For recent articles about Risk Based Security, see our press page.


December 27, 2017FormtekSecurity: Worst Year Ever for Data Losses Caused by Poor Security
December 24, 2017Computerworld.czHack the hackers
December 20, 2017HIT Consultant MediaOpenEMR Security Vulnerability Could Expose Medical Records Impacting 90M Patients
December 11, 2017NextgovCompany That Used Russian Coders for Pentagon Project Strikes Deal
November 30, 2017Becker’s Hospital Review12 healthcare privacy incidents in November
November 29, 2017Healthcare Analytics NewsHow an OpenEMR Weakness Endangered Patient Information
November 29, 2017eWeekReported Software Vulnerabilities on Track to Break Record in 2017
November 29, 2017Becker’s HealthcareSecurity researchers discover vulnerability in OpenEMR that potentially compromises 90M health records
November 29, 2017Help Net SecurityOpenEMR flaw leaves millions of medical records exposed to attackers
November 28, 2017Security BoulevardMillions of Health Records At Risk Due to Vulnerable OpenEMR Configurations
November 26, 2017Tech.coCyber Monday 2017: The How-To Guide
November 14, 2017Tech.coCybersecurity Study Says Getting Hacked Is More Common Than Ever
November 14, 2017Dark Reading2017 Has Broken the Record for Security Vulnerabilities
November 8, 2017Information AgeAre robots the solution to security breaches?
November 8, 2017BetaNewsMore than seven billion records exposed in 2017 data breaches
October 31, 2017ThreatpostFirefox Bolsters Privacy, Pulls Plug on Browser Canvas Fingerprinting
October 30, 2017European Council on Foreign RelationsAttribution is what states make of it Attribution is what states make of it
October 27, 2017ThreatpostGoogle Patches ‘High Severity’ Browser Bug
October 23, 2017The Global Dispatch Inc.Cyber Security: Tips on How to Protect Yourself Online
October 23, 2017XconomyFollowing Wave of Interest in Cybersecurity, SailPoint Files for IPO
October 19, 2017BloombergThe U.S. Lags Behind China in Spotting Cyberthreats
October 4, 2017FleetNewsIntelligent Fleet: Fleets and suppliers play the data generation game
September 25, 2017ITProPortalBeyond passwords: Industry steps up to hardware-enhanced endpoint security
September 11, 2017ChiefExecutive.netBeware: Your Latest Cybersecurity Threat Could Be the One You Just Hired
September 11, 2017TheHillEquifax data breach — here’s what we can learn from it
 September 1, 2017SecurityIntelligenceMore Than 711 Million Email Addresses Exposed in Huge Data Breach
August 25, 2017Credit.comSteps for Protecting Your Personally Identifiable Information at Home
August 18, 2017HuffPost12 Places Your Data May Not Be Safe (And What You Can Do)
August 16, 2017Business.comMeasures to Protect Data in Health Care
August 14, 2017Inc.comWinter is Coming: How the HBO Hack Has Altered the Trajectory of Cyber Insurance
August 7, 2017Asset Finance International‘Stunning’ growth in records exposed in data breaches
July 28, 2017DABCCVMware: On-Site Protection: 3 Data Security DRaaS Benefits
July 28, 2017KOSix billion records were hacked in half a year
July 28, 2017On The WireNew Report Shows Depth of Data Breaches Is Worse Than Before
July 27, 2017CXO TodayGlobal Cybercrime Industry Will Continue To Flourish
July 27, 2017The Star OnlineSix billion records hacked so far this year
July 27, 2017Security IntelligenceReport Shows Increase in Data Breaches in the First Half of 2017
July 26, 2017IT World CanadaCanada third in reported data breaches so far this year
July 26, 2017Credit Union Times‘Stunning’ Increase in Data Breaches in 2017
July 26, 2017HackRead6 billion records hacked in 2017 so far; ransomware victims paid $25 million
July 26, 2017KCRAMore than 6 billion records have been hacked this year
July 25, 2017Phys.orgSix billion records hacked so far this year: researchers
July 25, 2017Help Net Security6+ billion records exposed in data breaches in first half of 2017
July 17, 2017Poughkeepsie JournalIBM: New, made-in-Poughkeepsie mainframe safeguards data
July 11, 2017CSOClosing the CVE gap: Is MITRE up to it?
June 29, 2017eSecurity Planet63 Percent of Companies Can’t Monitor Devices Off the Corporate Network
June 27, 2017DARKreadingPetya Or Not? Global Ransomware Outbreak Hits Europe’s Industrial Sector, Thousands More
June 27, 2017CyberWireCyberWire Daily Podcast for 06.27.17
June 22, 2017Linux InsiderOTA Report: Consumer Services Sites More Trustworthy Than .Gov Sites
June 22, 2017eSecurity PlanetOver a Quarter of Government Computers Run on Outdated Operating Systems
June 15, 2017Becker’s Health IT & CIO Review107+ cybersecurity companies in healthcare | 2017
June 6, 2017The Silicon ReviewSilicon 100 – 2017
June 5, 2017The Globe and MailCybersecurity gets more sophisticated – but so does hacking
May 26, 2017SC Magazine‘Unrelenting’ rise in vulnerabilities, Risk Based Security reports
May 24, 2017Financial TimesArtificial intelligence and quantum computing aid cyber crime fight
May 24, 2017DARKReading4 Reasons the Vulnerability Disclosure Process Stalls
May 23, 2017eWeekSoftware Flaws Jump; Data Breaches Rise Moderately in Q1
May 23, 2017DARKReadingData Breach, Vulnerability Data on Track to Set New Records in 2017
May 23, 2017HelpNetSecurityData breach activity reaches all-time high
May 23, 2017Infosecurity Magazine2017 Has Already Racked Up 1,200 Breaches–On Pace for Worst Year Ever
May 15, 2017IDGWannaCry attacks are only the beginning
May 2, 2017Trib Total MediaDollar Bank issuing new debit cards in the wake of Chipotle data breach
April 18 2017MISTIWhat You Need to Know About Cyber Liability Insurance
March 18, 2017Boulder Daily CameraCyber attacks a serious, and under-reported, threat to Boulder Valley companies
March 13, 2017PCWorldHow much are vendor security assurances worth after the CIA leaks?
March 10, 2017Dark ReadingFinancial Institutions Less AppSec-Savvy Than You’d Think
March 2, 2017Bleeping ComputerHidden Backdoor Found in Chinese-Made Equipment. Nothing New! Move Along!
March 2, 2017CyberScoopHow Netgear and Trustwave built a virtuous cycle of vulnerability disclosure
February 25, 2017Hi-Tech GazetteGoogle unveils the vulnerability in Internet Explorer and Edge
February 24, 2017CIOGoogle discloses unpatched IE vulnerability after Patch Tuesday delay
February 20, 2017IBM SecurityIntelligenceMicrosoft Patching Delay: A Huge Hacking Valentine?
February 16, 2017PC WorldMicrosoft’s monthlong delay of patches may pose risks
February 15, 2017CIOJavaScript-based ASLR bypass attack simplifies browser exploits
February 10, 2017Daily MailArby’s investigates possible credit card data breach: Malware on cash registers could have affected more than 355,000 credit cards
February 9, 2017CyberScoopWhile startups cashed in, total cybersecurity venture funding fell in 2016
February 8, 2017eWeekSoftware Vulnerabilities Continue to Climb Despite Focus on Security
February 8, 2017BloombergVC Firms Back Record Number of Cybersecurity Startups in 2016
February 8, 2017The Merkle41 New Software Vulnerabilities Reported Every Day Throughout 2016
February 8, 2017LivemintVenture capital firms back record number of cybersecurity start-ups in 2016
February 6, 2017CIO DIVEBots, billions and breaches: Cybersecurity by the numbers
February 6, 2017Dark ReadingVulnerabilities Hit High Water Mark in 2016
February 6, 2017CyberScoopReport: Number of new software vulnerabilities flattening
February 6, 2017ITWireMicrosoft bugs showed rise in 2016: report
February 6, 2017Becker’s HealthcareReport: 15k software vulnerabilities released in 2016
February 6, 2017eWeekMore Software Vulnerabilities Disclosed in 2016 Than Ever Before
February 6, 2017Help Net SecurityNumber of disclosed vulnerabilities reaches all time high in 2016
February 3, 2017Network WorldZero-day Windows file-sharing flaw can crash systems, maybe worse
February 2, 2017TopWireNewsRisk Based Security Appoints Sven Krewitt To VulnDB Research Team
February 1, 2017HowStuffWorks NOW2016 Broke the Record for Stolen Data
February 1, 2017Infosecurity MagazineCrooks Raked in $16B via Identity Fraud Last Year
January 31, 2017The Merkle2016 Data Breaches Account For Over 4 Billion Stolen Records
January 31, 2017DARKReadingOver 4.2 Billion Records Exposed In 4,149 Breaches In 2016
January 30, 2017JURISTReport: record number of data breaches in 2016
January 30, 2017eWeekYahoo Topped Record List of Data Breaches in 2016, Report Finds
January 30, 2017NBC NewsMore Than 4 Billion Data Records Were Stolen Globally in 2016
January 30, 2017ZDNetOver four billion data records were stolen in 2016
January 30, 2017BreitbartReport: More than 4B data files stolen worldwide last year, a record
January 28, 2017International Business Times UKData Privacy Day – 5 things you can do to keep your data from being hacked
January 27, 2017eSecurity Planet4,419 Data Breaches Exposed Over 4.2 Billion Records in 2016
January 27, 2017SecurityWeek4.2 Billion Records Exposed in Data Breaches in 2016: Report
January 27, 2017WRBLReport: Most 2016 data breaches happened in US
January 27, 2017Tribune-ReviewCarnegie Mellon privacy clinic aims to help protect you from hackers
January 27, 2017Networks AsiaTop data breach trends in 2016
January 26, 2017WOODTV.comReport: Most 2016 data breaches happened in US
January 26, 2017TripWireU.S. Top-Ranked Globally in 2016 Data Breaches, Finds Report
January 26, 2017eWeekYahoo Others Make 2016 a Record Year for Data Breaches, Report Finds
January 26, 2017IT Business EdgeData Breach Numbers Hit Record Highs in 2016
January 26, 2017Softpedia NewsLast Year’s Data Breaches Exposed 4.2 Billion Records, Most from America
January 26, 2017Infosecurity MagazineUS Leads World in Data Breaches
January 26, 2017Infosecurity MagazineGlobal Orgs See 82K Cyber Incidents in 2016
January 26, 2017iTWireNearly half of 2016 data breaches in US: report
January 25, 2017ISBuzz NewsUS #1 In Data Breaches
January 25, 2017Becker’s HealthcareMedical industry accounted for 9.2% of breaches in 2016
January 25, 2017IT WorldTop data breach trends in 2016 — Phishing, skimming rise; hacking holds ground
January 25, 2017CircleIDData Breaches Reported During 2016 Exposed Over 4.2 Billion Records
January 25, 2017Dark ReadingData Breaches Exposed 4.2 Billion Records In 2016
January 25, 2017Low CardsUnited States Number One in Data Breaches
January 25, 2017PRwebOnline Trust Alliance Finds Consumer Data Breaches Level Off While Other Cyberattacks Skyrocket
January 25, 2017The HillReport: US leads world in data breaches
January 10, 2017Dark ReadingMongoDB Attack Shows Off Cyber Extortionists’ New Tricks


December 29, 2016CIONew year’s resolution for IoT vendors: Start treating LANs as hostile
December 14, 2016SOFREP NewsSailors’ personally identifiable information stolen by Ricky Ninja
November 17, 2016Digital JournalRisk Based Security appoints Anthony Minnelli Director of Threat Intelligence
November 14, 2016CBS ChicagoIdentity Thieves Laying Traps At Gasoline Pumps
November 3, 2016CyberScoopWhat we can (and can’t) learn from the latest Shadow Brokers dump
November 3, 2016Richmond Times-DispatchChamberRVA’s Innovation Award goes to Nutriati; Keiter and Workshop Digital given Impact Awards
October 31, 2016TechNewsWorldMicrosoft: Google’s Policy Endangers Windows Users
October 31, 2016CIOGoogle clashes with Microsoft over Windows flaw disclosure
October 31, 2016CyberScoopShadow Brokers leak list of supposed NSA controlled computers in China, Russia
October 25, 2016SoftpediaSecurity Firm Tries Desperate Solution to Alert Company of Data Leak
October 23, 2016Richmond Times-DispatchFinalists named for ChamberRVA’s i.e* Innovation Award
October 21, 2016SC MagazineHacker ‘drags and drops’ 43.4 million Weebly user accounts in mega breach
October 18, 2016SPAMfighterA Data Management Company Encounters Hack Losing Minimum 58m Personal Records
October 14, 2016WiredBreach of Data Storage Company Exposes Personal Data from at Least 58.8 Million Accounts, if Not More
October 13, 2016The RegisterPersonal info on more than 58 million people spills onto the web from data slurp biz
October 13, 2016Yahoo! TechData breach of data-management firm sees 58 million personal records stolen
October 13, 2016Digital TrendsHacker steals at least 58 million personal records from data management firm
October 13, 2016SC MagazineUnsecured database lets hacker expose 58 million plus records from data management firm
October 13, 2016Hack ReadUnsecured MongoDB Database: 58M Business Firm Accounts Leaked
October 12, 2016SpiceworksSnap! Database breach exposes 58 million, researchers examine IoT security
October 12, 2016ARS TechnicaBreach exposes at least 58 million accounts, includes names, jobs, and more
October 12, 2016CSOAmazon resets customer passwords, while LeakedSource discloses massive update
October 11, 2016SoftpediaHacker Steals 58 Million User Records from Data Storage Provider Read
September 23, 2016DARKReadingAn Open-Source Security Maturity Model
September 22, 2016CSOOver 6,000 vulnerabilities went unassigned by MITRE’s CVE project in 2015
September 12, 2016ITWebConnected cars shift insurance gear
September 1, 2016Virus GuidesBogus Ransomware Hits Unprotected Redis Servers
August 31, 2016Central Valley Business TimesA billion files put at risk in first half of year, says cybersecurity report
August 31, 2016SoftpediaRedis Servers Targeted with Fake Ransomware
August 26, 2016EngadgetUntangling the NSA’s latest alleged embarrassment
August 23, 2016SoftpediaList of Equation Group Files Leaked by Shadow Brokers
August 21, 2016LA TimesNSA-linked hackers hoard malware secrets. What could possibly go wrong?
August 21, 2016CIOAlleged NSA hackers probably gave away a small fortune by leaking exploits
August 19, 2016South China Morning PostHacking tools stolen from NSA show Chinese cyberfirms were targeted, experts say
August 18, 2016MashableAll you need to know about the NSA-linked Equation Group hack
August 18, 2016MIS-AsiaAlleged NSA data dump contain hacking tools rarely seen
August 17, 2016Petro Global NewsShadow Brokers claims it hacked NSA, has access to NSA hacking tools Petro Global News
August 17, 2016fedscoopTech vendors admit stolen NSA cyber weapons are effective, warn customers
August 17, 2016AP News‘Auction’ of NSA tools sends security companies scrambling
August 16, 2016International Business TimesWho stole the NSA’s cyberweapons, what can they do and what will happen next?
August 16, 2016fedscoopExperts: Exposed NSA cyber weapons posted for auction appear legit
August 16, 2016PC WorldSuspected spycraft, not hacktivism, swirls around alleged NSA hack
August 16, 2016The GuardianHacking group auctions ‘cyber weapons’ stolen from NSA
August 16, 2016Mother JonesIt Looks Like the NSA Just Got Hacked
August 16, 2016Business InsiderEx-NSA insiders: There’s ‘a lot of panic’ over what’s been exposed by this massive hack
August 16, 2016IT WorldSuspected spycraft, not hacktivism, swirls around alleged NSA hack
August 16, 2016IBTimesWho stole the NSA’s cyberweapons, what can they do and what will happen next?
August 15, 2016Computer WorldNSA hacked? Top cyber weapons allegedly go up for auction
August 15, 2016FedscoopHackers claim to have stolen offensive cyber weapons from NSA
August 15, 2016SoftpediaShadow Brokers Group Auctions Off Supposed NSA Hacking Tools
August 15, 2016ArsTechnicaGroup claims to hack NSA-tied hackers, posts exploits as proof
August 13, 2016The MerkleTroyan Virus Turns Linux Servers into Bitcoin Miners
August 9, 2016SoftpediaLinux Trojan Mines for Cryptocurrency Using Misconfigured Redis Database Servers
August 4, 2016InverseNot Going to DEF CON? 5 Things to Watch From the Hacker Con
August 3, 2016Digital JournalDVI Communications & Risk Based Security Join Forces to Provide Cybersecurity Management Services
July 15, 2016SoftpediaThomson Reuters World-Check Terrorist Database Goes Up for Sale on the Dark Web
July 7, 2016SoftpediaOver 6,000 Redis Database Servers Ready for the Taking
July 4, 2016IndiaTVWebsites on target, hackers lay siege to 25,000 CCTV cameras
June 29, 2016CSO OnlineWormable flaws in Symantec products expose millions of computers to hacking
June 28, 2016CIOThousands of hacked CCTV devices used in DDoS attacks
June 16, 2016InfoWorldHack the hackers: Eavesdrop for intel on emerging threats
June 10, 2016DARKReadingThe End Of A Security Decade — And The Beginning Of A New One
May 26, 2016Ekstra Bladet (DK)Smager deres egen medicin: 1200 danske hackerprofiler afsløret
May 26, 2016Computerworld (DK)Datalæk fra kæmpe hackerforum: 1.200 danske hackerprofiler afsløret
May 24, 2016Libertatea (RO)Culmea furtului! Hackerii au atacat un site al unei comunități de… hackeri
May 20, 2016ZDNetCabcharge data exposure highlights need for mandatory breach notifications
May 19, 2016ChannelNewsCabcharge Database Hacked
May 19, 2016ITWebMore organisations opt for cyber liability insurance
May 19, 2016DARKReadingEpic Security #FAILS Of The Past 10 Years
May 19, 2016BetaNewsPopular hacking site Nulled hit by cyberattackers, user info leaked
May 18, 2016MotherboardThis Fake Hitman Site Is the Most Elaborate, Twisted Dark Web Scam Yet
May 18, 2016The RegisterCabcharge trip logs exposed by security-free database probe
May 18, 2016Neue Zürcher Zeitung (CH)Forum für gestohlene Nutzerdaten – Datendiebstahl bei
May 18, (RO)Un hacker a spart un site al unei comunităţi de… hackeri!
May 17, 2016BBC NewsHackers’ website breached by hacker
May 16, 2016ThreatpostInfo on 500K Users Doxxed in Hacking Forum Dump
May 14, 2016SoftpediaFamous Hacking Forum Suffers Devastating Data Breach
May 13, 2016International Business TimesHitman for hire: How the dark web contract-killer site BesaMafia was exposed by a hacker
May 13, 2016Ars TechnicaBreach of crime forum could cause a world of pain for members
May 11, 2016Bank Info SecurityVerizon Breach Report Criticized
May 6, 2016Government TechnologyNSA Discloses Hundreds of Hardware, Software Bugs Per Year
April 13, 2016PCWorldFBI reportedly bought exploit from hackers to access San Bernardino iPhone
April 12, 2016TechWormAnonymous Resume Operations in Italy By Hacking Italian Job Portals
April 11, 2016The HillOvernight Cybersecurity: EU regulators’ judgment on data deal coming soon
April 10, 2016SoftpediaAnonymous Resumes Operations in Italy with New Massive Hack
April 9, 2016SoftpediaSyrian Government Hacked, 43 GB of Data Spilled Online by Hacktivists
April 5, 2016FocusRHLe bulletin de paie “dans le nuage” : un orage qui peut être évité
April 01, 2016SCMagazineThreat of the month: April 2016
March 25, 2016ZDnetBadlock, another ‘major’ security bug that puts profits before patches
March 25, 2016San Francisco ChronicleCVE, a key cybersecurity resource, is at risk inside and out
Mar 25, 2016InfoWorldThe Badlock bug: Start your patch prep today
March 24, 2016WiredHype Around the Mysterious ‘Badlock’ Bug Raises Criticism
March 23, 2016ComputerWorldPrepare to patch a critical flaw in Windows and Samba file sharing
March 23, 2016SoftpediaBugfix for Overhyped Badlock Windows & Samba Flaw Coming in April
March 23, 2016SecurityWeekMicrosoft, Samba Preparing Patch for Severe “Badlock” Flaw
March 23, 2016CSO OnlineCompany behind the Badlock disclosure says pre-patch hype is good for business
March 17, 2016SecTorHow Safe Is Your Antivirus Software From Attack?
March 17th, 2016formtekSecurity: No End In Sight to Massive Data Breaches in 2016
March 17, 2016ThreatPostMitre Takes On Critics, Set To Revamp CVE Vulnerability Reporting
March 15, 2016SoftpediaAn Inventory of What Was Taken in the Staminus Data Breach
March 14, 2016The RegisterIronic: CCTV systems slide open a backdoor into your biz network
March 14, 2016International Business TimesStaminus hack: 2,300 customers impacted as CEO admits cyberattack
March 10, 2016InfoWorldOpenSSL flaw disclosure: Right thought, wrong time
March 2, 2016CSOSix questions: A brief Q&A on threat intelligence
February 22, 2016ITWebLooking into cyber risk insurance
February 19, 2016SoftpediaRaySharp DVRs Come With Hard-Coded Root Password
February 19, 2016Naked Security by SophosDVR snaps stills from CCTV surveillance and sends them to China
February 18, 2016Naked Security by SophosMore IoT insecurity: The surveillance camera that anyone can log into
February 18, 2016The Register519070 or blank: The PINs that can pwn 80k online security cams
February 17, 2016CSOHard-coded password exposes up to 46,000 video surveillance DVRs to hacking
February 10, 2016eWeekIRS Confirms It Was a Victim of an Automated Attack
February 10, 2016San Francisco ChronicleSite that had alleged FBI and Homeland Security data is now down
February 9, 2016Credit Union TimesBreaches Infest C-Stores, Gas Stations: Study
February 9, 2016Petrol PlazaGas stations, c-stores most hit by data breach, says latest study
February 5, 2016Executive-People (NL)Nog nooit vonden zoveel datalekken plaats als in 2015
February 4, 2016CSPWhich C-Stores, Oil Cos. Top Data Breach List?
February 3, 2016DARKReadingPasswords, Email Addresses, Were Most Stolen Data In 2015
February 3, 2016CSPTop 10 States Data Thieves Like Best
January 29, 2016PR NewswireRegistration Open for Rock Stars of Risk-Based Security, East Coast
January 26, 2016DARKReadingInsurers Getting Smarter About Assessing Cyber Insurance Policy Risks
January 14, 2016SC Magazine UKHow can security vendors reduce their own attack surface?
January 8, 2016CSOAntivirus software could make your company more vulnerable
January 6, 2016eWeekLinode Resets Passwords as DDoS Attacks Continue


December 4, 2015ECT News NetworkVTech Hires Mandiant to Shore Up Security for Kids
December 3, 2015CSO OutlookTop 10 Vulnerability Management Solution Provider 2015 – Risk Based Security Page 27
November 30, 2015eWeekVTech Breach Exposes 5 Million Kids and Their Parents to Risk
November 29, 2015Albany HeraldHow safe is your data in Georgia?
November 24, 2015CSOFive reasons why hackers easily get in
November 11, 2015ComputerWorldThousands of Java applications vulnerable to nine-month-old exploit
November 11, 2015DarkReadingFederal Government Most Prone To Repeat Breaches
November 4, 2015Richmond Times-DispatchHardywood Park Craft Brewery and Luck Cos. named 2015 Impact Award winners
October 21, 2015Canadian Underwriter.caInsurance industry needs to better understand the consequences of large aggregation scenarios: AIR Worldwide
October 16, 2015eWeekA Look at Yahoo’s Promise of a Password-Free Email Service
October 15, 2015Finance MagnatesFirms Cannot Afford to Ignore the Dangers of Cyber Security Non-Compliance
October 11, 2015SFGATEWill Barbie be hackers’ new plaything?
October 2, 2015eWeek15 Million T-Mobile Customers at Risk Thanks to Experian Breach
September 30, 2015PolitcoHackers targeted Hillary Clinton’s email account
September 24, 2015eWeekOPM Says Far More Fingerprint Data Stolen Than First Reported
August 28, 2015SecurityWeekMoxa Patches Flaws in Industrial Ethernet Switches
August 28, 2015isssource.comMoxa Fixes Buffer Overflows
August 17, 2015Philly.comDemand for jobs high in cyber security
August 14, 2015Insurance Business AmericaDepartment of Homeland Security reveals top sector at risk for cyber attacks
July 23, 2015PCWorldResearchers disclose four unpatched vulnerabilities in Internet Explorer
July 7, 2015PCWorldResearchers find previously unknown exploits among Hacking Team’s leaked files
June 26, 2015CIOSoftware developers are failing to implement crypto correctly, data reveals
June 24, 2015PCWorldCritical flaw in ESET products shows why spy groups are interested in antivirus programs
June 5, 2015American Marketing AssociationBroaching a Data Breach
May 28, 2015Naked Security (Sophos)We don’t cover stupid, says cyber insurer that’s fighting a payout
May 25, 2015CIO ReviewPage 56-57Third Party Code: Should CIO’s FREAK Out About a Broken HeartBleed?
May 19, 2015CSOHard-coded credentials placing dental offices at risk
May 13, 2015CIOCritical VM escape vulnerability impacts business systems, data centers
May 12, 2015Consumer & Retail AdvisorSpotlight on 2015: Trends and Issues in Retail
May 6, 2015ITWorldCompanies are falling behind on securing their SAP environments
May 1, 2015CFOThreat Assessment
April 24, 2015SC MagazineRSA 2015: Bug bounties – accepted but concerns remain
April 20, 2015ZDNetSignal above the noise: Compelling RSA 2015 sessions
April 17, 2015Le Monde.frCinq questions sur la publication par WikiLeaks des données volées de Sony Pictures
April 15, 2015CSOHow to get CVSS right
April 8, 2015CMSWire.comWhy You Need to Scan for Open Source Vulnerabilities
April 7, 2015SD TimesBlack Duck Software and risk-based security partner to launch the Black Duck Hub to address security vulnerabilities
April 1, 2015SCMagazineThreat of the Month: Komodia libraries
March 30, 2015CFOWhat’s the Cost of a Cyberattack?
March 11, 2015The Conversation Trust (UK)The first 72 hours are critical for hacking victims
March 3, 2015Tanzania Daily NewsTanzania: Cyber Attacks – Why Companies Need to Strengthen Surveillance
March 1, 2015The RegisterBitDefender bit trip slaps ‘valid’ on revoked certs
February 26, 2015PCWorldSome Bitdefender products break HTTPS certificate revocation
February 26, LTD16 CISOs and Security Leaders You Should be Following on Twitter
February 26, 2015SYS-CON MEDIACloud Monetization and the ‘Internet of Things’
February 25, 2015ZDNet.deKritische Samba-Lücke gepatcht
February 24, 2015ComputerworldCritical remote code execution flaw patched in Samba
February 24, 2015The Globe and MailCompanies are falling short in efforts to counter cyberattacks: report
February 23, 2015SYS-CON MEDIAThe Bigger the Base the Larger the Blast Radius
February 19, 2015TechvibesWhy Apple and Microsoft are Upset About Google’s ‘Project Zero’
February 12, 2015Bidness EtcGoogle Inc Gives Apple, Microsoft 90 Days To Fix Security Flaws: Bloomberg
February 12, 2015The HillGoogle to tech firms: Fix your security flaws or we’ll expose them
February 11, 2015BloombergGoogle Riles Silicon Valley by Exposing Others’ Security Flaws
February 4, 2015RiskMarket NewsWillis Fires First Salvo in the Cyber Risk Model Race
January 13, 2015Independent RetailerAuthenticity Through Biology: Biosignature
January 6, 2015TelegraphMobile revolution: never underestimate the hackers
January 5, 2015TechWorldThink that software library is safe to use? Think again…
January 3, 2015VentureBeatThe biggest security debacles of 2014 show that enterprises are still failing at the basics


January 5, 2014Wall Street JournalWanted: More Vigilance on Data Security
January 6, 2014BITS – NYTPalo Alto Networks Acquires Start-Up Morta Security
January 29, 2014KnoxvilleBizIn data-heavy economy, breaches unlikely to end
January 31, 2014Tampa Bay TimesTarget credit card breach breeds worry
February 21, 2014Bankers OnlineHigh ranking data theft
March 1, 2014Bugcrowd BlogMarisa’s RSA Conference Week In Review
March 12, 2014PC WorldNSA’s plans reportedly involve infecting millions of computers with surveillance malware
March 19, 2014CSOSecunia vulnerability report questioned by experts
March 19, 2014PC WorldProminent security mailing list Full Disclosure shuts down indefinitely
March 25, 2014SCMagazine UKAnonymous Ukraine leaks seven million credit card details
April 1, 2014SCMagazineThreat of the month: Linksys router zero-day
April 3, 2014PC WorldUsers face serious threat as hackers take aim at routers, embedded devices
April 9, 2014New York TimesUsers’ Stark Reminder: As Web Grows, It Grows Less Secure
April 10, 2014BITS NYT2 Regulators Issue Guidelines on Sharing Cyber Security Information
April 11, 2014Network WorldDon’t overlook URL fetching agents when fixing Heartbleed flaw on servers, researchers say
April 11, 2014CrowdCurity BlogThe history of bug bounty programs
April 21, 2014ZDNetHackers attack Spokeo, UN Civil Aviation Org in nine-site crime spree
April 22, 2014Chicago TribuneFamily finances: Protect your identity
April 23, 2014BrianLehrer.tvThis land is your land, under an oligarchy
April 24, 2014CIO / CSOApple Users Put At Risk By 3-week Delay Between OS X and iOS Patches, Researchers Say
April 25, 2014GMA NewsEx Apple employee claims ‘delayed’ iOS patch left iPhone users vulnerable
April 29, 2014Insurance Business AmericaOne sector especially at risk for cyber attacks, new report says
May 16, 2014ICS-CERTICS-CERT Monitor – January – April 2014
May 22, 2014PropertyCasualty360Cyber: Rising Interest, Insurers’ Response and Fears of a Mega Breach
May 22, 2014Business InsuranceDon’t use terrorism as model to analyze cyber threats: ISA head
May 23, 2014PoliticoW.H.: No new regulations necessary – WaPo: Chinese indictments part of broad strategy – Scooplet: DHS chief steps down
June 1, 2014BloombergViewWhy Hacking Keeps Getting Worse
July 16, 2014eWeekResearchers Track Spread of Security Flaws in Software Libraries
July 22, 2014ThreatPostThird-Party Software Library Risks To Be Scrutinized at Black Hat
July 25, 2014CNN MoneyYour personal information just isn’t safe
August 1, 2014Information AgeInformation-centric security: Protecting data from the inside out
August 2, 2014Digital JournalInterview: A man who knows how to steal your credit card data
August 5, 2014Today OnlineMinistries, stat boards must beware reliance on third parties
August 8, 2014News3Hackers meet at Black Hat convention to tackle cybersecurity risks
August 8, 2014Bugcrowd BlogDEFCON Bug Bounty Talks
August 11, 2014MIT Technology ReviewBlack Hat: More Internet-Scale Bugs Are Likely Lurking
August 26, 2014AdvisenReport sees 2014 overtaking 2013 in number of breaches
August 28, 2014Virtual Strategy MagazineBusinesses Need to Protect Against Hackers
August 28, 2014PCWorld AustraliaVulnerabilities on the decline, but risk assessment is often flawed, study says says
September 3, 2014The Atlanta Journal-ConstitutionExperts say Home Depot data breach widespread
September 4, 2014PCWorldTwitter launches bug bounty program
September 10, 2014ForbesWhen It’s A Good Idea To Invite An Army Of Hackers To Attack You
September 24, 2014New York MagazineThe Rise of the Hacker Bounty Hunter
October 20, 2014DARK ReadingWhy You Shouldn’t Count On General Liability To Cover Cyber Risk
October 23, 2014DARK Reading10 Things IT Probably Doesn’t Know About Cyber Insurance
October 27, 2014CSOVulnerability in widely used ‘strings’ utility could spell trouble for malware analysts
November 17, 2014CIONearly a Billion Records Were Compromised in 2014
November 24, 2014FedScoopCommentary: Cyber threats demand executive not just IT skills
December 2, 2014American BankerEight Lessons for Banks from the Data Breaches of 2014
December 9, 2014American BankerGrowing List of Firms Works to Solve Banks’ Digital Identity Crisis
December 9, 2014Help Net SecuritySony hackers apparently wanted money
December 10, 2014Naked SecuritySony tormentors leak celebrities’ phone numbers, aliases
December 10, 2014TechWormSony Hack Attack : Hackers had Demanded Ransom from Sony Three Days Prior to Attack
December 11, lessons from the Sony Pictures hack
December 12, 2014USA TodayNew Sony files include staff info, financial forecasts
December 16, 2014The RegisterSony hackers dump more hunks of stolen data, promise another ‘Christmas gift’
December 19, 2014LA TimesThe Sony hack: What if it isn’t North Korea?
December 19, 2014Council on Foreign RelationsCyber Week in Review: December 19, 2014
December 19, 2014Bloomberg ViewBenner on Tech: Hollywood Cowardice, Apple Workers and Anonymity


January 11, 2013ComputerWorldFirefox adds built-in HTML5-based PDF viewer to improve security
February 8, 2013IT WorldCritical vulnerability in cURL library could affect large number of applications
March 14, 2013InfoWorldJava’s security problems unlikely to be resolved soon, researchers say
March 19, 2013Dark ReadingSecurity-Bug Rating System Gets A Makeover
May 2013National Protection and Programs Directorate, Department of Homeland SecurityCyber Risk Culture Roundtable Readout Report
May 13, 2013Security WeekSCADA Vulnerabilities in Rockwell and Schneider Products Disclosed
May 30, 2013ComputerWorldGoogle wants software vendors to respond to vulnerabilities within 7 days
July 30, 2013SCMagazineBlackBerry purportedly sending users’ email credentials in cleartext
July 31, 2013SCMagazine UKBlackBerry reported to FBI over potential privacy and security issues
September 12, 2013Insurance Business AmericaSecurity expert clashes with carriers over data breach action
October 1, 2013Insurance Business AmericaDeft hand required for challenging cyber insurance market
November 13, 2013EHackingnewsDefCamp 2013 : International hacking and information security conference in Romania
December 11, 2013SecuaBitEpisode 122: Risky Bitcoin Insurance!
December 31, 2013PC WorldThe security industry found its dream enemy in 2013. And new technical challenges, too
Press Archives: 2017 | 2016 | 2015 | 2014 | 2013


Our products
The Platform
Risk Based Intelligence
Learn more
Vulnerability Intelligence
Learn more
Cyber Risk Analytics
Threat Intelligence
Learn more
Risk Management
Learn more