Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Howard University closed its physical campus and canceled classes this week after experiencing a ransomware attack. [Read More]
The Android Security Bulletin for September 2021 includes patches for a total of 40 vulnerabilities, including seven that are rated critical. [Read More]
The agency's guidance is aimed at three main decision-maker groups and should help reduce overall risks associated with Managed Service Providers (MSPs). [Read More]
Microsoft’s embattled security response unit is scrambling to deal with another zero-day attack hitting users of its flagship Microsoft Office software suite. [Read More]
The University of Toronto's Citizen Lab finds a new iOS zero-click exploit in an iPhone surveillance campaign targeting bloggers, activists and dissidents in Bahrain. [Read More]
The Japan-based cryptocurrency exchange says hackers stole Ethereum, Bitcoin, Stablecoins, Ripple, and other tokens. [Read More]
Microsoft came up the big winner in this year’s Pwnie Awards, but for all the wrong reasons. [Read More]
Corellium COO Matt Tait warns that stolen zero-days are changing the economics of mass exploitation and calls for platform vendors to make major changes to address the surge in supply chain attacks. [Read More]
Microsoft's security response team late Thursday acknowledged a new, unpatched bug that exposes Windows users to privilege escalation attacks. [Read More]
Microsoft partners with Citizen Lab to identify a mysterious commercial surveillance company in Israel selling zero-days and high-end spyware to government hackers. [Read More]

FEATURES, INSIGHTS // Disaster Recovery

rss icon

Marcus Ranum's picture
When you start your metrics program, you'll find that a great deal of information can be gleaned from existing data that gets stored in various places – most likely in your system logs.
Chris Hinkley's picture
A multi-layered breach detection and recovery plan is a must to protect your organization, making the difference between a catastrophic breach that devastates your business and a breach that’s quickly contained and terminated.
Chris Poulin's picture
There’s no one size fits all disaster survival plan: a server compromise is vastly different than full scale nuclear attack, and both require situationally appropriate responses.
Danelle Au's picture
What can we glean from "Superstorm" Sandy that will help us deal with security events as disruptive in nature as Super Storm Sandy? Do we need a strategic shift in how we respond to incidents? What are key security observations from this storm?
Rod Rasmussen's picture
In the security and privacy world, 2012 is turning out to be the year for Internet security bills. But why now and why so many Internet protection bills suddenly coming up in Congress?
Ram Mohan's picture
The Amazon Web Services Cloud Outage showed the world that the cloud — while great — does not absolve companies from taking fundamental precautions to safeguard their systems online.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!