your market intelligence analyst
Search Results
Edit Save
12,642 results
Security Bloggers Network 10/16/2019 11:00
At ForAllSecure, our mission is to help developers find critical bugs in their software quicker, easier, and faster than standard development practices and tools. To facilitate this mission, we have looked to the open source world for exemplar software we can analyze with our Mayhem, in order to get a stronger sense of its effectiveness and ease of integration into existing projects. This process has proven invaluable for ForAllSecure, providing hands-on experience in ingesting additional real-world software targeting a variety of environments and build systems and ensuring that the process is as streamlined as possible for new adopters. For more information on Mayhem visit. .
Security Bloggers Network 10/16/2019 07:00
Comparisons have already been drawn about the California Consumer Privacy Act (CCPA), calling it ‘the GDPR for California residents.’ However, drawing comparisons to PCI DSS as the title suggests may cause some eyebrows to raise. Protection of the privacy and personal information of California residents, as broadly defined in CCPA, has core components, which are comparable to GDPR and PCI DSS. .
Security Bloggers Network 10/16/2019 05:50
A pair of malicious activities have become a stunning example of digital transformation – unfortunately on the darknet. Related: Cyber risks spinning out of IoT Credential stuffing and account takeovers – which take full advantage of Big Data, high-velocity software, and automation – inundated the internet in massive surges in 2018 and the first half […]. .
Security Bloggers Network 10/16/2019 03:00
HIPAA-compliant data storage involves implementing both physical and digital safeguards designed to protect sensitive health information from a growing number of threats. Though global ransomware attacks are on the decline, healthcare organizations continue to be disproportionately targeted by hackers. Experts believe that the healthcare industry now experiences the most ransomware attacks of any sector, with.. .
Security Bloggers Network 10/16/2019 02:00
State-sponsored hackers and other threat actors are impersonating each other in an attempt to evade detection, according to a recent report from Optiv. The “2019 Cyber Threat Intelligence Estimate” report, comprised of data from Optiv’s Global Threat Intelligence Center (gTIC), and security firms IntSights and Carbon Black, finds hackers or so-called “hybrid threat actors”—those who masquerade as.. .
Security Bloggers Network 10/15/2019 23:00
Most organizations with industrial control systems (ICS) fall into one of two categories: regulated and non-regulated. For those subject to government imposed regulatory requirements, the selection of a cybersecurity framework is obviously compelling. Such is the case with the nuclear energy industry and NEI 08-09. The nuclear energy industry is one of the safest industries. […]…. . .

Financial Services

Business Issues

Companies - Public

Companies - Venture Funded

Financial Results

Global Markets

Global Risk Factors

Government Agencies

Information Technologies

Job Titles

Legal and Regulatory

Political Entities


Strategic Scenarios



  • Actions
    • Bookmark and Share: Allows you to Bookmark the page for easy future retrieval and sharing with colleagues
    • Email: Opens a pop-up window where you can write a message to the recipient of the email
    • Copy URL: Copies the URL of the requested document for pasting in an email or other document
    • Previous Versions: Only shown if essentially the same document has been republished
  • Saved Searches and Alerts
    • Save your search for later viewing & updates by clicking the blue "Save" button to the right of the search box. 

Click here for more info on Search Results.