Do honest working hackers exist?

The word “hacker” conjures up an image of a hoodie-wearing basement dweller that programs all sorts of malicious attacks to infiltrate their target’s computer. But hackers are so much more than that. […]
Read More

Three Cyber Threat Hunting Myths

In my last cyber threat hunting blog, I defined cyber threat hunting and outlined when and why you should use it. Just to reiterate, cyber threat hunting is the process of proactively and […]
Read More

BehavioSec Fires Up Next-Gen Cybersecurity Solutions with Behavioral Biometrics

There’s no silver bullet for online security, especially when it comes to user authentication. And enterprises aren’t alone in the struggle to keep up with the needs and demands of authentication. […]
Read More

4 BYOD security risks you should prepare for

Personal computing is with us wherever we go. Thanks to the rise of the mobile industry, smartphones and tablets allow us to take work home with us. And with the bring your own device (BYOD) […]
Read More

In-Security: See what it's like to constantly monitor cybersecurity threats

Cybercriminals may be getting smarter, but so are Cisco cybersecurity experts. Meet two of them in this original documentary video. [youtube https://www.youtube.com/watch?v=zQ1YRxmOsTI]
Read More

Send Cryptojacking Packing

Although the cryptocurrency market may have lost ~70% of market cap from a high of $835B, it hasn’t stopped malicious actors, ravenous for the next bull run, from mining cryptocurrency. The birth […]
Read More

Protecting Against Drones: A Brief Review of Passive Countermeasures

“OK, I detect a drone that’s flying over my facility — now what?” That’s one of the more common questions people ask about drone-based threats, regardless of their line of work. At first, some […]
Read More

Attackers turn to IoT and ICS to find gaps in security

Research from Cisco and partners reveal increased interest in IoT and ICS from security professionals and attackers alike Technology solutions and processes that rely on the Internet of Things […]
Read More

Using machine learning to detect possible insider threats

Cloud applications are now commonplace in enterprises. From productivity applications to storage, employees and IT departments are realizing the benefits of offloading documents and data into the […]
Read More
1