Stories from the SOC – Persistent malware
Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for...
Italian Police Foil Pro-Russia Attacks on Eurovision
Hacker group known as “Killnet” blamed for disruption Read More
UK Sets Out Nuclear Cybersecurity Strategy
More testing and more collaboration on the way Read More
12 steps to building a top-notch vulnerability management program
Security executives have long known the importance of addressing vulnerabilities within their IT environments. And other executives in the C-suite have also come around to...
Over 20,000 Zyxel Firewalls Still Exposed to Critical Bug
Rapid7 complains of vendor’s silent patching process Read More
Upcoming Speaking Engagements
This is a current list of where and when I am scheduled to speak: I’m speaking on “Securing a World of Physically Capable Computers” at OWASP...
Friday Squid Blogging: Squidmobile
The Squidmobile. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read...
Intel bets big on security as a service for confidential computing
Intel revealed a string of security advancements at its inaugural Intel Vision event this week, including Project Amber — a security as a service initiative...
EU Agrees New Cybersecurity Legislation for Critical Services Organizations
The rules will apply to medium and large organizations operating in critical sectors like healthcare and water management Read More
Locate Tenable Compliance Templates Faster with Revamped Portal
Following a portal relaunch, Tenable’s Audit Files are now easier to find and manage, thanks to a new search engine that supports a variety of...