Authentication Bypass in libSSH Leaves Servers Vulnerable



An authentication bypass in the SSH library libSSH disclosed this week could allow attackers to takeover vulnerable servers without authentication.

Threat Hunting with MITRE’s ATT&CK Framework: Part 1



Tim Bandos, Digital Guardian's VP of Cybersecurity, describes how to best leverage MITRE's Attack Framework for threat hunting.

What is Digital Rights Management?



Learn about digital rights management and why it is important in Data Protection 101, our series on the fundamentals of information security.

SEC Enforces Little Known Identity Theft Rule



The SEC settled a case with the help of a little known 2013 regulation, the Identity Theft Red Flags Rule, for the first time two weeks ago. The rule requires financial institutions to implement a program to detect, prevent, and mitigate identity theft.

Friday Five: 10/12 Edition



New statistics on breached data in 2018 so far, HIPAA compliance or lack thereof, and a report on Pentagon security. Catch up on the week's news with this roundup!

Cyber Security Salary Guide: What Does Today’s Cyber Security Workforce Make?



When it comes to the cybersecurity market, much is made of the growing skills gap. Overlooked is how this can translate to enormous potential for professionals. For the second week of National Cyber Security Awareness Month (NCSAM) we break down the myriad of well-paying and rewarding jobs available, and salary data for today's cyber workforce.

How Do We Stop the Widening Cybersecurity Gap?



To celebrate the second week of National Cyber Security Awareness Month (NCSAM) we created an infographic on the cybersecurity skills gap. What is it? How can organizations solve it? What opportunities exist for students looking to learn more in the field?

FruityArmor APT Group Seen Exploiting Windows Zero Day



As part of October Patch Tuesday, Microsoft fixed a critical Win32k graphics remote code execution flaw in Windows that was being exploited in a small number of targeted attacks.

Google to Sunset Google+ Following Bug That Exposed User Data



Following a Wall Street Journal article, Google said this week that it would shut down its social network, Google+, after discovering a bug in its API that exposed user data.

Ten Key Questions CEOs Should Ask About Cybersecurity Readiness



Learn how a CEO can support their company's cybersecurity in Data Protection 101, our series on the fundamentals of information security.

Pages