Archive

Posts Tagged ‘Dark Reading:’

Capital One Breach: What Security Teams Can Do Now

August 23, 2019 Leave a comment

Knowing the methods of the attacker, as laid out in the federal indictment, allow us to prevent similar attacks.

from Dark Reading: https://ift.tt/30sur5T
via IFTTT

Spirent Nixes Over-Reliance on Compliance Checklists for Good Security

August 23, 2019 Leave a comment

Enterprises must regularly validate their security efficacy based on real-time conditions, not compliance criteria, says John Weinschenk, General manager, Enterprise Network and Application Security of Spirent. That sort of testing returns actionable data to tune devices, update policies, and fortify defenses before they are compromised, he adds.

from Dark Reading: https://ift.tt/2TUFsdK
via IFTTT

10 Low-Cost (or Free!) Ways to Boost Your Security AI Skills

August 23, 2019 Leave a comment

The following hardware and software options will amplify your know-how about artificial intelligence and how to apply it to security – without busting any budgets.

from Dark Reading: https://ift.tt/33W4mhW
via IFTTT

App Security Still Dogs Developers, End-User Organizations

August 23, 2019 Leave a comment

Lots of re-used code, cost pressures and long lead times for application software all lead to porous security where application software is concerned, says Chris Eng, Chief Research Officer for Veracode. But an emerging role he calls a “security champion” can help circumvent those problems and make apps safer for everyone.

from Dark Reading: https://ift.tt/2MzLLm9
via IFTTT

Clogged Cache? The Edge Cartoon Content Winners

August 23, 2019 Leave a comment

Creativity flowed, but two captions rose to the top.

from Dark Reading: https://ift.tt/2Zf9Dm3
via IFTTT

Clogged Cache? The Edge Cartoon Content Winners

August 23, 2019 Leave a comment

Creativity flowed, but two captions rose to the top.

from Dark Reading: https://ift.tt/31Qve0W
via IFTTT

Cloud Services Require a Shift in Security Strategy

August 22, 2019 Leave a comment

End-user organizations have their security management tools, but so do cloud service providers, and that forces some hard questions about whose tools will be used to keep everything locked down, says Jesse Rothstein, CTO and Co-Founder of ExtraHop. And he makes the case that better data hygiene can help decrease the chances of a breach.

from Dark Reading: https://ift.tt/2L5c0O9
via IFTTT