Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Researchers discovered multiple serious vulnerabilities in popular solar park monitoring devices from Solar-Log [Read More]
Vulnerabilities found in the Chrome and Firefox extensions of the LastPass password manager allow attackers to steal passwords, execute code [Read More]
A newly technique that leverages App Paths to bypass the User Account Control (UAC) in Windows 10 has been detailed by security researcher Matt Nelson. [Read More]
White hat hackers earned tens of thousands of dollars for finding critical vulnerabilities in GitHub Enterprise [Read More]
Vulnerability in the web versions of WhatsApp and Telegram allowed hackers to hijack accounts by sending a malicious file to the targeted user [Read More]
Researchers discovered several vulnerabilities in Double telepresence robots. Flaws patched with server-side fix [Read More]
Schneider Electric patches serious vulnerabilities in Wonderware Intelligence and ClearSCADA products [Read More]
Researchers found several potentially serious flaws in a popular pricing software from Navetti. Patches are available [Read More]
Researcher discloses backdoor affecting video recorders and IP cameras from Dahua. The vendor has started releasing firmware updates [Read More]
Twitter patched a vulnerability that allowed hackers to bypass the locked account protection mechanism [Read More]

FEATURES, INSIGHTS // Identity & Access

rss icon

Travis Greene's picture
When big stories like the release of the Panama Papers breaks, it is an opportunity to self-evaluate what level of risk your organization could be exposed to.
Rafal Los's picture
Attackers are exploiting issues in corporate identity stores with greater frequency. If you doubt the danger that identities pose to your organization, you should conduct a simple test.
Travis Greene's picture
It’s been said that the military is always preparing to fight the last war. Are we doing the same in IT security? Are we doomed to always react to the threat?
Alastair Paterson's picture
While you may understand the risks that come from the use of social media, what options do you have to protect your organization against them?
Alan Cohen's picture
Micro-segmentation approaches play an important role in reducing the attack surface, the points of infiltration in the heart of the data center. By governing the traffic among servers, they reduce the risk of bad actors.
Travis Greene's picture
The investment in access certifications have reduced the workload on IT, but by treating all entitlements and users the same, we’ve put the burden on LOB managers to manage the risk of excessive access.
Travis Greene's picture
To understand why return on Access Governance is lower versus other security technologies, we first need to understand why Access Governance is implemented in the first place.
Travis Greene's picture
Yahoo's “Account Key” uses push notifications to their Yahoo Mail app on mobile devices. Will this securely replace passwords and two-factor authentication?
Travis Greene's picture
The true value of identity is not in creating more defense in depth, which means that identity is not the new perimeter.
Travis Greene's picture
As much fun as it is to wake up to patches waiting to be unwrapped, we don’t want the regret of “exploit Wednesday”, which is far more embarrassing than becoming a victim of a zero-day exploit.