Security Experts:

Virus & Threats
long dotted


Chef Software's InSpec 2.0 compliance automation tool helps organizations maintain a current view of compliance status and accelerates DevSecOps. [Read More]
Intel has released firmware updates for more processors to patch the Spectre vulnerability [Read More]
The Classic and Web versions of the uTorrent app are affected by critical vulnerabilities that can be exploited remotely to hack users’ computers [Read More]
Russia-linked cyberspy group APT28/Fancy Bear/Sofacy shifts focus from NATO countries and Ukraine to Central Asia and further east [Read More]
Google is stepping up its Internet of Things (IoT) game as it has entered into an agreement to acquire Xively, a division of LogMeIn, Inc. [Read More]
North Korean hacker group APT37 (aka Group123, Reaper, ScarCruft) has expanded the scope and sophistication of its operations [Read More]
Apple updates iOS and macOS to patch flaw that causes devices to crash when displaying certain strings of Indian characters [Read More]
RubyGems update brings security improvements and patches for several vulnerabilities [Read More]
NIST is seeking feedback, especially on the information about the state of cybersecurity standardization for IoT, at [email protected] by April 18. [Read More]
Last year was record-breaking by number of vulnerabilities disclosed, with a total of 20,832 such security flaws, a new Risk Based Security report reveals. [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Ashley Arbuckle's picture
By understanding and easing the cultural shift this entails, you can save time and money and sleep better at night with security occupying a seat at the DevOps table.
Travis Greene's picture
As DevOps and agile development methodologies take greater root in the enterprise, the traditional tools and approaches for eliminating vulnerabilities in code will no longer be able to keep pace.
Dan Cornell's picture
When planning a testing strategy for an application, it is important to evaluate the applicability and likely effectiveness of the various testing approach options.
David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.
Lance Cottrell's picture
Laws to support swift and automatic updates for all devices, and consequence to organizations that fail to ensure their IoT devices are secure, would be a big step forward for IoT security.
Jim Ivers's picture
With a software composition analysis (SCA) tool in place, security teams can quickly scan an information repository and know where vulnerable software is being used.
David Holmes's picture
The "Reaper" IoT botnet is holding itself up as a blinky light in front of our faces, reminding the InfoSec community that we really need to get ahead of IoT madness.
Jack Danahy's picture
With all of our collective focus on machine learning, we simply can’t overlook human learning’s critical role in guarding against attack and protecting the organization.
Torsten George's picture
We need to consider whether traditional approaches to vulnerability management are still viable and if just upgrading existing methods or tools is sufficient.
Jalal Bouhdada's picture
Vendors, practitioners and security experts must all work closely together to combat the well-funded actors who pose a threat to medical devices.