Trusted Sources for Threat Intelligence and Cybersecurity Information

Just how in the heck does a cybersecurity professional stay on top of the rapidly evolving threat landscape, the ever changing attacks and exploits, and new security solutions? I can assure you it involves a lot of reading.

Last month the Twin Cities chapter of (ISC)2 held a meeting on the topic of trusted sources for threat intelligence.  It seemed like a great topic idea, so I decided to share my list ...

Continue Reading →
1

Top 10 Most Popular Endpoint Anti-Malware Products

Which anti-malware product is the best?  Test results from companies like AV-Test and AV-Comparatives are great places to find that answer, and we outline that below.  OPSWAT recently released their 2019 Windows Anti-Malware Market Share Report, which takes a look at the most popular anti-malware products, or at least the most frequently installed. OPSWAT did not include Windows ...

Continue Reading →
2

Guest Post – Cybersecurity Trends to Know in 2019

Here’s a contribution from Orla Forrest at Irish cloud services provider Paradyn.


In this guide, we examine some emerging innovations that are helping organisations to bolster their security in 2019.

In 2019, organisations are facing an ever-growing range of cyber-threats. In fact, according to a 2018 study from Bromium, the cybercrime economy was estimated to be worth $1.5 trillion. ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


8 Shopping Tips for the Holiday Season

November 2019 Volume 14 Issue 11

From the desk of Thomas F. Duffy, MS-ISAC Chair

It’s that time of year again, holiday shopping has begun! Everyone is looking for those unique gifts, hot toys and cool electronics. Whether it is a hard-to-find toy for kids or the latest 4K ...

Continue Reading →
0

Mis-Adventures in Biometrics

Recently there were a couple of notable fails in biometric authentication.  The fingerprint reader in Samsung’s Galaxy S10 and Note10 smartphones will allow any finger to open the phone if the user has installed a cheap screen protector film.  In security parlance, this is a “fail-open” or “false positive” scenario.  An update is pending.  And Google’s new Pixel 4 phone’s facial recognition ...

Continue Reading →
0

What The Heck Is A Zero-Day?

What is a “zero-day,” exactly?   In information security, occasionally there is a brand new cybersecurity vulnerability or exploit in the news, and the reporter calls it a “zero-day” exploit.  What are they talking about.  This is a concept similar to “patient zero” in medical epidemiology. This is where the bad thing started to happen.

A zero-day vulnerability is a ...

Continue Reading →
0
Page 31 of 107 «...10202930313233...»