Why should you care about Malware Attribute Enumeration and Characterization (MAEC)?

Why should you care about Malware Attribute Enumeration and Characterization (MAEC)?

Posted by AngelaWong, 09-04-2020

Why should you care about MAEC?   The absence of any widely accepted standard for characterizing malware means that there  is no precise technique for communicating the particular malware...

 What is Signals Intelligence (SIGINT)?

What is Signals Intelligence (SIGINT)?

Posted by AngelaWong, 09-04-2020

  What is Signals Intelligence (SIGINT)?   SIGINT (Signals Intelligence) is the intelligence gained by the collection and  analysis of the electronic signals generated by specific d...

Why BGP Hijacking Remains a Security Scourge for Organizations Worldwide?

Why BGP Hijacking Remains a Security Scourge for Organizations Worldwide?

Posted by AngelaWong, 08-04-2020

Border Gateway Protocol (BGP) hijacking, sometimes called prefix hijacking or IP hijacking, occurs when an attacker redirects web traffic away from its intended destination. One such attack had lat...

New CISO View Report Highlights the Importance of Risk Reduction for Robotic Process Automation

New CISO View Report Highlights the Importance of Risk Reduction for Robotic Process Automation

Posted by Admin, 12-03-2020

CyberArk (NASDAQ: CYBR), the global leader in privileged access management, today announced a new report, “The CISO View: Protecting Privileged Access in Robotic Process Automation”.&...

CyberArk Expands Just-in-Time Capabilities Across Industry PAM Portfolio

CyberArk Expands Just-in-Time Capabilities Across Industry PAM Portfolio

Posted by Admin, 23-01-2020

CyberArk, the global leader in privileged access management, today unveiled new just-in-time access capabilities that help reduce risk and improve operational efficiency as organizations implemen...

Microsoft November 2019 Patch Tuesday

Microsoft November 2019 Patch Tuesday

Posted by joyce, 14-11-2019

BackgroundMicrosoft has released 74 security patches to address vulnerabilities affecting its Operating System (OS) and other related products.The following 12 vulnerabilities were rated critical and ...