The increasing demand for open source technologies among government agencies offers a cost benefit, but if not properly monitored, the code poses security risks
Kacy Zurkus |
02 Sep |
Read more
Diverse group of security experts weigh in on strategies and best practices for making security everybody's job at MASSTLC
Kacy Zurkus |
01 Sep |
Read more
Social media sites, largely outside of enterprise control, are rich with personal information for malicious actors
Kacy Zurkus |
29 Aug |
Read more
Security as an afterthought is still the cause of most common vulnerabilities in connected cars.
Kacy Zurkus |
10 Aug |
Read more
Should health IT programmers working on biobanks and similar projects be held to the same ethical standards as doctors and other medical professionals?
Kacy Zurkus |
01 Aug |
Read more
While most of the decision makers would likely prefer to hear a simple yes or no when asking if they should pay, nothing in security is simple. By and large, the position of many leaders in the industry is that the ideal situation is not to pay.
Kacy Zurkus |
11 Jul |
Read more
The increasing security issues and what steps hospitals can take to mitigate them
Kacy Zurkus |
08 Jul |
Read more
Because there are so many different kinds of third parties, identifying whether they do or don’t have the right infrastructure or security protocols can be a challenge.
Kacy Zurkus |
21 Jun |
Read more
How much do network architects take security into account when building websites, and does testing extend out to third-party code?
Kacy Zurkus |
07 Jun |
Read more
"Hunting is not a sport. In a sport, both sides should know they're in the game." - According to Field and Stream magazine, this is an oft quoted hunting expression. I couldn’t resist the irony of applying this quote to the cyber security industry where hunting is indeed a sport. The good guys and the bad guys both know that they are in the game.
Kacy Zurkus |
12 May |
Read more
Angler, Magnitude, and Nuclear are a few of the most commonly used exploit kits criminals are using to deliver a variety of payloads from botnets to ransomware.
Kacy Zurkus |
02 May |
Read more
Some of the most highly recommended hacking competitions that will get your name and skills noticed by the right people
Kacy Zurkus |
26 Apr |
Read more
The Q1 report from Nexusguard found that Hurricane was the top DDoS source used, and attacks were most frequently launched on Tuesdays. The recent results of Nexusguard's Q1 2016 research show that attackers have reverted back to using NTP methods more frequently than DNS, though the top three methods of attack remain NTP, DNS, and CHARGEN.
Kacy Zurkus |
13 Apr |
Read more
A report that highlights the vulnerabilities in medical devices and the risks they pose to patient health issued by Independent Security Evaluators comes at an opportune time as the past month has shown that hospitals are becoming targets for criminals.
Kacy Zurkus |
06 Apr |
Read more
When it comes to layered defense and security tools, less is often more just as more can sometimes be less. The average enterprise uses 75 security products to secure their network. That's a lot of noise and a lot of monitoring and testing for security practitioners.
Kacy Zurkus |
14 Mar |
Read more