Home Search

white house - search results

If you're not happy with the results, please do another search
actively exploited vulnerabilities, Vulnerabilities, risk-based vulnerability management

Old Unpatched Vulnerabilities Could Invoke Cyberattacks and Malware

0
The “new normal” business operations left most organizations vulnerable to new attack vectors. From database misconfigurations to unpatched vulnerabilities, organizations suffered several challenges in...

It’s Cybersecurity Awareness Month

0
Now, unless you are in the industry OR associated with it, the chances are you’ve not got a clue that October is “click responsibly”...
99% of Websites Are Prone to Cyberattacks Via JavaScript Plug-Ins: Report

99% of Websites Are Prone to Cyberattacks Via JavaScript Plug-Ins: Report

0
A survey from the web application security provider Tala Security revealed that cybercriminals are exploiting security vulnerabilities in websites to launch client-side attacks like...

What I learned at the Black Hat USA 2019 Conference

0
Contributed by Jason Bloomberg The phrase ‘black hat’ refers to a hacker with criminal intentions, so I expected my first trip to the Black Hat...
CISO appointment

OMB names Grant Schneider as Federal Chief Information Security Officer

0
The Office of Management and Budget (OMB) recently announced the appointment of Grant Schneider as the permanent Federal Chief Information Security Officer. Schneider, who...
Department of State, state dep

Lawmakers propose bug bounty program for State Department

0
House Lawmakers Ted Lieu and Ted Yoho have proposed ‘Hack the State Department’ bill which would set up a bug bounty program to boost...
CISO, Cybersecurity

Two questions for every security leader

0
Contributed by Richard Seiersen, SVP & Chief Information Security Officer, LendingClub The actual science of logic is conversant at present only with things either certain, or...
BlackMatter ransomware

10 things* (and a bonus one) about hackers…

0
Contributed by Chris Roberts, Chief Security Architect, Acalvio Technologies So, there’s the distinct possibility I might have gone on a recent rant about hackers and hoodies, masks,...
Bug, vulnerability, zero-day

Bug Bounty Programs: Closing Security Gaps

0
This whitepaper is contributed by Tari Schreider, Chief Cybersecurity Strategist and Author, Prescriptive Risk Solutions, LLC What is a Bug Bounty Program? Bug or hacker bounty programs...

Our Events

0
CISO Forum Canada November 9th - 13th, 2020 Canada EC-Council’s CISO Event Program, brought to you by siberX, brings together speakers, attendees, and sponsors from all over...

MOST POPULAR

RECENT POSTS