News

  • Less Than Half of Organizations Have Open Source Security Policy

    PRIVACY PRIVACY Time taken to fix bugs has doubled over past three years Read More

    Read More

  • MITRE’s Inside-R Protect goes deep into the behavior side of insider threats

    PRIVACY PRIVACY Insider threat and risk management programs are the Achilles heel of every corporate and information security program, as many a CISO can attest to. The MITRE Inside-R Protect program is the organization’s latest initiative to assist both public and private sector efforts in addressing the insider threat. The Inside-R program’s bar for success…

    Read More

  • Russia Steps Up Cyber-Espionage Against Ukraine Allies

    PRIVACY PRIVACY Microsoft warns of “defensive weaknesses” in European governments Read More

    Read More

  • #InfosecurityEurope2022: The Power of Narrative in Highlighting OT System Risks

    PRIVACY PRIVACY Nigel Stanley and other security leaders discussed how to manage OT system risks Read More

    Read More

  • Dozens of insecure-by-design flaws found in OT products

    PRIVACY PRIVACY A new research project has uncovered 56 vulnerabilities in operational technology (OT) devices from 10 different vendors, all of which stem from insecurely designed or implemented functionality rather than programming errors. This highlights that despite the increased attention this type of critical devices have received over the past decade from both security researchers…

    Read More

  • #InfosecurityEurope2022: Tackling Widespread Data Breaches from Third Parties

    PRIVACY PRIVACY Third-party risks can be reduced but not eliminated, panel says Read More

    Read More

  • Microsoft includes IoT devices under its Secured-core program

    PRIVACY PRIVACY Addressing security concerns associated with the growing momentum for edge computing, Microsoft is making its Edge Secured-core program for Windows-based IoT devices generally available. Added as a new certification under the Azure Certified Device program, Edge Secured-core is for IoT devices running a full operating system, such as Windows 10 IoT or Linux.…

    Read More

  • Making Time for Ongoing Security Awareness Training

    PRIVACY PRIVACY The key to emphasizing security awareness training is making the most of what’s already available, including CIS’s partnership with SANS. Read More

    Read More

  • #InfosecurityEurope2022: The Critical Yet Often Invisible Role Cryptography Plays in Our Lives

    PRIVACY PRIVACY During a presentation, Keith Martin explained crucial ways we depend on cryptographic technology Read More

    Read More

  • Meet the Administrators of the RSOCKS Proxy Botnet

    PRIVACY PRIVACY Authorities in the United States, Germany, the Netherlands and the U.K. last week said they dismantled the “RSOCKS” botnet, a collection of millions of hacked devices that were sold as “proxies” to cybercriminals looking for ways to route their malicious traffic through someone else’s computer. While the coordinated action did not name the…

    Read More

News, Advisories and much more

Exit mobile version