights.org
Study: Bounty Hunters Expect Open Communication above Payouts (2016-12-15) continuum.cisco.com
Understanding Access Control (2016-12-15) resources.infosecinstitute.com
Security Operations (2016-12-15) resources.infosecinstitute.com
Yahoo Reveals Biggest Hack; Over 1Bn Accounts Compromised (2016-12-15) www.cxotoday.com
Microsoft Execs: Identity, Threat Intelligence Driving Companys Security Strategy (2016-12-15) www.darkreading.com
Data Center Physical Security (2016-12-15) resources.infosecinstitute.com
Software-defined security for burnout avoidance (2016-12-15) blog.cloudpassage.com
Database Architecture and Security (2016-12-15) resources.infosecinstitute.com
Confidential Blog Post On Email Security (2016-12-15) ctovision.com
Self-driving cars are prone to hacks — and automakers are barely talking about it (2016-12-15) www.businessinsider.com
Malvertising campaign targets routers and every device connected to router (2016-12-15) www.itsecurityguru.org
Embedded Devices and Cyber Security (2016-12-15) resources.infosecinstitute.com
Centralized Security Governance Practices To Help Drive Better Compliance (2016-12-15) blogs.adobe.com
Hurricanes, Earthquakes Threat Intelligence (2016-12-15) www.darkreading.com
Commerce survey: Cyber researchers fear legal repercussions (2016-12-15) thehill.com
Biometric Vehicle Access System Market by Authentication type, Future Technology, Vehicle Type, and Region - Global Forecast to 2021 (2016-12-14) oliberta.com
Security Assessment and Testing (2016-12-14) resources.infosecinstitute.com
Yahoo Says 1 Billion User Accounts Were Hacked (2016-12-14) www.nytimes.com
Yahoo discloses hack of 1 billion accounts (2016-12-14) thehill.com
Feature announcement: advanced permissions (2016-12-14) postmarkapp.com
Yahoo says one billion accounts exposed in newly discovered security breach (2016-12-14) www.reuters.com
Anti-Malware Is Necessary In The Data Center: 3 Examples (2016-12-14) www.darkreading.com
Vendor Accountability The Security Supply Chain (2016-12-14) www.darkreading.com
Scammers spreading celebrity nude PDFs on Facebook, pushing malware installation (2016-12-13) www.itsecurityguru.org
More cyber thefts, new hacking tactics confirmed by SWIFT (2016-12-13) disruptiveviews.com
FACT SHEET: Release of the Joint United States-Canada Electric Grid Security and Resilience Strategy (2016-12-13) ics-cert.us-cert.gov
Skype and WhatsApp face tougher EU customer data security rules (2016-12-13) disruptiveviews.com
Cyber attacks on Swift payment network are continuing – and are succeeding (2016-12-13) www.itsecurityguru.org
Signing into One Billion Mobile App Accounts Effortlessly with OAuth2.0 (2016-11-12) www.blackhat.com
Self-Propagating Smart Light Bulb Worm (2016-11-10) www.schneier.com
How Security Scorecards Advance Security, Reduce Risk (2016-11-10) www.darkreading.com
Open Database Exposes Millions of Job Seekers? Personal Information (2016-11-10) motherboard.vice.com
How to avoid a self-inflicted DDoS Attack (2016-11-09) cloudplatform.googleblog.com
Your Network, IoT, Cloud Computing, And The Future (2016-11-09) dyn.com
At last security for the IIoT is high on the agenda ? for most (2016-11-08) disruptiveviews.com
Managing Vendor Security Risk (2016-11-08) dzone.com
Limiting Damage from Data Breaches (2016-11-08) dzone.com
The 7 Types Of Security Jobs, According To NIST (2016-11-08) www.darkreading.com
Firefox Removing Battery Status API (2016-11-07) www.schneier.com
Changing IoT Passwords Wont Stop Attacks. Heres What Will. (2016-11-07) www.darkreading.com
Box beefs up cloud storage security and IT controls (2016-11-05) www.huntnews.in
How to Build Security Into the QA Cycle (2016-11-05) dzone.com
The Internet of Things Got Hacked (2016-11-03) blog.opto22.com
LastPass Offers Free Password Sync Across Devices (2016-11-03) www.darkreading.com
Heisenberg Cloud Spots Exposed Database Services, Misconfigurations (2016-11-03) www.darkreading.com
How Hackers Could Steal Your Cellphone Pictures From Your IoT Crock-Pot (2016-11-02) motherboard.vice.com
Why Light Bulbs May Be the Next Hacker Target (2016-11-02) www.nytimes.com
Hackers hustle to hassle un-patched Joomla! sites (2016-11-02) www.itsecurityguru.org
LastPass on mobile is now free (2016-11-02) techcrunch.com
A security breach greater than Gatsby (2016-11-01) blogs.ca.com
Google Security Engineer Claims Android Is Now As Secure as the iPhone (2016-11-01) motherboard.vice.com
NCCIC/ICS-CERT Advanced Analytical Laboratory Malware Trends White Paper (2016-11-01) ics-cert.us-cert.gov
Why Enterprise Security Teams Must Grow Their Mac Skills (2016-11-01) www.darkreading.com
Tips for Building a Safe and Secure API (2016-11-01) psdtoblog.wordpress.com
How Network Security is Compromised by Advanced Threats (2016-10-31) resources.infosecinstitute.com
Making Smart Cities Safe In The IoT Era (2016-10-31) www.cxotoday.com
Microsoft Launches Security Program For Azure IoT (2016-10-31) www.darkreading.com
IT Asset Management: A Key in a Consistent Security Program (2016-10-21) blogs.adobe.com
?The need to stay alert as data breach costs rise? (2016-10-21) www.itsecurityguru.org
Flipping Security Awareness Training (2016-10-21) www.darkreading.com
ThreatConnect Shares Incident Information on a Phishing Page Serving Fake Login for University (2016-10-21) www.threatconnect.com
The Importance of Securing Your Database (and the Cost of Failure) (2016-10-20) dzone.com
7 Great Tips to Get the Most Out of Your Threat Intelligence with Infoblox (2016-10-20) community.infoblox.com
Survey findings reveal that most businesses don?t have comprehensive programs to tackle firmware security risks (2016-10-19) www.itsecurityguru.org
The Dangers of In-Flight Wi-Fi: Airplanes ?Unique? Hacking Grounds (2016-10-19) netguide.co.nz
ThreatConnect Shares Incident Information on Major Financial Institution Domain Squat (2016-10-19) www.threatconnect.com
Walking the Tight Rope of REST API Security: Best Practices Will Hold You Steady (2016-10-19) blog.smartbear.com
How Vendors Are Moving Beyond IoT Security Concerns (2016-10-19) www.crn.com
Grey Hats and Blue Skies, Dealing with Airline Security (2016-10-19) www.csoonline.com
In-Flight Wi-Fi: Latest Attack Vector for Cyber Theft Requires VPN Protection (2016-10-19) www.itwire.com
How to Protect Civil Aviation From Cyberattacks (2016-10-19) aviationweek.com
Warning About In-Flight Wi-Fi (2016-10-19) www.photoreview.com.au
SITA Completes ISO Certification for Information Security at Changi Airport (2016-10-18) airfax.com
Public Wi-Fi Use Grows, Despite Security Risks (2016-10-18) www.darkreading.com
RSA Execs: Future Is Bright For Security Partners (2016-10-18) www.crn.com
How We See the Future of Information Security (2016-10-17) resources.infosecinstitute.com
WhatsApp has made too many compromises that put user security and privacy at risk. (2016-10-15) www.eff.org
Security Insights into the LXD Container Hypervisor (2016-10-15) www.infoq.com
Instegogram: Leveraging Instagram for C2 via Image Steganography (2016-10-14) www.endgame.com
Splunk Cisco Web Security Appliance (WSA) ? BFF: ?Dear IT-Admin: My Internet is so slow? (2016-10-14) blogs.splunk.com
VMware vSphere hardening for virtual machine security with Puppet (2016-10-14) puppet.com
12-year-old SSH vulnerability in IoT devices being abused (2016-10-13) www.itproportal.com
ICS-CERT issued advisory ICSA-16-287-01 OSIsoft PI Web API 2015 R2 Service Acct Permissions Vuln to ICS-CERT (2016-10-13) ics-cert.us-cert.gov
Keep IoT A-OK ? Hackers Capitalise on Software Vulnerabilities (2016-10-13) www.itsecurityguru.org
Vera Bradley Stores Report Payment Card Breach (2016-10-13) www.darkreading.com
Internet Routing Security Effort Gains Momentum (2016-10-13) www.darkreading.com
IoT Devices as Proxies for Cybercrime (2016-10-13) krebsonsecurity.com
IoT Default Passwords: Just Dont Do It (2016-10-13) www.darkreading.com
Almost 6,000 online shops hit by hackers (2016-10-13) www.bbc.co.uk
7 Ways Electronic Voting Systems Can Be Attacked (2016-10-13) www.darkreading.com
Eko Malware Targets Facebook Users (2016-10-12) www.itsecurityguru.org
Attackers Exploit Weak IoT Security (2016-10-12) www.darkreading.com
Security Awareness Training Anti-Phishing Simulation (2016-10-11) securityiq.infosecinstitute.com
Say Cheese - a snapshot of the massive DDoS attacks coming from IoT cameras (2016-10-11) blog.cloudflare.com
A new security imperative (2016-10-11) blogs.ca.com
NTT Security Standardizes Managed Security Services Offerings On Qualys (2016-10-11) www.crn.com
BRIEF-Prevas participates in research project within IoT security (2016-10-11) www.reuters.com
DDOS Protection for Public Cloud Customers (2016-10-11) resources.infosecinstitute.com
Where Is Your Data Safer? In the Cloud Or On Premise? (2016-10-11) resources.infosecinstitute.com
Tweet: Europe to push new security regulations amid IoT mess https://t.co/0ZtGpQsek6 (2016-10-10) krebsonsecurity.com
Securing the Digital Enterprise with API Management (2016-10-10) www.tibco.com
Should the Government Be More Involved in IoT Security? (2016-10-10) continuum.cisco.com
Black Hat Europe 2016: BooleBox: A New Perspective On Enterprise Data Protection (2016-10-10) www.darkreading.com
Data Science Security: Overcoming The Communication Challenge (2016-10-07) www.darkreading.com
Bruce Schneier: ?We Need to Save the Internet From the Internet of Things? (2016-10-07) motherboard.vice.com
Software-Defined Security: The Missing Piece in Your SDDC Strategy (2016-10-07) sdn.cioreview.com
Tweet: Apigee Sense Protection: Take action on threats to your #APIs https://t.co/Ozl1stzpLB (2016-10-06) twitter.com
Arizona Official Says Hack Of Voter Data Came Via Employee Email (2016-10-06) www.darkreading.com
Apigee Sense Protection: Act on Threats to Your APIs (2016-10-06) apigee.com
Urgent security shift required as severity of data breaches continues (2016-10-06) www.itsecurityguru.org
Group Security in the Firebase Database (2016-10-06) firebase.googleblog.com
OTA Issues Checklist For Securing IoT Devices (2016-10-05) www.darkreading.com
BRIEF-U.S. Department of Homeland Security warns on vulnerabilities in JJ insulin pumps (2016-10-05) www.reuters.com
Defining Security Automation Goals (Part I) (2016-10-04) blogs.adobe.com
Organisations a long way from plugging the gaps in their IT estate to prevent data leakage (2016-10-04) www.itsecurityguru.org
Securing Every Application (2016-10-04) duo.com
Johnson Johnson says insulin pump could be hacked (2016-10-04) www.bbc.co.uk
Assembling a Container Security Program [New Series] (2016-10-04) www.securosis.com
Have hackers turned my printer into an offensive weapon? (2016-10-04) www.bbc.co.uk
Some insulin pumps vulnerable to hacks (2016-10-04) thehill.com
Akamai buys Soha Systems to add more security to its cloud networking business (2016-10-04) techcrunch.com
Akamai acquires enterprise security firm Soha (2016-10-04) www.zdnet.com
Is WhatsApp Hacked? (2016-10-04) www.schneier.com
Homeland Security Warns Certain Huawei Devices Vulnerable To DDoS (2016-10-04) www.itsecurityguru.org
IoT botnet highlights the dangers of default passwords (2016-10-03) www.pcworld.com
Who Makes the IoT Things Under Attack? (2016-10-03) krebsonsecurity.com
Security Design: Stop Trying to Fix the User (2016-10-03) www.schneier.com
Box Introduces Four New Security and Governance APIs (2016-10-02) www.infoq.com
Tweet: How to ensure your #APIs aren#039;t naked https://t.co/uMVx2xRuLe #Security https://t.co/GMocO04tBk (2016-10-01) twitter.com
Your next DDoS attack, brought to you courtesy of the IoT (2016-10-01) boingboing.net
What Does the Massive Yahoo Hack Mean for Banks? (2016-10-01) bankinnovation.net
Ransomware spreads through weak remote desktop credentials (2016-09-30) www.pcworld.com
Yahoo hack may become test case for SEC data breach disclosure rules (2016-09-30) www.reuters.com
EFF Asks Court to Block U.S. From Prosecuting Security Researcher For Detecting and Publishing Computer Vulnerabilities (2016-09-30) www.eff.org
Eight Big Data Security Issues in the Enterprise (2016-09-30) dzone.com
A Yahoo insider believes the hackers could really have stolen over 1 billion accounts (YHOO) (2016-09-30) www.businessinsider.com
Time to Kill Security Questions?or Answer Them With Lies (2016-09-29) www.wired.com
Data Protection By Design (2016-09-29) pkware.cachefly.net
A Bug Bounty Reality-Check (2016-09-29) www.darkreading.com
Army of webcams used in net attacks (2016-09-29) www.bbc.co.uk
Fear Loathing In The Cloud (2016-09-29) www.darkreading.com
Containers, Security, and Double Dipping (2016-09-29) dzone.com
NHS Digital aims to put healthcare on firm cyber security footing (2016-09-29) www.itsecurityguru.org
Enhanced third-party access protection for Google Sheets (2016-09-29) gsuite-developers.googleblog.com
Cloudflare#039;s Traffic Control Could Be Used to Target Specific API Security Concerns (2016-09-29) www.programmableweb.com
Improving Security Savvy Of Execs And Board Room (2016-09-28) www.darkreading.com
How to Engage Developers in App Security (2016-09-28) dzone.com
Progress on security for the Industrial Internet of Things (2016-09-28) disruptiveviews.com
Why and How Every Organization With APIs Must React Immediately to the Yahoo! Breach (2016-09-28) www.programmableweb.com
OnHub: Powerful protection for peace of mind (2016-09-28) security.googleblog.com
Yahoo failed to prioritize security: report (2016-09-28) thehill.com
Malware Tries to Detect Test Environment (2016-09-28) www.schneier.com
Dont Hide DRM in a Security Update (2016-09-28) www.eff.org
More Than Half Of IT Pros Employ Insecure Data Wiping Methods (2016-09-28) www.darkreading.com
API Security: Keeping Data Private but Accessible (2016-09-28) dzone.com
Fast Security Is Not Always High Security (2016-09-28) dzone.com
Invest in Cloud Security With a 4-Point Plan (2016-09-28) dzone.com
Securing Your IoT Deployment (2016-09-27) www.codeproject.com
Automation, AI among key takeaways for security execs, ecosystem (2016-09-27) www.zdnet.com
Microsoft leads $9 million investment round in container security startup Aqua Security (2016-09-27) www.zdnet.com
Will Yahoo?s Data Breach Help Overhaul Online Security? (2016-09-27) knowledge.wharton.upenn.edu
Yahoo Sued By User Over 2014 Hacking (2016-09-27) www.darkreading.com
Spamhaus Warns of a Rise in IPv4 Network Hijacks (2016-09-27) www.itsecurityguru.org
Yahoo! data dump indicates need for web monitoring (2016-09-27) www.itsecurityguru.org
MA: Is Security Industry Set For A Paradigm Shift? (2016-09-27) www.cxotoday.com
Hack It Yourself Before Getting Hacked (2016-09-27) www.cxotoday.com
Skyhigh Networks raises $40m funding to tap cloud security market (2016-09-26) www.cbronline.com
Reshaping web defenses with strict Content Security Policy (2016-09-26) security.googleblog.com
State Of The Exploit Kit (2016-09-26) www.darkreading.com
Partners Cheer Microsofts Product Moves Around Security, Cloud And Containers (2016-09-26) www.crn.com
API Best Practices: Security (2016-09-26) apigee.com
How Dropbox Scaled and Secured their API (2016-09-24) www.programmableweb.com
Securing API against DDoS attacks (2016-09-23) security.stackexchange.com
Box Announces Four New Security and Governance APIs (2016-09-22) www.programmableweb.com
Why it?s time to start developing a drone security strategy (2016-09-22) www.networkworld.com
7 Ways Cloud Alters The Security Equation (2016-09-22) www.darkreading.com
HTML standardization group calls on W3C to protect security researchers from DRM (2016-09-22) www.eff.org
DHS Assistant Secretary: Internet Of Things Security Is A Public Safety Issue (2016-09-22) www.crn.com
7 Factors That Make Security Organizations More Effective (2016-09-22) www.darkreading.com
How Security Enables Digital Transformation (2016-09-22) dzone.com
10 Ways To Lock Down Third-Party Risk (2016-09-22) www.darkreading.com
Study finds smart home tech gaining in popularity, yet still woefully insecure (2016-09-21) www.itsecurityguru.org
Kaspersky Lab Expands Its Threat Intelligence Platform (2016-09-21) www.cxotoday.com
Insurer Warns of Drone Hacking Threat (2016-09-20) www.infosecurity-magazine.com
PowerUpSQL - A PowerShell Toolkit for Attacking SQL Server (2016-09-20) www.digitalmunition.me
GitHub - massivedynamic/openftp4: A list of all FTP servers in IPv4 that allow anonymous logins. (2016-09-20) github.com
Internet of Things Security from the Ground Up (2016-09-20) www.codeproject.com
More Than 90 Percent of European Businesses Have Been Hit by a Data Breach (2016-09-20) continuum.cisco.com
BooleBox: The Top Secure Solution To Protect Your Companys Sensitive Data (2016-09-20) www.darkreading.com
Rise Of Machine Learning: Advancing Security With ML (2016-09-20) www.darkreading.com
Hacking WordPress Sites on Shared Servers (2016-09-19) blog.sucuri.net
Industrial IoT is inching toward a consensus on security (2016-09-19) www.pcworld.com
What Smart Cities Can Teach Enterprises About Security (2016-09-19) www.darkreading.com
Industrial Internet Consortium Delivers Industrial Internet Security Framework (2016-09-19) dzone.com
Demystifying Threat Intelligence (2016-09-19) community.infoblox.com
Researcher Finds Nearly 800,000 FTP Servers Accessible without Authentication (2016-09-19) continuum.cisco.com
Webroot Expands Network Security, IoT Capabilities With Acquisition Of CyberFlow Analytics (2016-09-19) www.crn.com
Google Safe Browsing API is here to make Android apps a whole lot safer from malware (2016-09-15) www.digitaltrends.com
Data Loss Risks Rise In The Age Of Collaboration (2016-09-15) www.darkreading.com
Security through Community: Introducing the Vendor Security Alliance (2016-09-15) blog.docker.com
Google Chrome To Flag Non-HTTPS Logins, Credit Card Info Not Secure (2016-09-15) www.darkreading.com
Stop Blaming Users. Make Security User-Friendly. (2016-09-15) www.darkreading.com
Use Intelligent IPAM to Better Secure your Network from Rogue and Infected Devices (2016-09-15) community.infoblox.com
Keep It Simple: Security For A Complex Enterprise (2016-09-14) www.darkreading.com
A total of 89 per cent of users wouldn?t know if their mobile device had been cyber attacked (2016-09-14) www.itsecurityguru.org
Volkswagen is founding a new cybersecurity firm to prevent car hacking (2016-09-14) www.pcworld.com
324,000 Financial Records with CVV Numbers Stolen From A Payment Gateway (2016-09-14) www.itsecurityguru.org
Zero-day vulnerability found within MySQL database application (2016-09-13) www.zdnet.com
Security Certifications Highly Valued But Not Always Verified (2016-09-13) www.darkreading.com
How To Ensure Service Delivery: During DDoS Attacks (2016-09-13) dyn.com
Beware the Drive-by Attack (2016-09-13) www.itsecurityguru.org
A Moving Target: Tackling Cloud Security As A Data Issue (2016-09-13) www.darkreading.com
Portrait Of A Bug Bounty Hacker (2016-09-13) www.darkreading.com
The USB Killer Now Has Commercial Competition (2016-09-13) hackaday.com
Application Firewall for Cisco ACI (2016-09-12) marketplace.cisco.com
Paladion Networks Launches New Security Service (2016-09-12) www.cxotoday.com
The IoT and Cloud security measures ? not as well developed as needed (2016-09-12) www.designworldonline.com
Hypervisor security ero-Xen: How guest VMs can hijack host servers (2016-09-10) www.theregister.co.uk
Tweet: Cloudflare has graciously arranged to host the vDOS attack log, which is pretty large as text files go https://t.co/gfK3VdR0zn (2016-09-09) twitter.com
USBKill Power Surge Test Tool can Blow Up and Damage Any PC, Laptop or TV (2016-09-09) www.itsecurityguru.org
Intel Spins Off McAfee to Private Equity Firm (2016-09-09) www.pcmag.com
The dangers of connecting phones to connected cars (2016-09-09) www.itsecurityguru.org
Leading Cybersecurity Companies Create Connected Security Alliance to Solve the Data Breach Problem (2016-09-09) www.itsecurityguru.org
The How and Why of Container Vulnerability Management (2016-09-09) blog.openshift.com
App Shopper: AntiKeylogger Doctor - AntiVirus keylogger scanner remover (Utilities) (2016-09-08) appshopper.com
Clash of Ops: How Security turns Stateless into Stateful (2016-09-08) devcentral.f5.com
IoT Pilots should include basic security functional elements for experience Mastering IoT security means mastering new security techniques | Constellation Research Inc. (2016-09-08) www.constellationr.com
Chromium Blog: Moving Towards a More Secure Web (2016-09-08) blog.chromium.org
A Software-Defined Approach to Networking and Security (2016-09-08) thenewstack.io
Next-generation security means a step beyond people, process and technology (2016-09-08) www.itsecurityguru.org
HackProof Systems Challenges Hackers To Breach Server Security (2016-09-08) www.darkreading.com
Data hoarders are shining a spotlight on past breaches (2016-09-08) www.pcworld.com
Yelp Launches Public Bug Bounty Program (2016-09-08) www.pcmag.com
Hedge Fund and Cybersecurity Firm Team Up to Short-Sell Device Maker (2016-09-08) www.nytimes.com
Partners, Analysts Thrilled By Intel Security Deal To Become Stand-Alone Security Vendor (2016-09-08) www.crn.com
The Security Risks of Third-Party Data (2016-09-08) thelasttechie.com
Help Us to Help You Get to the Next Big Thing in DNS Security (2016-09-08) community.infoblox.com
Securing the Skies: Cybersecurity in Aviation (2016-09-08) www.csoonline.com
One Cryptomalware Attack Can Cost an SMB up to $99K (2016-09-08) www.itsecurityguru.org
Chrome to start labeling HTTP connections as non-secure (2016-09-08) www.zdnet.com
Google Chrome to start marking HTTP connections as insecure (2016-09-08) www.pcworld.com
Printers now the least-secure things on the internet (2016-09-08) www.itsecurityguru.org
Tweet: How to steal any developer#039;s local database https://t.co/uJSIznIkYx by @bvdbijl (2016-09-07) twitter.com
Brazzers Porn Forum Hacked, User Data Exposed (2016-09-07) www.pcmag.com
ISPs treat cyber security as a top priority (2016-09-07) www.itsecurityguru.org
Data Breaches At U.S. Office Of Personnel Management Was Preventable, Investigation Finds (2016-09-07) www.huffingtonpost.com
The security industry needs updating ? not just the cyber one (2016-09-07) disruptiveviews.com
Intel Security Spins Off To Private Equity In $4.2B Deal (2016-09-07) www.crn.com
Optimizing time allocation for network defence (2016-09-07) cybersecurity.oxfordjournals.org
Get Smarter About Threat Intelligence (2016-09-07) www.darkreading.com
Gugi malware targets Android banking apps, bypasses Marshmallow permission feature (2016-09-07) www.itsecurityguru.org
How Can I Move To Public Cloud And Still Stay Secure? (2016-09-07) dyn.com
Tweet: How Dwolla reduced fraud by 50% with Sift Science https://t.co/cYE2FfTFGg https://t.co/HM2gjcaqI5 (2016-09-06) twitter.com
Cryptographic Key Reuse Remains Widespread In Embedded Products (2016-09-06) www.darkreading.com
ITOps in the Modern Ops World (2016-09-06) dzone.com
Yelp Offers Up To $15K Per Bug Via New Bounty Program (2016-09-06) www.darkreading.com
How security enables digital transformation (2016-09-06) blogs.ca.com
We Build Security for People (2016-09-06) duo.com
?Catastrophic? DDoS Attack Pummels Linode Servers over Labor Day Weekend (2016-09-06) www.itsecurityguru.org
Explore Docker Images For Security Concerns (2016-09-05) dzone.com
Cloud Security Alliance: 10 Ways To Achieve Access Control For Big Data (2016-09-03) www.darkreading.com
43M Last.fm Passwords Hacked in 2012 Breach (2016-09-03) www.pcmag.com
New cloud attack takes full control of virtual machines with little effort (2016-09-02) arstechnica.com
VMworld: Can you trust your API? (2016-09-02) www.welivesecurity.com
Point-of-sale data breaches have now reached the cloud (2016-09-02) www.pcworld.com
MedSec/Muddy Waters The Future Of IoT Security (2016-09-02) www.darkreading.com
Content Security (DRM) with the Native Player SDKs (2016-09-02) docs.brightcove.com
$40 Homemade ?Arduino radio device? can Intercept Vehicle Key Fobs ? More Than 100 Million Cars are Vulnerable (2016-09-02) blog.adafruit.com
43 million Last.fm users passwords were stolen, so stop using that one old password already (2016-09-02) www.businessinsider.com
Learn How to Encrypt your Data and Security Best Practices (2016-09-01) www.ctl.io
Hackers Had Access to OneLogIn Data for More Than a Month (2016-09-01) www.infosecurity-magazine.com
Security Weekly #478 ? Heather Mahalik, SANS (2016-09-01) securityweekly.com
Alarms are being raised about connected vehicle security (2016-09-01) disruptiveviews.com
New standard in firewall change automation released by FireMon (2016-09-01) www.itsecurityguru.org
FairWare ransomware infects servers through exposed Redis instances (2016-09-01) www.pcworld.com
Social Media Fraud Spikes, Study Finds (2016-09-01) www.darkreading.com
Hackers use BMW, Amazon and Chanel brands to launch social media attacks (2016-09-01) www.itsecurityguru.org
Swisscom deploys BICS crowdsourcing solution FraudGuard (2016-09-01) disruptiveviews.com
SWIFT Reveals New Hacking Attempts On Member Banks (2016-09-01) www.darkreading.com
Security Best Practices for Kubernetes Deployment (2016-09-01) blog.kubernetes.io
Last.fm breach from 2012 affected 43 million users (2016-09-01) www.pcworld.com
Password-Stealing Trojan Now Also Attacks With Cerber Ransomware (2016-09-01) www.darkreading.com
Password Expiration (2016-09-01) www.infosecblog.org
Platform Security (2016-09-01) developer.samsung.com
Vulnerabilities found in cars connected to smartphones (2016-09-01) www.itsecurityguru.org
The Problem with Securing Single Page Applications (2016-08-31) stormpath.com
How Point of Sale Breaches Happen (2016-08-31) www.bitsighttech.com
How to Bring Security Best Practices to Life in Your Organization (2016-08-31) www.infosecurity-magazine.com
Flaw in Facebook password resets could allow random account takeovers; severity of bug disputed (2016-08-31) www.scmagazine.com
InterContinental unit Kimpton Hotels hit by payment card data breach (2016-08-31) www.reuters.com
Using Azure AD Service Principals to Secure Applications (2016-08-31) dzone.com
More Than 40% Of Attacks Abuse SSL Encryption (2016-08-31) www.darkreading.com
Security Weekly #478 ? Security News (2016-08-31) securityweekly.com
After Breaches At Other Services, Spotify Is Resetting Users Passwords (2016-08-31) motherboard.vice.com
Stateless Sessions for Stateful Minds: JWTs Explained and How You Can Make The Switch (2016-08-31) auth0.com
Intruders Pilfered Over 68 Million Passwords In 2012 Dropbox Breach (2016-08-31) www.darkreading.com
The Dropbox hack is real (2016-08-31) www.itsecurityguru.org
Dropbox hack affected 68 million users (2016-08-31) www.bbc.co.uk
Social Engineering?s Role in Malicious Macros and OLE (2016-08-30) www.itsecurityguru.org
More Than 1 Million IoT Devices Compromised by Single Malware Family (2016-08-30) continuum.cisco.com
Can Security-as-a-Service help UK businesses plug the skills deficit? (2016-08-30) www.itsecurityguru.org
NGINX Release Targets Application Security (2016-08-30) www.infoq.com
1.7 Million Opera Sync Users May Have Been Affected by Data Breach (2016-08-30) www.itsecurityguru.org
Balancing security and convenience in online commerce (2016-08-30) www.itsecurityguru.org
Should We Have a Standardized Score for Data Brea