Here are some important points to factor into your vulnerability disclosure policy. Question: I’m setting up my company’s first bug-bounty program. What should I be thinking about? John Bock,...
Read moreBalancing patient security with healthcare innovation | TECH(talk)
November 15 2019Computerworld | Nov 14, 2019 Healthcare organizations are one of the most targeted verticals when it comes to cyberattacks. While those organizations must work to secure patients’ sensitive data,...
Read moreBalancing patient security with healthcare innovation | TECH(talk)
November 15 2019Computerworld | Nov 14, 2019 Healthcare organizations are one of the most targeted verticals when it comes to cyberattacks. While those organizations must work to secure patients’ sensitive data,...
Read moreSymantec, McAfee Patch Privilege Escalation Bugs
November 15 2019All versions of endpoint protection software from both vendors were susceptible to near identical issue, SafeBreach says. Symantec and McAfee have patched a near identical vulnerability in their respective...
Read moreSymantec, McAfee Patch Privilege Escalation Bugs
November 15 2019All versions of endpoint protection software from both vendors were susceptible to near identical issue, SafeBreach says. Symantec and McAfee have patched a near identical vulnerability in their respective...
Read moreBSIMM10 Shows Industry Vertical Maturity
November 15 2019The Building Security In Maturity Model is the only detailed measuring stick for software security initiatives, and it continues to evolve. The Building Security In Maturity Model (BSIMM) is...
Read moreBSIMM10 Shows Industry Vertical Maturity
November 15 2019The Building Security In Maturity Model is the only detailed measuring stick for software security initiatives, and it continues to evolve. The Building Security In Maturity Model (BSIMM) is...
Read moreCybersecurity: An Organizationwide Responsibility
November 14 2019C-suite execs must set an example of good practices while also supporting the IT department with enough budget to protect the organization from next-generation cyberattacks. It seems as if...
Read moreCybersecurity: An Organizationwide Responsibility
November 14 2019C-suite execs must set an example of good practices while also supporting the IT department with enough budget to protect the organization from next-generation cyberattacks. It seems as if...
Read moreAttention is All They Need: Combatting Social Media Information Operations With Neural Language Models
November 14 2019Information operations have flourished on social media in part because they can be conducted cheaply, are relatively low risk, have immediate global reach, and can exploit the...
Read more
Recent Comments