Three Ways DNS is Weaponized and How to Mitigate the Risk
Threatpost
MARCH 13, 2019
Why are hackers using the DNS infrastructure against us? The answer is more complex than you might think.
Threatpost
MARCH 13, 2019
Why are hackers using the DNS infrastructure against us? The answer is more complex than you might think.
SecureWorld News
SEPTEMBER 7, 2023
The panel will tackle topics and questions, including: The potential risks quantum computing poses to current cryptographic methods. When will these risks come to fruition, and who are the main threat actors? Director of Information Security, State of Colorado Governor's Office of Information Technology; and Toby Zimmerer, Sr.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
eSecurity Planet
DECEMBER 20, 2023
Attack surface management aims to automate the process of discovering, assessing, and prioritizing vulnerabilities and third-party, digital supply chain, and cloud risks. It addresses both internal and external (EASM) risks. CAASM (cyber asset ASM) and DRPS (digital risk protection) are also related terms and elements of ASM.
ForAllSecure
OCTOBER 9, 2019
How exactly will artificial intelligence help bridge the infosec skills gap and what kinds of security work are still best left to humans? For example, they may think, "Hey, the user's going to give me an input and it's only going to be as long as maybe a DNS record." but they never actually checked that. David Brumley: Oh, no.
ForAllSecure
OCTOBER 9, 2019
How exactly will artificial intelligence help bridge the infosec skills gap and what kinds of security work are still best left to humans? For example, they may think, "Hey, the user's going to give me an input and it's only going to be as long as maybe a DNS record." but they never actually checked that. David Brumley: Oh, no.
ForAllSecure
OCTOBER 9, 2019
How exactly will artificial intelligence help bridge the infosec skills gap and what kinds of security work are still best left to humans? For example, they may think, "Hey, the user's going to give me an input and it's only going to be as long as maybe a DNS record." but they never actually checked that. David Brumley: Oh, no.
Threatpost
JANUARY 24, 2019
A look at API attack trends such as the current (and failing) architectural designs for addressing security of these API transactions.
Let's personalize your content