Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Increasing number of organizations moved to Office 365, but many haven’t migrated due to security concerns, including ransomware and phishing [Read More]
Equifax website that allows consumers to obtain their credit report was hacked and it redirected users to sites serving adware and scams [Read More]
High-Tech Bridge launches Mobile X-Ray, a free online service designed for testing native and hybrid iOS and Android apps [Read More]
Unpatched SQL injection vulnerabilities in BPC’s SmartVista payment platform can expose sensitive information [Read More]
Simple DirectMedia Layer (SDL), a library used for many games and video playback software, has two high severity flaws that can be exploited via malicious GIMP files [Read More]
ShiftLeft emerges from stealth mode with new solution designed to protect cloud applications and microservices, and with over $9 million in funding [Read More]
The Olympic Games offer a tempting target for hackers and other malicious actors, with potentially devastating consequences for one of the world's premier sporting events, researchers say.. [Read More]
Accenture leaks over 100GB of data, including private keys and credentials, via four unprotected cloud storage containers [Read More]
Microsoft patches critical remote code execution flaw in Windows that hackers can exploit without user interaction via malicious DNS responses [Read More]
Hackers could have easily infiltrated US voting machines in 2016 and are likely to try again in light of vulnerabilities in electronic polling systems, a group of researchers said Tuesday. [Read More]

FEATURES, INSIGHTS // Vulnerabilities

rss icon

Alastair Paterson's picture
With greater awareness about POS system attacks, operations against third-party suppliers, and the vulnerabilities of public or semi-public Wi-Fi networks, companies can do a lot to mitigate risk and ensure safer journeys for travelers.
Jennifer Blatnik's picture
One of the crucial benefits of blockchain is its distributed capabilities, which mean there isn’t one centralized target to hack.
Jim Ivers's picture
Given the observation that consumers still seem oblivious to the risks and the lack of awareness about basic security hygiene, the education push will fall short.
David Holmes's picture
Security researchers found 26 vulnerabilities within ISP network devices that would have given them remote admin access to the majority of home networks in the United States.
David Holmes's picture
A manufacturer of a meter may have a different threat model involving the physical aspects of the device itself: device memory, firmware interface, ecosystem communications.
Jim Ivers's picture
These recommendations will help your organization reduce risk and save real money on the cost of resolving defects. It is not often you get such a clear win-win scenario.
Dan Cornell's picture
Being able to properly defend applications requires organizations to first identify their attack surfaces before meaningful risk management can take place.
Marie Hattar's picture
When done successfully, continuous testing and training prevents bugs and performance issues from going out the door, while enabling developers to better spot problems in the future.
Travis Greene's picture
To reduce exposure to malware, security teams need to learn the DevOps techniques that are being adopted across the rest of the IT organization.
Jim Ivers's picture
Medical devices are indeed vulnerable to attack, but the industry is waking up to the breadth of the problems, and several organizations are forming a vanguard to show the way forward.