Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

CVE-2019-13720 flaw in Chrome exploited in Operation WizardOpium attacks

One of the two flaws in Chrome addressed by Google, CVE-2019-13720, was exploited in a campaign that experts attribute to Korea-linked threat actors. This week Google released security updates to…

Posted in Uncategorized | Tagged , , , , | Comments Off on CVE-2019-13720 flaw in Chrome exploited in Operation WizardOpium attacks

How to Build an Effective Insider Threat Program: Part I

By Shareth Ben, Insider Threat SME at Securonix On the heels of insider threat awareness month, it’s clear that although we are more aware of the attacks and threats from…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on How to Build an Effective Insider Threat Program: Part I

Three Key Business Lessons From The Founder of a Big Data Security Company

By MacLane Wilkison, Co-Founder of ZeroDB When startups mix with corporations we see an oil-and-water effect. There’s often a gap in work practices, organizational structure, and managerial outlook, not to…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , | Comments Off on Three Key Business Lessons From The Founder of a Big Data Security Company

13th Anniversary Global InfoSec Awards for 2025 now open for early bird packages! Winners Announced during RSAC 2025...

X