Home News Page 2

News

How to Become a Cyber Security Professional

If you want to switch to a career in cybersecurity, this is how you can get started By Ehtisham Hussain, Content Marketing Manager, QuickStart At the time this article is being written, there are more than 35,000 cybersecurity jobs posted on...

Lack of Infosec & Devsecops

Roots at  the college level By DRP; Cybersecurity Lab Engineer The InfoSec field and industry continue to grow at an outstanding pace. This is being driven by many market forces, including the increase in attacks, malware being released into the wild,...

Seeing Around Corners: Operatively-Sourced Intel Predicted a Ransomware Outbreak

Operatively-sourced intelligence signaled the rise of petya ransomware as early as January 2017... A game of cyber "cat and mouse" on a global level. By Byron Rashed, Vice President of InfoArmor, Inc. By the end of June 2017, the Petya ransomware...

Malvertising – Advertising, But With A Hook That Hurts, And Hurts Again

By Chris Olson, CEO of The Media Trust Malvertising, a combination of malware and advertising, has more than doubled in the past three years and is increasingly found on premium websites that are typically whitelisted by enterprises for employee internet...

What Is Old Is New Again

A new application for old attack                                                                   ...

Brazilian “Car Wash” Task Force: Cyber Security Lessons

By Rodrigo Ruiz & Rogério Winter The creators of House of Cards have publicly stated that their work is Discovery Kids. Brazil already stars in a reality show worthy of Discovery ID. The world follows our events as if they...

Cyber Defense Perspectives For 2018

By Milica D. Djekic 2017 is at its end and we are easily approaching 2018. Many people would happily wait for a New Year, but is that the case with cybersecurity? What would be new in that area with the...

White House Release of Vulnerabilities Equities Process Validates Industry Concerns

By Willis McDonald, Threat Research Manager and Senior Threat Research, Core Security When the U.S. Government discovers an unpatched vulnerability, it has a choice: disclose the vulnerability to the vendor so that it can be patched, or exploit the vulnerability...

US Agency Security Doubts Hinder Move To Hybrid Cloud

By Felipe Fernandez For the past seven years, the U.S. Office of Management and Budget has been pushing Federal agencies to move much of their computing workloads to the cloud. And yet, progress has been slow, with only about $2...

Penetration Testing Certification: How To Get & Why Go For It

ScienceSoft’s certified ethical hacker Uladzislau Murashka dwells on CEH certification By Uladzislau Murashka, Certified Ethical Hacker, ScienceSoft As cybersecurity threats grow in sophistication, a need for advanced approaches to penetration testing grows as well. At the same time, security professionals capable...

STAY CONNECTED

36,289FansLike
55,488FollowersFollow
Show Buttons
Hide Buttons