4 ‘Exotic’ Programming Languages Popular With Malware Developers

4 ‘Exotic’ Programming Languages Popular With Malware Developers

When it comes to cybercrime, even malware developers need to brush up on certain programming languages to stay current. Increasingly, malware authors are turning to four “exotic” programming languages—Go, DLang, Nim and Rust—to either give new life to older malware or as effective methods to hide their malicious code from security tools, all while avoiding analysis efforts by researchers. That’s according to a recent report published by BlackBerry’s Research & Intelligence division. In many cases, malware developers…

Read More

Overcoming security metrics challenges to measure what matters

Overcoming security metrics challenges to measure what matters

Overcoming security metrics challenges to measure what matters | 2021-08-05 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Why security leaders are concerned about the SaaS sprawl, and how to get a grip on it

Why security leaders are concerned about the SaaS sprawl, and how to get a grip on it

Why security leaders are concerned about the SaaS sprawl, and how to get a grip on it | 2021-08-05 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our…

Read More

DevOps tools proliferation – A whole new world of vulnerabilities

DevOps tools proliferation – A whole new world of vulnerabilities

DevOps tools proliferation – A whole new world of vulnerabilities | 2021-08-05 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

The Next Disruptive ICS Attacker: A Disgruntled Insider?

The Next Disruptive ICS Attacker: A Disgruntled Insider?

Often, the most critical threats come from within an organization itself. This is true for all sectors, but it is especially true for industrial control systems (ICS). Technicians in these environments already have access to plant controls and may have the deep knowledge of industrial processes needed to achieve specific goals. The damage caused by an insider may range from mild disruption to major disaster depending on what is attacked. A Story of a Disgruntled…

Read More

What Are the Key Challenges Facing IT and OT?

What Are the Key Challenges Facing IT and OT?

The events of 2020 accelerated many organizations’ efforts to converge their information technology (IT) and operational technology (OT) environments. Now that they’re immersed in this journey, some organizations are finding that it’s not quite as smooth as they were expecting. They’re learning that they need to overcome several challenges if they hope to leverage the IT-OT convergence as part of their ongoing digital transformations. That raises some important questions. What challenges are organizations meeting along…

Read More

McAfee NSP Provides Superior Security and Performance | McAfee Blogs

McAfee NSP Provides Superior Security and Performance | McAfee Blogs

McAfee Enterprise is pleased to announce that the Network Security Platform (NSP), our industry leading next-gen Intrusion Prevention System (IPS) solution, has been awarded Miercom Certified Secure for superior security and performance. About Miercom Miercom has been reviewing network products for over 30 years, forming standardized test programs that have grown into a worldwide evaluation service for the latest technology.  Miercom has published hundreds of network product analyses in leading trade periodicals and other publications,…

Read More

Miercom Test endorses Cisco SD-WAN’s High Availability and Best Path optimization capabilities.  – Cisco Blogs

Miercom Test endorses Cisco SD-WAN’s High Availability and Best Path optimization capabilities.  – Cisco Blogs

In order to achieve a resilient network, it is important to maintain high availability not only in control plane, but also at the data plane for traffic to flow smoothly, without any disruptions. In the event of unavailability of control plane, which governs and manages the data plane traffic, the whole WAN infrastructure and subsequent site traffic can go down, causing huge outages. The SD-WAN solution should be intelligent enough to not only ensure continuous data plane operation, but also to provide an optimized path for the application traffic for enhanced…

Read More

Security in the Age of Cloud – Cisco Blogs

Security in the Age of Cloud – Cisco Blogs

Not to state the overly obvious, but companies have substantially accelerated their migration to the cloud over the last eighteen months. The pandemic forced them to get more done, faster, and often with less. And they found the cloud was the ultimate enabler. The move to the cloud, even with all of its promise, isn’t without challenges. The cloud makes it easier for users to access their applications and information from anywhere—just click and go….

Read More

Cybersecurity pros wanted: Tips for hiring IT and security talent right now

Cybersecurity pros wanted: Tips for hiring IT and security talent right now

Companies are pulling out all of the stops to attract top talent in a tight labor market. These tips could help companies attract and retain cybersecurity pros in the months ahead. Image: iStock/nd3000 A number of high-profile cyberattacks on critical U.S. infrastructure have brought conversations surrounding network security to the forefront for companies around the globe. In May, Gartner forecasted risk management service and information security spending to exceed $150 billion in 2021, representing a…

Read More
1 3,261 3,262 3,263 3,264 3,265 3,632