Hacking groups that make up Magecart are effective and persistent at stealing customer and payment card data through skimmers. Here's how they work and what you can do to mitigate the risk.
David Strom |
26 Dec |
Read more
SSO can reduce the risk of weak passwords and administrative overhead associated with managing account access. These are the top single sign-on solutions to consider.
David Strom |
15 Jul |
Read more
Okta, OneLogin score high in test of solutions that beef up app security and cut help desk calls.
David Strom |
27 Jun |
Read more
Not every organization that needs a security operations center can afford to equip and staff one. A number of providers provide SOC as a service. Here's what you need to know about them.
David Strom |
29 Apr |
Read more
Slack does a good job of protecting its own code, but you'll need help to stop malware delivered through Slack messages or to avoid exposing personal information.
David Strom |
27 Nov |
Read more
Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Checking for security flaws in your applications is essential as threats become more potent and prevalent.
David Strom |
25 Oct |
Read more
The ATT&CK framework allows security researchers and red teams to better understand hacker threats.
David Strom |
03 Apr |
Read more
Running your own CTF contest can build security skills and help identify new internal and external talent. Learn what types of challenges you need to include, how to make the contest run smoothly, and other logistics to consider.
David Strom |
06 Mar |
Read more
The three main email security protocols complement one another, so implementing them all provides the best protection. That’s easier said than done, but these tips can help.
David Strom |
14 Feb |
Read more
New ‘smart’ tokens and risk-based factors deliver tighter security, but setups remain complex and user interfaces need a facelift.
David Strom |
06 Jun |
Read more
I once co-wrote a book on enterprise email where I likened email encryption to a "sucking chest wound." That was in 1997, when you had to do all the encryption key management on your own, a daunting task to say the least.
David Strom |
22 Jul |
Read more
There are plenty of cities in the U.S. that want to lay claim to becoming the "next" Silicon Valley, but a dusty desert town in the south of Israel called Beersheva might actually have a shot at becoming something more modest, and more focused. They want to be the first place you think about when it comes to cybersecurity research, education, and innovation. If things go right there, it may well happen.
David Strom |
11 Mar |
Read more
If you are ultra paranoid, what could be better than hiding your network traffic in such a way that no one could possibly intercept it? This is what Unisys is offering with its new Stealth appliance, which could make man-in-the-middle attacks and keylogger exploits obsolete, or at least more difficult to mount.
David Strom |
05 May |
Read more
These four products represent different approaches to VM security
David Strom |
11 Mar |
Read more
Passwords are a security weak link, but these products help shield passwords from attackers
David Strom |
09 Sep |
Read more