Election Security's Sticky Problem: Attackers Who Don't Attack Votes If election defenders are protecting votes, and adversaries are attacking something else entirely, both sides might claim success, "Operation BlackOut" simulation shows. Is China the World's Greatest Cyber Power? While the US, Russia, Israel, and several European nations all have sophisticated cyber capabilities, one threat intelligence firm argues that China's aggressive approach to cyber operations has made it "perhaps the world's greatest cyber power." MFA Mistakes: 6 Ways to Screw Up Multifactor Authentication Fearful of messing up its implementation, many enterprises are still holding out on MFA. Here's what they need to know. How to Stay Secure on GitHub GitHub, used badly, can be a source of more vulnerabilities than successful collaborations. Here are ways to keep your development team from getting burned on GitHub.
Security Jobs With a Future -- And Ones on the Way Out Some titles are hot, while others are not, amid rapidly shifting business priorities.
6 Dangerous Defaults Attackers Love (and You Should Know) Default configurations can be massive vulnerabilities. Here are a half dozen to check on for your network.
Ask-the-Expert: Should I Segment my IoT Devices Onto Their Own Networks? Sean Tufts, practice director, product security, ICS and IoT, Optiv, explains why the criticality of the device determines the level of segmentation.
Poll: Endpoint Extravaganza What shape do you expect remote endpoints to be in when they start winging their way back to the office?
Name That Toon: 'Rise' and Shine Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card. MORE NEWS & COMMENTARY |