February 8, 2019 - In the series about vital infrastructure we look at communication. How vital is it? How is malware a threat and even how does malware show us the way to secure communication?
February 1, 2019 - Online renovation and design platform Houzz suffered a data breach—not good. Their subsequent response, however, was exemplary. Here's how other businesses can learn from their example.
December 27, 2018 - Some of the properties we would like to see in our backups have blockchain technology written all over them. Should organizations consider blockchain for creating secure, recent backups—especially after a ransomware attack?
December 13, 2018 - How are we doing at protecting the vital infrastructure of our power grid and its components against physical and cyberattacks?
November 30, 2018 - Marriott disclosed a large-scale data breach impacting up to 500 million customers who have stayed at a Starwood-branded hotel within the last four years.
November 15, 2018 - The aviation industry and air traffic (control) are vital elements of our infrastructure. While flying is reportedly safe, how does that landscape look cybersecurity-wise?
August 31, 2018 - What is regular expression (regex) and what makes it vulnerable to attack? Learn how to use regex safely and avoid ReDoS attacks in the process.
August 10, 2018 - Ransomware distributors have started using RDP to gain access to business networks. Do you have your remote desktops under control?
August 8, 2018 - Osterman Research recently completed a major survey on behalf of Malwarebytes to determine the actual cost of cybercrime to businesses. Here's what we discovered.
July 17, 2018 - A recent discovery of surreptitious execution of cryptomining code by a sandboxed app, riding piggyback on the open source software (OSS) ecosystem, raises pertinent questions about open source vulnerabilities. Here are five ways developers can find and fix vulnerabilities and their dependencies.