The Challenge of Retaining IT Security Skills - Blood on HR’s Floor

January 27, 2016 | Javvad Malik

Just how bad is the challenge of retaining IT security professionals? When I ...

Forget the Lottery: Here's a Rational Way to Help Relieve Security Suffering

January 26, 2016 | Dan Kaplan

When a lottery jackpot in the United States climbed to an unprecedented $1.6 ...

Trochilus RAT: Invading your Sandbox

January 26, 2016 | Patrick Bedwell

Don’t you hate it when you invest a small fortune in the latest sandboxing ...

5 Security Things to Know for the Week of Jan. 25

January 25, 2016 | Dan Kaplan

1. Oracle dropped a record patch release - 248 patches to fix issues across ...

5 Security Things to Know for the Week of Jan. 18

January 18, 2016 | Dan Kaplan

1. The U.S. Food and Drug Administration issued security guidance to medical ...

Counter-Insurgency Bullet Designed to Kill Insurgents is Like IT Security Looking for a Special APT Detector

January 18, 2016 | Alissa Knight

What? A special bullet that is designed just to kill insurgents? That's ...

User Behavior Analytics: Methods and Best Practices

January 14, 2016 | Garrett Gross

Here’s a daunting question asked by many security professionals today: “How can ...

Better to be Clumsy and Sincere than Slick and Insincere

January 13, 2016 | Kate Brew

Marcel Brunel spoke at the AlienVault Sales Kickoff (SKO) in Austin this week. ...

5 Security Things to Know for the Week of Jan. 11

January 11, 2016 | Dan Kaplan

1. Support for older versions of Internet Explorer ends this week.

The Most Important Security Resolutions You Need to Achieve in 2016

January 11, 2016 | Dan Kaplan

2016 is here, which means you have a clean slate to adopt and deploy new ...

Juniper ScreenOS Backdoor Eavesdropping

January 11, 2016 | Garrett Gross

Juniper ScreenOS Nobody likes eavesdroppers, ESPECIALLY when the eavesdroppers ...

Be a Red Teamer to be a Better Blue Teamer: Pen Testing ala Jayson Street

January 06, 2016 | Kate Brew

Question: I remember the first time I met you in person, at Black Hat 2014. You ...

5 Security Things to Know for the Week of Jan. 4

January 04, 2016 | Dan Kaplan

1. Microsoft joined several other IT power players in now notifying users if ...

Our Top 10 Most Read Blog Posts of 2015

December 31, 2015 | Dan Kaplan

The security landscape has so much to give in terms of subject matter that is ...

The 15 Biggest Things Trustwave Did in 2015

December 30, 2015 | Admin

With companies of all sizes negotiating digital minefields on a daily basis, ...

5 Security Things to Know for the Week of Dec. 28

December 29, 2015 | Dan Kaplan

1. Adobe issued an emergency patch on Monday to address a Flash zero-day ...

The Top New Year’s Resolutions of IT Pros on Spiceworks

December 29, 2015 | Kate Brew

We asked the Spiceworks community to share with us their IT-related New Year’s ...

Embracing the Shadow – Wait! What?

December 28, 2015 | Cheryl Biswas

There was a time when the IT security lords ruled. Mere mortals only had ...

A 3-Step Security Action Plan for Financial Firms

December 21, 2015 | Jane Dotsenko

The finance sector is a prime target for cybercrime and appears fourth in the ...

5 Security Things to Know for the Week of Dec. 21

December 21, 2015 | Dan Kaplan

1. Companies using one vendor's firewall operating systems could be at risk to ...

Why Canadian Businesses Are Increasingly Looking to Managed Security Services

December 17, 2015 | Brent Davidson

Canadian businesses are increasingly looking to managed security services as a ...

Open Source Network Security Tools for Newbies

December 16, 2015 | Kenneth Coe

**OSSIM is no longer in use as we focus on delivering enhanced solutions for ...

Matryoshka Malware from CopyKittens Group

December 15, 2015 | Garrett Gross

A dangerous weapon in the hands of a skilled attacker is alarming but that same ...

Practicing Cybersecurity During the Holidays – and Beyond

December 14, 2015 | Dan Kaplan

5 Security Things to Know for the Week of Dec. 14

December 14, 2015 | Dan Kaplan

1. Twitter began notifying users it suspects have been targeted by ...

7 Fundamental Ways to Repel Ransomware

December 11, 2015 | Dan Kaplan

Let's put aside for a moment the mega data breaches that resulted in millions ...

How Retailers Can Avoid Hidden Malware Risks

December 10, 2015 | Jane Dotsenko

As retailers prepare for the holiday surge in online sales, hackers are equally ...

Distributed Denial of Service Attacks: Protection Methods and Best Practices

December 10, 2015 | Garrett Gross

In two recent blog entries, I discussed botnets — best practices in botnet ...