
Why should you care about Malware Attribute Enumeration and Characterization (MAEC)?
Posted by AngelaWong, 09-04-2020Why should you care about MAEC? The absence of any widely accepted standard for characterizing malware means that there is no precise technique for communicating the particular malware...

What is Signals Intelligence (SIGINT)?
Posted by AngelaWong, 09-04-2020What is Signals Intelligence (SIGINT)? SIGINT (Signals Intelligence) is the intelligence gained by the collection and analysis of the electronic signals generated by specific d...

Why BGP Hijacking Remains a Security Scourge for Organizations Worldwide?
Posted by AngelaWong, 08-04-2020Border Gateway Protocol (BGP) hijacking, sometimes called prefix hijacking or IP hijacking, occurs when an attacker redirects web traffic away from its intended destination. One such attack had lat...
New CISO View Report Highlights the Importance of Risk Reduction for Robotic Process Automation
Posted by Admin, 12-03-2020CyberArk (NASDAQ: CYBR), the global leader in privileged access management, today announced a new report, “The CISO View: Protecting Privileged Access in Robotic Process Automation”.&...

CyberArk Expands Just-in-Time Capabilities Across Industry PAM Portfolio
Posted by Admin, 23-01-2020CyberArk, the global leader in privileged access management, today unveiled new just-in-time access capabilities that help reduce risk and improve operational efficiency as organizations implemen...

Microsoft November 2019 Patch Tuesday
Posted by joyce, 14-11-2019BackgroundMicrosoft has released 74 security patches to address vulnerabilities affecting its Operating System (OS) and other related products.The following 12 vulnerabilities were rated critical and ...