Top

Tag: Featured


Access control

Who Am I? Best Practices for Next-Gen Authentication

November 16, 2017

Via: Dark Reading

By their very nature, antiquated, static identifiers like Social Security numbers and dates of birth are worse than passwords. There is no ignoring it: our financial security is compromised daily. Many security professionals reading this wouldn’t hesitate to recount all […]


Mobile security, Vulnerabilities

Debugging Tool Left on OnePlus Phones, Enables Root Access

November 15, 2017

Via: Threat Post

Chinese phone maker OnePlus is accused of leaving a debugging app on its phones capable of giving adversaries root access to the devices. The application in question is called EngineerMode and is made by Qualcomm. An anonymous researcher who goes […]


Vulnerabilities

Microsoft Patches 20 Critical Browser Vulnerabilities

November 15, 2017

Via: Security Week

Microsoft’s Patch Tuesday updates for November address more than 50 vulnerabilities, including 20 critical flaws affecting the company’s web browsers. A total of 53 CVE identifiers have been assigned to the security bugs addressed by Microsoft this month. None of […]


Mobile security

Frequent Software Releases, Updates May Injure App Security

November 14, 2017

Via: Dark Reading

The more frequently you release apps, the more security vulnerabilities you are likely to introduce in the code, a new study confirms. The frequency with which you release and update software has more of an impact on application security than […]


Vulnerabilities

What Happens When Security Companies Fail at Security?

November 9, 2017

Via: Security Week

Several recent cyber attacks have successfully targeted organizations that should be poster children for security hygiene. Why are even the most security-conscious organizations being compromised, and what does it mean for everyone else? Examining recent high-profile cyber attacks The most […]


Vulnerabilities

Majority of US Companies’ DDoS Defenses Breached

November 8, 2017

Via: Dark Reading

Survey finds 69% of companies’ distributed denial-of-service attack defenses were breached in the past year – despite confidence in their mitigation technologies. A whopping 88% of US companies claim confidence in their DDoS mitigation technologies, yet 69% have suffered an […]


Network security

4 Proactive Steps to Avoid Being the Next Data Breach Victim

November 8, 2017

Via: Dark Reading

Despite highly publicized data breaches, most companies are not taking the necessary actions to prevent them. Over the last few years, companies around the world have experienced cyberattacks in which personally identifiable information (PII) of consumers was stolen. Even though […]


Network security

Proactive or Reactive Endpoint Security? A Critical Crossroads for SOC Analysts

November 8, 2017

Via: Security Intelligence

When it comes to securing their environments, IT professionals have a critical decision to make: Should they wait until after malicious actors strike to react to security incidents, or should they address threats proactively to stop attacks before they happen? […]


Identity theft

Identity Management To-Do List Aligns with Cybersecurity

November 7, 2017

Via: CSO Online

Identity management should be a major component of an enterprise risk management strategy, yet IAM technology decisions are often treated tactically or left to application developers or IT operations staff who don’t always prioritize security in their planning. The ESG […]


Network security

New York State Proposes Stricter Data Protection Laws Post Equifax

November 3, 2017

Via: Security Week

New York State Attorney General Eric T. Schneiderman introduced new legislation Thursday, designed to protect New Yorkers from corporate data breaches like the recent Equifax breach that affected more than 145 million Americans, including 8 million New York residents. Its […]