Mandiant Threat Intelligence has researched and written extensively on the increasing financially motivated threat activity directly impacting operational technology (OT) networks. Some of this research is...
Read moreNSA on Securing VPNs
July 15 2020The NSA's Central Security Service -- that's the part that's supposed to work on defense -- has released two documents (a full and an abridged version) on securing virtual...
Read moreTop 5 Questions (and Answers) About GRC Technology
July 15 2020For the first time in a long time, we must shift from managing localized risks against a landscape of economic growth to managing those issues under much less certain...
Read moreStay on the Cutting Edge of Mobile Security
July 15 2020Here are some of the mobile-focused Briefings, Trainings, and Arsenal tools that will be explored at Black Hat USA.
Read moreDevSecOps Requires a Different Approach to Security
July 14 2020Breaking applications into microservices means more difficulty in gaining good visibility into runtime security and performance issues, says startup Traceable.
Read more‘Wormable’ Flaw Leads July Microsoft Patches
July 14 2020Microsoft today released updates to plug a whopping 123 security holes in Windows and related software, including fixes for a critical, "wormable" flaw in Windows Server versions that Microsoft...
Read morePatch Tuesday security updates address a critical vulnerability in Windows DNS Servers, which researchers believe is likely to be exploited.
Read more‘Make Your Bed’ and Other Life Lessons for Security
July 14 2020Follow this advice from a famous military commanders' commencement speech and watch your infosec team soar.
Read moreConfidential Virtual Machines, now in beta, will let Google Cloud customers keep data encrypted while it's in use.
Read moreRECON could allow an unauthenticated attacker to take control of SAP enterprise applications through the web interface.
Read more
Recent Comments