Top

Tag: Security


Access control

Who Am I? Best Practices for Next-Gen Authentication

November 16, 2017

Via: Dark Reading

By their very nature, antiquated, static identifiers like Social Security numbers and dates of birth are worse than passwords. There is no ignoring it: our financial security is compromised daily. Many security professionals reading this wouldn’t hesitate to recount all […]


Mobile security

Frequent Software Releases, Updates May Injure App Security

November 14, 2017

Via: Dark Reading

The more frequently you release apps, the more security vulnerabilities you are likely to introduce in the code, a new study confirms. The frequency with which you release and update software has more of an impact on application security than […]


Network security

12 famous (and infamous) IT security disasters

November 8, 2017

Via: CSO Online

Start with failing to do the security basics. Add an unhealthy dose of laziness. Ignore the writing on the wall. And after you realize that your IT system has been attacked and your customers’ data has been compromised, don’t tell […]


Mobile security

Best Android security app? Why you’re asking the wrong question

November 6, 2017

Via: CSO Online

Stop me if you’ve heard this one: A chilling new form of Android malware is lurking in the wild. Millions of unsuspecting users are at risk. Your corporate data could be compromised any second now — and purchasing this-or-that Android […]


Threats & Malware, Vulnerabilities

Google Bug Database Flaws Expose Severe Vulnerabilities

October 31, 2017

Via: Dark Reading

A security researcher was able to view some of Google’s most severe vulnerabilities due to flaws in the company’s internal bug tracking system, he said. The Issue Tracker, or Buganizer, as it’s known internally, is used among researchers and bug […]


Threats & Malware, Vulnerabilities

Stop Counting Vulnerabilities & Start Measuring Risk

October 31, 2017

Via: Dark Reading

As a security team, you are what you measure. The problem is that too many security teams are counting vulnerabilities, not measuring risk. It’s time we examine how vital it is for security teams to establish risk-based metrics, while offering […]


Featured

Passwords & Email Accounts: a Gateway for Hackers

October 25, 2017

Via: Sofia Allende

“If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked.” – Richard Clarke While the former National Coordinator for Security for the United States does make a valid point […]


Vulnerabilities

Energy Regulator Acts to Improve Power Grid Security

October 23, 2017

Via: Security Week

With growing concern over nation-state cyber attacks comes an increasing need to secure the critical infrastructure. In the Quadrennial Energy Review published in January 2017, the U.S. Energy Department wrote, “Cyber threats to the electricity system are increasing in sophistication, […]


Email security

Google Bolsters Security for Select Groups

October 18, 2017

Via: Dark Reading

Business leaders, political campaign teams, journalists, and other high-risk groups will receive advanced email and account protection. Google is launching an “advanced protection program” that aims to offer greater email and account protection to journalists, business leaders, political campaign teams, […]


Network security

Unlimited DDoS protection the new norm after Cloudflare announcement

October 16, 2017

Via: CSO Online

Late last month, global distributed denial of service (DDoS) protection provider Cloudflare announced that it would no longer charge customers extra when they were under attack. The company claims to have nearly 10 million customers and a presence in 117 […]