The Attraction of the Single Tier Approach

The Attraction of the Single Tier Approach

Crowdstrike and SecureAuth are both security vendors and have both recently taken the decision to move away from distribution

One of the most highly populated areas in the market is the security world with established and start-up vendors jostling to be the chosen technology that will help keep customers secure.

The volume of players has put some strain on distribution because it was inundated with potential suppliers and given the task of doing sue diligence on numerous firms claiming to be offering the next big thing.

Over 1.1m E-Mail Addresses of Top UK Law Firms Found Dumped on Dark Web

Over 1.1m E-Mail Addresses of Top UK Law Firms Found Dumped on Dark Web

Over a million stolen e-mail addresses belonging to top 500 law firms in the UK were found dumped on the Dark Web, including 80,000 credentials stolen from select Magic Circle firms.

Stolen credentials found on the Dark Web were obtained by hackers after compromising third-party sites like LinkedIn or Dropbox where employees posted their e-mail addresses.

TechRepublic: Will the White House’s Cybersecurity Policies Protect Business?

Will the White House's Cybersecurity Policies Protect Business?

Dan Patterson of TechRepublic talks to Core Threat Research Manager, Willis McDonald, about the VEP; what it means, the implications, and if the policies will protect businesses.

TechRepublic: What are zero day exploits?

Zero day exploits: What they are and how they work

Core Security's Bobby Kuzma provided this quick explainer on zero day exploits and why businesses should be concerned about them.

 

TechCo’s 2018 Predictions for the Future of Tech

TechCo’s 2018 Predictions for the Future of Tech

Tech innovations tend to be tied to visions of the future, from the Apple’s “sleek and white” house style, evocative of a spaceship, to the sci-fi origins of words like “virus” or “cyberspace.” And by looking to the near future, we can better understand how to prepare for the present.

Why Two-Factor Authentication Is Too Risky

Why Two-Factor Authentication Is Too Risky

SecureAuth's Jim Wangler on the Need for Risk-Based Multifactor Solutions

Two-factor authentication solutions face two problems: They are not widely adopted, and attackers find them far too easy to crack. What's the answer? New risk-based multifactor solutions, says Jim Wangler of SecureAuth.

Understanding the real capabilities of unsupervised machine learning

Understanding the real capabilities of unsupervised machine learning

“Hey, Siri. What is the capital of New York?” We all know what happens next — Siri provides the answer. How Siri knows the correct answer is not a mystery (we have the internet to thank for that), but what is more interesting is the fact that Siri is able to understand the question at all.

The Rising Dangers of Unsecured IoT Technology

The Rising Dangers of Unsecured IoT Technology

As government regulation looms, the security industry must take a leading role in determining whether the convenience of the Internet of Things is worth the risk and compromise of unsecured devices.

Improving Cybersecurity Authentication in 2018

Improving cybersecurity authentication in 2018

Are your organisation's systems secured with multi-factor or adaptive authentication technology?

In late November it was revealed that Uber reportedly paid cyber attackers $100,000 to delete breached data obtained and concealed for over a year. In the wake of the news, Uber's chief security officer Joe Sullivan had to resign from the company.

Pages