MonthJuly 2019

Google Cloud Debuts New Security Capabilities

Updates include Advanced Protection Program for the enterprise and general availability of password vaulted apps in Cloud Identity and G Suite.

Flaws in SanDisk SSD Dashboard Present Malware & Data Loss Risks

Organizations using the utility should immediately install the latest version of the software, security vendor Trustwave says.

Apple Device Management Firm Jamf Acquires Digita Security

Digita Security's Apple Mac endpoint protection solutions will join Jamf's MDM suite for iOS and MacOS.

The latest large-scale data breach: Capital One | TECH(feed)

Just a few days after Equifax settled with the FTC over its 2017 data breach, Capital One announced it was the target of a March attack. Identifying information and bank account numbers are among some of the data breached in the attack that affects 100 million people. A software engineer is behind the attack and is awaiting a hearing. In this episode of TECH(feed), Juliet discusses the consequences of the attack and how to find out if you've been affected.

More Companies Don’t Rely on Passwords Alone Anymore

New research shows how enterprises are adding additional layers of authentication.

8 Free Tools to Be Showcased at Black Hat and DEF CON

Expect a full slate of enterprise-class open source tools to take the spotlight when security researchers share their bounties with the community at large.

The Attribution Trap: A Waste of Precious Time & Money

Aiming for attribution doesn't help most organizations become more secure. It can actually have the opposite effect.

The Attribution Trap: A Waste of Precious Time & Money

Aiming for attribution doesn't help most organizations become more secure. It can actually have the opposite effect.

Keep Your Eye on Digital Certificates

X.509 certificates help secure the identity, privacy, and communication between two endpoints, but these digital certificates also have built-in expirations and must be managed.

How an attacker can target phishing attacks

There are a number of ways attackers can exploit public information about your organization's employees. CSO Online's Susan Bradley walks through how an attacker can gain access to your organization's Office 365 accounts and how you can protect your enterprise from these potential attacks.