CIS Benchmarks February 2022 Update
Post Content Read More
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser...
Me on App Store Monopolies and Security
There are two bills working their way through Congress that would force companies like Apple to allow competitive app stores. Apple hates this, since it...
Cyber-Attack on Oil Firms
Cyber-Attack on Oil Firms A cyber-attack has disrupted operations at two oil storage and logistics firms in Germany. Oiltanking GmbH Group and Mabanaft Group said on...
California Passes FLASH Act
California Passes FLASH Act The California State Senate has passed legislation to ban the transmission of unsolicited sexually explicit images and videos without the recipient’s...
Social Security Numbers Most Targeted Sensitive Data
Social Security Numbers Most Targeted Sensitive Data Social Security Numbers (SSN) are the type of sensitive data most commonly targeted in data breaches in the...
A Vulnerability in Samba Could Allow for Arbitrary Code Execution
A vulnerability has been discovered in Samba which could allow for arbitrary code execution. Samba is the standard Windows interoperability suite of programs for Linux...
British Council Students’ Data Exposed in Major Breach
British Council Students' Data Exposed in Major Breach Hundreds of thousands of British Council students had their personal and login details exposed in a worrying...
What Is IaC and Why Does It Matter to the CISO?
Many vendors and security companies are buying or building Infrastructure as Code (IaC) security into their portfolios, and this trend is only expected to continue....
UK/US data protection claim highlights ambiguity of GDPR’s geographic scope
A decision by the UK Court of Appeal to allow a claim for contravention of the European Union’s General Data Protection Regulation (GDPR) to be...