We talk to David “moose” Wolpoff, Chief Technology Officer (CTO) and co-founder of Randori, about Black Hats’ processes for finding and exploiting weaknesses in software.
As the world reopens, businesses have a host of logistical and legal issues to resolve in order to bring their employees back safely in the age of COVID-19. What are some practical tips for using thermal cameras to detect COVID-19?
It's not the number of moving pieces in your security program that matter; it's how those pieces are making your organization more resilient that truly counts. How do you achieve that goal?
When reporting to the board of directors, the majority of CISOs measure the effectiveness of their program against a proven model. But what exactly should a CISO be measuring and reporting? Here are some top recommendations.
The rapid growth of extremist groups poses many challenges to enterprise security. How has social media and the Internet provided radical groups the means to spread their ideologies and what are the challenges with identifying and countering these groups?
Attribution is often regarded as a primary goal within a cybersecurity investigation, but as John McClurg, CISO at Blackberry, explores here, conclusive attribution should at times exist as a secondary consideration - one abandoned if the ROI doesn't justify its expense.
The IBM X-Force Threat Intelligence Index 2020 highlights how cybercriminals' techniques have evolved after decades of access to tens of billions of corporate and personal records and hundreds of thousands of software flaws.
It’s one thing to ensure that all of the possible threat entry points are covered by an organization’s security infrastructure, it’s another to ensure proactive protection.