Accuvant - News, Features, and Slideshows

News about Accuvant
  • Black Hat 2015: Cracking just about anything

    Researchers at the Black Hat 2015 conference this week will show how to crack Internet routing protocols, malware-detecting honeypots, radio-frequency ID gear that gates building access, and more, but also offer tips on how to avoid becoming victims to their new attacks.

    Tim Greene | 01 Aug | Read more

  • The evolution of the CISO role and organizational readiness

    If we look at the headlines surrounding recent data breaches, we might conclude that the role of the chief information security officer (CISO) has never been more critical to the success and sustained well-being of an organization. As a by-product of this statement, we also might surmise that the information security organization and where it reports into is also important. This is probably why every recent CISO event includes a conversation about where the CISO and information security program should reside within an organization. The challenge is that however healthy the debate, the question about where the CISO and his/her department should report generally ends with, 'it depends'. To shift from a debate to productive action, maybe the question is not where should the CISO report into [<a

    By Brian Engle | 29 Oct | Read more

  • Decoding threat intelligence

    There is a scene in HBO's adaption of Game of Thrones where a character counsels the king to dismiss the rising power of one of his rivals because "curiosities on the far side of the world" are no threat. A season later, that rival has three dragons and an army under her control.

    Jason Clark | 25 Jun | Read more

Features about Accuvant