-
Less Than Half of Organizations Have Open Source Security Policy
PRIVACY PRIVACY Time taken to fix bugs has doubled over past three years Read More
-
MITRE’s Inside-R Protect goes deep into the behavior side of insider threats
PRIVACY PRIVACY Insider threat and risk management programs are the Achilles heel of every corporate and information security program, as many a CISO can attest to. The MITRE Inside-R Protect program is the organization’s latest initiative to assist both public and private sector efforts in addressing the insider threat. The Inside-R program’s bar for success…
-
Russia Steps Up Cyber-Espionage Against Ukraine Allies
PRIVACY PRIVACY Microsoft warns of “defensive weaknesses” in European governments Read More
-
#InfosecurityEurope2022: The Power of Narrative in Highlighting OT System Risks
PRIVACY PRIVACY Nigel Stanley and other security leaders discussed how to manage OT system risks Read More
-
Dozens of insecure-by-design flaws found in OT products
PRIVACY PRIVACY A new research project has uncovered 56 vulnerabilities in operational technology (OT) devices from 10 different vendors, all of which stem from insecurely designed or implemented functionality rather than programming errors. This highlights that despite the increased attention this type of critical devices have received over the past decade from both security researchers…
-
#InfosecurityEurope2022: Tackling Widespread Data Breaches from Third Parties
PRIVACY PRIVACY Third-party risks can be reduced but not eliminated, panel says Read More
-
Microsoft includes IoT devices under its Secured-core program
PRIVACY PRIVACY Addressing security concerns associated with the growing momentum for edge computing, Microsoft is making its Edge Secured-core program for Windows-based IoT devices generally available. Added as a new certification under the Azure Certified Device program, Edge Secured-core is for IoT devices running a full operating system, such as Windows 10 IoT or Linux.…
-
Making Time for Ongoing Security Awareness Training
PRIVACY PRIVACY The key to emphasizing security awareness training is making the most of what’s already available, including CIS’s partnership with SANS. Read More
-
#InfosecurityEurope2022: The Critical Yet Often Invisible Role Cryptography Plays in Our Lives
PRIVACY PRIVACY During a presentation, Keith Martin explained crucial ways we depend on cryptographic technology Read More
-
Meet the Administrators of the RSOCKS Proxy Botnet
PRIVACY PRIVACY Authorities in the United States, Germany, the Netherlands and the U.K. last week said they dismantled the “RSOCKS” botnet, a collection of millions of hacked devices that were sold as “proxies” to cybercriminals looking for ways to route their malicious traffic through someone else’s computer. While the coordinated action did not name the…