A number of data center administrators from large financial, health care and retail corporations have begun to regard the current draft of the 1.3 version of the TLS protocol with increasing alarm. The issue comes down the tussle...
Mirai took advantage of insecure IoT devices in a simple but clever way. It scanned big blocks of the internet for open Telnet ports, then attempted to log in default passwords. In this way, it was able to amass a botnet army.
From virtual bank heists to semi-open attacks from nation-states, the last couple of years has been rough on IT security. Here are some of the major cyber attacks of 2017-2018 and what we can learn from them.
Running your own CTF contest can build security skills and help identify new internal and external talent. Learn what types of challenges you need to include, how to make the contest run smoothly, and other logistics to consider.
Geofencing is a service that triggers an action when a device enters a set location. From coupons and notifications, to engagement features and security alerts — businesses are finding creative ways to use these virtual boundaries.
Nearly 20 percent of this year’s CSO50 Award winners took on security risk and compliance projects. Download the CSO50 2018 digital issue to read their stories, as well as descriptions of all 50 winning projects.