home.aspx
 
EVENTS

The RSA Conference 2020
THE RSA CONFERENCE 2020
July 15-17, 2020
RSA Conference has been a driving force behind the world’s cybersecurity agenda. The central point where people from around the world gather to share, learn and grow. And the place that provides a forum for innovation and partnership. It’s even more important today to have these points o...

WASHINGTON DC CYBERSECURITY CONFERENCE
WASHINGTON DC CYBERSECURITY CONFERENCE
July 23-23, 2020
More than 30,000 customers worldwide—including nearly half the global Fortune 500—rely on RSA’s business-driven security™ strategy for cyber threat detection and response, identity and access management, online fraud prevention, and governance, risk and compliance solutions. ...

Alpine Security, LLC

SHARESHARESHARE
Defense-Grade Comprehensive Penetration Testing. We are professional ethical hackers that use real hacker tools and techniques to test your defenses. We identify your weakest link - is it your users? Your firewall? Your incident response plan? Exam Pass Guarantees for Certification Boot Camps. Options for Live Online or Live In-Person Training. Our trainers are practitioners with real-world experience We’re small enough to take real pride in each and every job we do and agile enough to take on projects of all sizes. We are always up for a challenge. We take pride in our ability to bring order to chaos and tangible results to difficult circumstances.
SHARESHARESHARE

RELATED NEWS


IBM adds a new policy recommendation engine to its MaaS360 unified endpoint management platform to help improve security configurations and compliance. IBM announced on June 4 that it is adding a pair of new capabilities to its MaaS360 with Watson unified endpoint management (UEM) platform. The new features include a policy recommendation engine that provides enterprise administrators with best practices and suggested configurations for endpoint security. In addition, MaaS360 with Watson is bein...
EWEEK
READ MORE

The coming year will see a mix of old and new as phishing is supercharged with AI but reported vulnerabilities continue to cause organizations problems, according to Trend Micro. The security giant claimed in its predictions report this week that phishing will continue to grow in popularity as exploit kits fade. The number of detections of the latter has fallen from over 14.4 million in 2015 to just 261,000 today, while blocked phishing URL volumes have jumped from 8.1 million to over 210 millio...
INFOSECURITY MAGAZINE
READ MORE

Nearly 60% of executives at critical infrastructure operators polled in a recent survey said they lack appropriate controls to protect their environments from security threats. While organizations have made significant investments to secure their IT infrastructures, they have not fully addressed threats to operational technology (OT) environments: 57 out of 100 executives from various critical infrastructure organizations surveyed by Indegy said they are not confident that their enterprise nor o...
INFOSECURITY MAGAZINE
READ MORE

Although the wave of WannaCry and Petya ransomware has now been slowed down, money-motivated hackers and cyber criminals have taken lessons from the global outbreaks to make their malware more powerful. Security researchers have now discovered at least one group of cyber criminals that are attempting to give its banking Trojan the self-spreading worm-like capabilities that made recent ransomware attacks go worldwide. The new version of credential stealing TrickBot banking Trojan, known as "...
THE HACKER NEWS
READ MORE

A vast majority—90%—of data loss prevention (DLP) violations occur in cloud storage apps, mostly affecting enterprise confidential intellectual property or customer and regulated data....
INFOSECURITY MAGAZINE
READ MORE

A malicious tool that has managed to fly under the radar since April 2017 is showing great focus on obfuscation, in an attempt to evade detection, Palo Alto Networks warns. Dubbed PowerStager, the tool has shown an uptick in usage for in-the-wild attacks around December 2017. Developed as a Python script that generates Windows executables using C source code, it uses multiple layers of obfuscation to launch PowerShell scripts to execute a shellcode payload. PowerStager uses a unique obfuscation ...
SECURITY WEEK
READ MORE

EVENTS

The RSA Conference 2020
THE RSA CONFERENCE 2020
July 15-17, 2020
RSA Conference has been a driving force behind the world’s cybersecurity agenda. The central point where people from around the world gather to share, learn and grow. And the place that provides a forum for innovation and partnership. It’s even more important today to have these points o...

WASHINGTON DC CYBERSECURITY CONFERENCE
WASHINGTON DC CYBERSECURITY CONFERENCE
July 23-23, 2020
More than 30,000 customers worldwide—including nearly half the global Fortune 500—rely on RSA’s business-driven security™ strategy for cyber threat detection and response, identity and access management, online fraud prevention, and governance, risk and compliance solutions. ...