How Old-School Hackers Are Enabling the Next Generation of Offensive Security Professionals

As an industry, cybersecurity has come a long way since it first started in the late 1990s. Back then we

Read more

Security Supply and Demand: An Economic Approach to Cybersecurity Risk Management

Cybersecurity risk management is not a purely technical or theoretical endeavor. Information security investments now inform security supply with the

Read more

Keep Adversaries at Bay With the MITRE ATT&CK Framework

Organizations are adopting the MITRE ATT&CK framework to map their cybersecurity threat detection, prevention and response capabilities to attack scenarios.

Read more

The Day MegaCortex Ransomware Mayhem Was Averted

Averting cyberattacks planned out by aggressive threat actors is no easy feat for any organization, and much less for incident

Read more

Why Cities Shouldn’t Pay Ransomware Criminals

Cities, local governments, and other institutions such as schools and hospitals are increasingly targeted by cybercriminals, with approximately 170 U.S.

Read more

Now’s the Time to Shift From Defense in Depth to Security in Depth

Today’s increasingly tech-savvy CEOs have a lot of questions for chief information security officers (CISOs). How do we know whether

Read more

How Analysts Connect Threat Intelligence Sources to Make Investigations More Efficient

I remember it like it was yesterday. I was supporting a counterterrorism task force and sitting in the heart of

Read more

What Is Unified Threat Management? A Pragmatic Approach to Information Security

Organizations are spending on cybersecurity, but threat vectors continue to outpace corporate outlay. As noted by Tech Genix, 2019 will

Read more

3 Reasons Why Traditional Managed Security Services (MSS) Is Out

As organizations evolve their security programs, the complexity of their security environments grow. Complexity and change require an entirely new

Read more

From Backhoes to Operating Systems: The Top Five ATM Security Weaknesses

Few targets are as appealing to criminals as automatic teller machines (ATMs). After all, they can store hundreds of thousands

Read more