HelpNet Security
Attackers disrupt business operations through stealthy crypto mining Innovative organizations build security into their cloud strategy
Authentication today: Moving beyond passwords
AutoSploit: Automated mass exploitation of remote hosts using Shodan and
Metasploit
BEC scams surge, cybercriminals target nearly all organizations Most top US and EU e-retailers are putting their consumers at risk
British cryptocurrency traders robbed of Bitcoin at gunpoint Scammers steal nearly $1 million from Bee Token ICO would-be investors
Google booted 100,000 malicious developers from Google Play UK critical operators risk £17m fines for poor cybersecurity practices
Groundhog Day: Third-party cyber risk edition What is a security data lake?
How can we avoid another record year for breaches and ransomware? Widespread API use heightens cybersecurity risks
PCI DSS 3.2 will unveil compliance cramming culture
Researchers showcase automated cyber threat anticipation system
How do your IT complexity challenges compare to those of other CIOs?
Infosecurity-magazine
Building a Cybersecurity Profession Interview: Christian Toon, CISO, Pinsent Masons
Cisco: Crypto-Mining Botnets Could Make $100m Annually Just 20% of Orgs Have Breach Notification Plans
Criminals Move to Cash in on Cryptocurrency Gold Rush Over 500,000 Windows Machines Infected with Monero Mining Software
Critical Infrastructure More Vulnerable Than Ever Before UK Financial Firms Admit to "Shocking" Cybersecurity Practices
Cybersecurity Salaries to Increase 7% in 2018 US DoJ Launches Dark Web Drugs Taskforce
Fortune 500 Staff Spill 2.7 Million Log-Ins to Dark Web US Government in Whois GDPR Warning
Hackers Steal Ransomware Payments from Fellow Crims Vulnerable Medical Imaging Devices Open the Door to Death
Half of Orgs Hit with Ransomware in 2017 White Hat Ball Raises £191,000 for NSPCC’s Childline Service
ITSecurityGuru
A Beginner’s Guide to Cyber Security
CISO Chat – Thom Langford, Chief Information Security Officer for Publicis
Groupe
Cyber League Up Our Game to the Next level
Global Research Finds UK Corporate Networks are Vulnerable to Cyberattacks
Because of Hidden Threats and Careless Employee Behaviour with Apps
Improve collaboration to overcome cyber-attack security issues, say
Proactive vs. Reactive: Which is Better for DDoS Defence?
Synopsys is expanding their ‘Coverity’ tool with new languages and coding
standards
The Three Rs of Today’s Cybersecurity Landscape: Risk, Ransomware and
Reputation
With the Advent of Biometrics, Are Passwords Going Away?
Zero Trust Model is essential for a tight cybersecurity system, says BOHH
8