Home | Latest News | Popular News | Our Network | About | Contact
Security News from 'Zeltser' | www.SecurityPhresh.com
Security News from 'Zeltser'
Showing 'Security News from 'Zeltser'' from 1 to 10
Making Sense Of Microsoft’s Endpoint Security Strategy
6th Aug 2018 [2 months ago] from Zeltser
Microsoft is no longer content to simply delegate endpoint security on Windows to other software vendors. The company has released, fine-tuned or rebranded  multiple security technologies in a way that will have lasting effects on the...
Retired Malware Samples: Everything Old Is New Again
27th Jul 2018 [2 months ago] from Zeltser
Finding real-world malware samples that illustrate practical analysis techniques is tricky. When training professionals how to reverse-engineer malware, Ive gone through lots of malicious programs for the purpose of educational examples....
Scammers Persuade Victims By Supplying Breached Personal Details
25th Jul 2018 [2 months ago] from Zeltser
Scammers use a variety of social engineering tactics when persuading victims to follow the desired course of action. One example of this approach involves the fraudulent message including some personal details about the recipient to prove...
Cyber Is Cyber Is Cyber
2nd Jun 2018 [4 months ago] from Zeltser
If youre in the business of safeguarding data and the systems that process it, what do you call your profession? Are you in cybersecurity? Information security? Computer security, perhaps? The words we use, and the way in which the meaning...
Communicating About Cybersecurity In Plain English
21st May 2018 [4 months ago] from Zeltser
Too often when we communicate with regular, non-technical people about IT and cybersecurity, we use language that virtually guarantees that our message will ignored or misunderstood. This is often a problem for information security and...
Technical Writing Tips For IT Professionals
7th May 2018 [5 months ago] from Zeltser
This cheat sheet offers guidelines for IT professionals seeking to improve technical writing skills. To print it, use the one-page PDF version; you can also customize the Word version of the document. General Recommendations Determine...
Security Product Management At Large Companies Vs. Startups
9th Apr 2018 [6 months ago] from Zeltser
Is it better to perform product management of information security solutions at a large company or at a startup? Picking the setting thats right for you isnt as simple as craving the exuberant energy of a young firm or coveting the resources...
Practical Tips For Creating And Managing New Information Technology Products
21st Jan 2018 [8 months ago] from Zeltser
This cheat sheet offers advice for product managers of new IT solutions at startups and enterprises. To print it, use the one-page PDF version; you can also edit the Word version to customize it for you own needs. Responsibilities of a...
Hybrid Analysis Grows Up – Acquired By CrowdStrike
11th Nov 2017 [11 months ago] from Zeltser
CrowdStrike just acquired Payload Security, the company behind the automated malware analysis sandbox technology Hybrid Analysis. Jan Miller founded Payload Security in 2014. The interview I conducted with Jan in early 2015 captures his...
1