The SaC approach lets users codify and enforce a secure state of application configuration deployment that limits risk.
Read moreCisco, Intel, Deloitte Among Victims of SolarWinds Breach: Report
December 21 2020The Wall Street Journal identified 24 businesses so far that have downloaded the SolarWinds software infected with malicious code.
Read moreNSA, CISA Warn of Attacks on Federated Authentication
December 21 2020While incident responders focus on attacks using SolarWinds Orion, government cyber defenders highlight other methods likely being used as well.
Read more7 Infamous Moments in Adobe Flash’s Security History
December 21 2020End-of-life is here: Adobe's support for Flash is gone as of Jan. 1. Here's what we won't miss about the multimedia software platform.
Read moreLet's prioritize bipartisan strategic actions that can ensure our national security and strengthen the economy. Here are five ideas for how to do that.
Read moreCellebrite Can Break Signal
December 21 2020
Cellebrite announced that it can break Signal. (Note that the company has heavily edited its blog post, but the original — with lots of technical details —...
Read moreNaked Security Live – Watch out for Messenger scams
December 21 2020Here's the latest Naked Security video talk - watch now! (And please share with your friends...)
Read morePurgalicious VBA: Macro Obfuscation With VBA Purging
December 19 2020Friday Squid Blogging: Christmas Squid Memories
December 18 2020Stuffed squid for Christmas Eve. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting...
Read moreAttack on thousands of other companies as "moment of reckoning" for governments and industry, company president says.
Read more
Recent Comments