<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">
Cybereason + Arm: Securing The Core of IoT
LEARN MORE →
Securing IoT
LEARN MORE →

Now that security leaders have been invited into the boardroom, what do they say?

CISO

Now that security leaders have been invited into the boardroom, what do they say?

SEC guidance around cybersecurity means that security leaders will be talking to their boards and fellow executives more on how to mitigate cyberrisk. But having a seat at the table presents CISOs and CSOs with a new challenge: what do they say to show that they're aligned with the business?

How information security departments can prepare to meet GDPR’s 72-hour breach reporting deadline

Regulations

How information security departments can prepare to meet GDPR’s 72-hour breach reporting deadline

The General Data Protection Regulation’s breach notification mandate is likely to impact an organization’s information security program. Under GDPR, once a breach is discovered, organizations have 72 hours to provide authorities with extensive details on the incident, including what type of data was stolen, who was impacted and what remediation measures are being taken. Here are the technical and procedural steps that companies should take to meet this deadline and avoid GDPR’s substantial fines.

How the Israel Defense Forces' approach to diversity can help ease the security talent crunch

Security Career Development

How the Israel Defense Forces' approach to diversity can help ease the security talent crunch

Unit 8200, an elite division in the Israel Defense Forces, doesn't look for typical backgrounds when recruiting for security positions. Here's what the security industry can learn from this practice and how it can help ease the talent crunch.

Color Revolutions, Broken Promises and Hubris: Why North Korea Cannot Survive Under Orange-Tinted Glasses

Nation-state Attack

Color Revolutions, Broken Promises and Hubris: Why North Korea Cannot Survive Under Orange-Tinted Glasses

The complete eradication of nuclear weapons and ICBMs from North Korea as a precondition for economic relief and other enticements creates an untenable position for Kim Jong-Un. Every step along the path to denuclearization reduces the regime’s ability to compel the U.S. to abide by its end of the bargain while increasing the U.S.’ ability to operate as it sees fit.

Five reasons why banning USB drives is a good security practice

Cybersecurity

Five reasons why banning USB drives is a good security practice

IBM banning its employees from using removable storage devices, like USB sticks, received broad media coverage, even though the US CERT warned against using USB drives in 2011. Why are USB and other removal drives still relevant and why is it a good idea to not use them?

How ransomware attacks have changed one year after Wannacry and NotPetya

WannaCry

How ransomware attacks have changed one year after Wannacry and NotPetya

Nearly a year after the NotPetya and Wannacry attacks, ransomware is no longer used in widespread attacks against indiscriminate targets. Instead, attackers are using this malware in more focused, targeted campaigns.

No Win32_Process Needed – Expanding the WMI Lateral Movement Arsenal

Research

No Win32_Process Needed – Expanding the WMI Lateral Movement Arsenal

Cybereason researchers have discovered new lateral movement techniques that abuse WMI. They also created a tool that lets analysts see the potential harm attackers could cause if they used these techniques.

Cybereason Launches Technology Partner Program

Cybereason Launches Technology Partner Program

The Most Dangerous Game: North Korea bets the house

Cybersecurity

The Most Dangerous Game: North Korea bets the house

North Korea's decision to drop the withdrawal of U.S. troops from the Korean peninsula as a precondition to denuclearization changes the paradigm around the upcoming talks. This move increases the chances that the U.S. and North Korea will meet but makes no strategic sense from Kim Jong Un's perspective.

Cybereason named Israel’s most promising startup

Cybersecurity

Cybereason named Israel’s most promising startup

Cybereason was named Israel’s most promising startup by Calcalist, the country's leading financial newspaper.