Posts

Your Information Isn't Being Hacked, It's Being Neglected

To stop customer information from being compromised, we must shore up the most vulnerable parts first, the day-to-day IT operations work that builds, configures, and changes systems.
Source: Vulnerabilitys & Threats

Security & Development: Better Together

How DevSecOps removes the silos between security and application development teams so that everyone can work together at the same speed.
Source: Vulnerabilitys & Threats

DNS Is Still the Achilles' Heel of the Internet

Domain Name Services is too important to do without, so we better make sure it’s reliable and incorruptible
Source: Vulnerabilitys & Threats

4 Reasons the Vulnerability Disclosure Process Stalls

The relationship between manufacturers and researchers is often strained. Here’s why, along with some resources to help.
Source: Vulnerabilitys & Threats

Microsoft Releases Emergency Patch For RCE Vuln

Flaw in Microsoft Malware Protection Engine called ‘crazy bad’ by researchers who discovered it.
Source: Vulnerabilitys & Threats

Cybersecurity & Fitness: Weekend Warriors Need Not Apply

It takes consistency and a repeatable but flexible approach to achieve sustainable, measurable gains in both disciplines.
Source: Vulnerabilitys & Threats

How Innovative Companies Lock Down Data

A mix of back-to-basics security and a set of new, data-centric best practices is key to defending against a future of growing and sophisticated cyberattacks.
Source: Vulnerabilitys & Threats

FCC Privacy Rule Repeal Will Have Widespread Security Implications

Concerns over the action are sending VPN sales soaring, some vendors say.
Source: Vulnerabilitys & Threats

Patch Unlikely for Widely Publicized Flaw in Microsoft IIS 6.0

Microsoft recommends upgrade to latest operating system for more protection.
Source: Vulnerabilitys & Threats

7 Steps to Transforming Yourself into a DevSecOps Rockstar

Security practitioners at one education software firm offer lessons learned from merging DevOps with security.
Source: Vulnerabilitys & Threats