Ransomware: When to pay (and when not to)
While most security professionals argue against paying the ransom, there are some cases where paying is the right choice for an organization. Learn what to consider, and how to decide.
Insights, tools, and best practices to keep your organization and users secure.
While most security professionals argue against paying the ransom, there are some cases where paying is the right choice for an organization. Learn what to consider, and how to decide.
An interview with Scout Brody, Executive Director at Simply Secure.
Understand the latest ransomware delivery methods, use the latest network indicators, and detect the latest behavioral indicators.
Five questions for Andrea Limbago: Insights on how social science can improve an organization’s security strategy.
An interview with Susan Sons from the Center for Applied Cybersecurity Research at Indiana University.
The O’Reilly Hardware Podcast: Safeguarding against new privacy risks.
Binu Ramakrishnan highlights current security risks and CI/CD threat modeling and presents security patterns-based techniques to mitigate these risks, including a novel idea called auth events to delegate user privileges to CI/CD workflow jobs.
Matthew Carroll highlights the current design model for machine learning and deep learning and discusses new methods that make privacy an embedded feature.
Thoughts from O'Reilly Security Conference committee chairs Courtney Nash and Allison Miller on the New York event's spotlight on defenders, focus on supporting the defender community, and taking the event to Amsterdam.
Five questions for Alex Pinto: Data-science techniques for incorporating indicators of compromise into your threat intelligence strategy.
Dan Kaminsky on the progress made at O’Reilly Security’s first hackathon to make web security easier.
Five questions for Desiree Matel-Anderson: Insights on FIT’s three-step methodology for maneuvering through cybersecurity emergencies.
Join Dan Kaminsky at the O’Reilly Security Hackathon to help make web security easier and more effective.
As the dust settles on last week's DDoS attack, it’s time to ask—and act on—the question of “Now what?”
Five questions for Chiara Rustici: Insights on the global impact of the new General Data Protection Regulation, and how to get started with implementation.
Tips for writing a successful proposal for the O'Reilly Security Conference.
Cracking the misconception that hacks are sophisticated and complex by breaking down the most common attack categories.
Five questions for Fernando Montenegro: Insights on how to apply economic theory to solve security challenges and improve an organization’s overall security posture.
Using RUM to analyze HTTP vs. HTTPS in different world regions and across wireline, rural wireline, and wireless ISPs.
Lessons learned at Fastly: How to build a robust system that identifies, mitigates, contains, and properly communicates incidents to prevent recurrence.
5 questions for Binu Ramakrishnan: Insights on the threats of centralized multi-tenant CI/CD environments, common protection methods, and tips for improved security.
5 Questions for Timothy Gallo and Allan Liska: Insights on common ransomware delivery methods and how to find balance between minimizing attack risks and maximizing productivity.
Insider information on the O'Reilly Security Conference proposal process, including acceptance and rejection stats.
Five questions for Laura Mather: Insights on how groupthink and heterogeneous teams impact decision-making.