Memory attacks get security pros’ attention
Willy Leichter, vice president of marketing at Virsec, says when it comes to memory attacks, it’s all about “ensuring good rather than chasing bad.”
Willy Leichter, vice president of marketing at Virsec, says when it comes to memory attacks, it’s all about “ensuring good rather than chasing bad.”
Malicious bots account for about 30 percent of all traffic on the internet, Cequence Security CMO Franklyn Jones told SC Media Executive Editor Teri Robinson, which is why understanding underlying behavior is important.
What do the 3ve ad fraud campaign, the Magecart credit card skimming attacks and the Facebook-Cambridge Analytica scandal have in common? They were all made possible through the use of unmanaged third-party code, according to Chris Olson, CEO of the Media Trust, speaking the SC Media at RSA 2019. There was a time when websites…
It’s all about data. Oliver Tavakoli, CTO at Vectra Networks, tells Executive Editor Teri Robinson that organizations need to let a set of questions guide their data security plans: What do I collect? How do I use it? Where do I put it? How long do I keep it around?
The importance of public-private collaboration can’t be denied but Cybereason CSO Sam Curry tells SC Media Executive Editor Teri Robinson that, while the goodwill is there, the industry needs less talk and more innovation.
SC Media’s Senior Reporter Bradley Barth once again commutes to Fisherman’s Wharf with several top cybersecurity execs and for the first time a pair of undercover wireless research “workmen” come along for the ride. Back by popular demand, SC Media proudly presents its second annual edition of Trolley Talk, a segment where we interview leading cybersecurity experts while riding the…
The most likely person to steal IP is not an external threat, but rather the person who developed it and uses it every day, according to Forcepoint Chief Scientist Dr. Richard Ford. And this insider threat actually may be more difficult to detect because typical event-based security analytics may not always be adequately equipped to…
A new report from Recorded Future’s Insikt Group research team examines how the Chinese government exerts influence on Americans through an organized social media campaign. Unlike Russia, which has weaponized social media as a means to sow discord and undermine democracy within the U.S., China’s objective is to present itself in a more positive, benign…
Small organizations often don’t have the resources to put toward cybersecurity – and the shortage of skilled talent makes their plight even more difficult, Nathan Wenzler, senior director of cybersecurity at Moss Adams, told SC Media Executive Editor Teri Robinson.
For all the talk that the perimeter has faded away, Juniper Networks Vice President of Security Business and Strategy Samantha Madrid contends that it has just shifted instead. Madrid also told SC Media Executive Editor Teri Robinson that it’s time for companies bent on security to bust the silo mentality.