Tag "Black Hat"

Back to homepage
Software

A Hackers Take On Blockchain Security

One of the leading factors of the blockchain—aside from the obvious decentralization—is the high level of security behind it. It’s not uncommon to hear people claim that it is “unhackable.”

Industry Insights

3 PR Tips to Grow Your Cybersecurity Business

Black hats, blue teams, red teams…the forces behind the cyber threats of today sound like GI Joe clashes or groups of X-wing fighter pilots in Star Wars. It’s no wonder,

Hardware/Network

Why data loss prevention is a throwback technology

Times are changing, and traditional cybersecurity tools are no longer enough to protect an organization’s assets. Black Hat 2018 may be behind us, but the trends, conversations and news coming

Software

12% of Security Professionals Have Considered ‘Black Hat’ Activity

Numerous studies focus on aspects of cybercrime aftermath, such as a company’s lost reputation or its struggles to obtain future clients after incidents. However, Malwarebytes commissioned Osterman Research to determine the direct

Hardware/Network

Endpoint breach prevention by reducing attack surfaces

In this podcast recorded at Black Hat USA 2018, Chris Carlson, VP of Product Management, Cloud Agent Platform at Qualys, talks about endpoint breach prevention by reducing attack surfaces. Here’s

Software

White Hat to Black Hat: What Motivates the Switch to Cybercrime

Almost one in ten security pros in the US have considered black hat work, and experts believe many dabble in criminal activity for financial gain or employer retaliation. A new

Software

Cyber security vulnerabilities: What’s causing them and what can be done?

Cyber vulnerabilities and attacks can occur for a variety of reasons.According to a recent study, based on the results of attendees at Black Hat USA 2018, infosec professionals cited cyber security

Software

Three security trends to watch for at Black Hat USA 2018

Thus far in 2018, organizations and individuals worldwide have experienced a large number of high profile cyber attacks, with criminals stealing billions of dollars as well as personal information from

Hardware/Network

Why You Should Protect Your Business Network Above All Else

By Tiffany Rowe – Content Creator at Seek Visibility, Yes, your computers and servers are where your data is saved; yes, mobile and IoT devices sure are vulnerable; but your

Industry Insights

Are privacy and personal identity impossible to protect?

While consumers and businesses expand their use of social media and electronic services to record levels, many of America’s most knowledgeable security professionals don’t believe that individuals will be able