The NSA announced Joyce’s RSA talk, and Ghidra’s imminent release, in early January. But knowledge of the tool was already public thanks to WikiLeaks’ March 2017 “Vault 7” disclosure, which discussed a number of hacking tools used by the CIA and repeatedly referenced Ghidra as a reverse-engineering tool created by the NSA. The actual code hadn’t seen the light of day, though, until Tuesday—all 1.2 million lines of it. Ghidra runs on Windows, MacOS, and Linux …

What CEOs Need to Know About the Future of Cybersecurity

Until recently, Chief Executive Officers (CEOs) received information and reports encouraging them to consider information and cyber security risk. However, not all of them understood how to respond to those risks and the implications for their organizations. A thorough understanding of what happened, and why it is necessary to properly understand and respond to underlying risks, is needed by the CEO, as well as all members of an organization’s BoD, in today’s global business climate. …

The Ultimate Guide to Cybersecurity

Cybersecurity is a very intimidating topic, much like cryptocurrency and artificial intelligence. It can be hard to understand, and, frankly, it sounds kind of ominous and complicated. But fear not. We’re here to break this topic down into digestible pieces that you can rebuild into your own cybersecurity strategy. Bookmark this post to keep this handy glossary at your fingertips. Here’s a comprehensive list of general cybersecurity terms you should know.

Why the culture of cybersecurity is broken–and how to fix it

The big problem in security isn’t people, process, or technology. While imperfect, the industry is filled with hardworking and talented people, security awareness and processes are improving rapidly in most organizations, and there is no shortage of good technology. The big problem is cultural, and it is at the root of all these other shortcomings.

APIs: the new attack vector

The promise of APIs in enabling innovation is unquestionable. Open banking has transformed the traditional banking ecosystem into one that benefits consumers and banks alike. APIs have also opened up a completely new line of business for fraudsters. According to Gartner, ‘By 2022, API abuses will be the most-frequent attack vector resulting in data breaches for enterprise web applications’.

#NoHacked: A year in review

Google – State of Website Security in 2016 First off, some unfortunate news. We’ve seen an increase in the number of hacked sites by approximately 32% in 2016 compared to 2015. We don’t expect this trend to slow down. As hackers get more aggressive and more sites become outdated, hackers will continue to capitalize by infecting more sites.