Zero-Day attackers exploit undisclosed vulnerabilities that are unknown to application vendor or developer. Detection and patching can take weeks. Read More
Are web application security challenges troubling your business? Here are the top expert recommendations to help you find weaknesses and… Read More
Ransomworm came into the mainstream when WannaCry’s global hack compromised hundreds of thousands of computers. Victims ranging from individuals to… Read More
A timeline is an essential part of many forensics/incident response cases. Attendees of this presentation will learn how to create… Read More
Dubbed NotPetya because it masquerades as the Petya ransomware, it has already hit more than 2000 computers in a dozen… Read More
AWS Cloud can help streamline your business but you still need to be diligent about security. Here’s our handy AWS… Read More
Not sure where to start with cyber insurance? Learn what it means for business and dig deeper to identify where… Read More
Bot attacks difficult to trace and monitor as they use computing power and resources from trusted networks. Read how they… Read More
WannaCry ransomware attack has crippled both public and private sector. Here’s how you can protect critical files before hackers encrypt… Read More
The idea may sound counterintuitive, but ethical hackers can actually empower small and large businesses for the better by using… Read More
It’s estimated that 30,000 websites are hacked and infected. Learn how to find vulnerabilities in your web applications and prevent… Read More
Keeping your startup safe from hackers, data loss and breaches takes more than just a firewall and antivirus software. Here… Read More
Anyone can get hacked. Lucky the tools are out there. Analyze your most pressing needs, and then get the right… Read More
A remote code execution flaw was discovered in the widely-used Apache Struts 2 framework. Attackers continue to exploit vulnerable (unpatched)… Read More
Though we’re barely more than a month into 2017, news reports are already flooding in describing cyber security attacks carried… Read More
As more and more companies prepare for cloud and digital domains, there is growing ambiguity on application security. Read about… Read More
According to the researchers, hackers were continuously scanning the assets associated with the US presidential elections looking for weakness to… Read More
More than 2.2 billion records were stolen last year in almost 3,000 public data breaches. While the media spotlight was… Read More