When AV software programs are designed independently, it is only natural that there is competition for resources in the zero-sum field in which they are playing.
According to X-Force Red data, the number of vulnerabilities exposing industrial control systems has increased 83 percent since 2011. Should organizations test them and risk destabilizing operations?
Before the first round of the Ukraine election in March, we decided that we couldn't afford to sit on our heels until an attack was launched.
Digital attackers used more than a dozen web servers to host 10 malware families and distributed those threats using phishing emails.
Security researchers discovered that attackers are using fake copyright infringement notifications as part of a recent Instagram hacking campaign.
Internal assessments and audits are necessary, but they have their limitations. Some outside assistance could help improve your security hygiene and inoculate you from the nastiest of cyber bugs.
The lure of social media is too much to fight against. Instead of pushing back, we need to work with what we've got and do our best to educate employees about potential social media attacks.
By completing the phases of the system development life cycle (SDLC), security teams can integrate processes and technologies into the development process and improve application security.
To ring in the new year, application security teams should resolve to implement more security into the development process, prioritize consumer trust and pay more attention to false negatives.
Dimitry Snezhkov didn't touch a computer until he was 18. Now he spends his days penetration testing to uncover security gaps and his nights meditating on the balance of life.