Data Security

Cyber Security After the Pandemic

April 29, 2021

cyberthreatalliance
The cyber security industry has faced two major sets of challenges over the last twelve months. The attacks and exploits affecting Solar Winds, Accellion, Microsoft and their customers have focused attention on supply chain risk, but the impact of the coronavirus pandemic has been felt more broadly across cyber security domains and disciplines.

Spotlight

ExploitHub

ExploitHub is the information security community's first legitimate marketplace for validated, non-zero-day exploits. Unparalleled access to exploits in the market enables penetration testers to perform comprehensive and accurate assessments faster and more efficiently. The marketplace also enables a diverse industry of security researchers to be compensated for their work and contribute to improving security defenses. Security vendors can utilize the exploits available in the market to better and more comprehensively test the effectiveness of their products.

OTHER WHITEPAPERS
news image

VIRSEC ® SECURITY PLATFORM

whitePaper | December 10, 2019

Advanced application attacks that weaponize at runtime (WRT) are increasingly putting businesses at risk. These attacks challenge application security by leveraging fileless malware, memory corruption and uncommon vulnerabilities to evade traditional security solutions. WRTs manipulate legitimate processes and enable stealthy execution of malicious code, resulting in data breaches, damaged infrastructure, and financial losses.

Read More
news image

Simplify Data Protection for VMware Workloads with Veeam Data Platform

whitePaper | March 1, 2023

Outages and data loss are an unfortunate reality for businesses today. These outages can cause big risks to your company’s reputation and revenue, as every minute of downtime means that critical data isn’t accessible to your business. If things weren’t complicated enough, managing a complex, hybrid, multi-cloud environment makes continuity even harder. These challenges increase complexity exponentially, greatly impacting your ability to stay in control.

Read More
news image

Reveal Risk Whitepaper: Measuring And Managing Cyber Resilience

whitePaper | March 3, 2023

Cyber Resilience (according to NIST) is “the ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber resources.” Resiliency in cybersecurity is not a new concept. It has long been postulated as a goal or used to convey that a business needs to be ready for the unpredictable that can and will arise in a volatile cyber-risk climate. However, we have seen that there is a disconnect between current practices for evaluating & leading cyber programs, and understanding, measuring, & building true cyber resiliency.

Read More
news image

Log More to Improve Visibility and Enhance Security

whitePaper | September 29, 2022

As the amount of system log data grows exponentially, security teams and threat hunters routinely must limit how much they can collect and how long they can store it because of the performance limitations and costs associated with traditional log management tools.

Read More
news image

Dashlane - Security White Paper August 2022

whitePaper | August 30, 2022

Access to the user’s data requires using the User Master Password which is only known by the user. It is used to generate the symmetric Advanced Encryption Standard(AES) 256-bit key for encryption and decryption of the user’s personal data on the user’s device. We useWebcrypto API for most browser based cryptography and the native libraries for IOS and Android.

Read More
news image

A Lifeline: Patient Safety and Cybersecurity

whitePaper | December 3, 2019

Healthcare information is unique and personal to us all.Indeed,the patient is at the center of healthcare, as it would not exist if the patient did not exist. Bits and bytes in today’s digital world have real significance when it come to patient care lives are on the line.

Read More

Spotlight

ExploitHub

ExploitHub is the information security community's first legitimate marketplace for validated, non-zero-day exploits. Unparalleled access to exploits in the market enables penetration testers to perform comprehensive and accurate assessments faster and more efficiently. The marketplace also enables a diverse industry of security researchers to be compensated for their work and contribute to improving security defenses. Security vendors can utilize the exploits available in the market to better and more comprehensively test the effectiveness of their products.

Events