HomeKit is where the dearth is – no one wants Apple’s IoT tech

Is anyone buying it – figuratively or literally? It's been four months since Apple half-launched its smart-home/internet-of-things service through the introduction of a new app...

Battling the Botnet Armies

Marie Hattar  wrote an interesting post about Battling the Botnet Armies that I would like to share. "Botnet armies have become bigger, more active and more...

Dyre Authors Apparently Working on New Banking Trojan

Eduard Kovacs wrote an interesting post about Dyre Authors Apparently Working on New Banking Trojan that I would like to share. "At least one of the...

Researchers Build Configuration Extractor for Locky Ransomware

Ionut Arghire wrote an interesting post about Researchers Build Configuration Extractor for Locky Ransomware that I would like to share."Researchers from Cisco Talos have created a new tool...

Breaking the OODA Loop!

Lance Cottrell wrote an interesting post about Breaking the OODA Loop! that I would like to share. "The OODA loop is a well established concept often...

A Spell Check Equivalent for Building Security In

Jim Ivers  wrote an interesting post about A Spell Check Equivalent for Building Security In that I would like to share. "I can honestly say that spell...

Want Better Security? Be a Pragmatist.

Joshua Goldfarb wrote an interesting post about Want Better Security? Be a Pragmatist. that I would like to share. "I’ve always considered myself a pragmatist.  Perhaps not...

Using Apache Hadoop to Meet Cybersecurity Challenges

Rocky DeStefano wrote an interesting post about Using Apache Hadoop to Meet Cybersecurity Challenges that I would like to share. "Apache Hadoop turned 10 this year. What...

Malware Increasingly Abusing WMI for Evasion

Ionut Arghire  wrote an interesting post about Malware Increasingly Abusing WMI for Evasion that I would like to share. "Malware is increasingly using Windows Management Instrumentation...

How to Make Threat Intelligence Practical for Your Organization

Adam Meyer wrote an interesting post about How to Make Threat Intelligence Practical for Your Organization that I would like to share. "f there is a...