Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

Equifax’s cybersecurity failings, including ignored vulnerability reports and executive credentials up for sale on the dark web, revealed following the breach [Read More]
Trend Micro patches several vulnerabilities, including ones rated critical and high severity, in Mobile Security for Enterprise [Read More]
Microsoft has announced an extension to its Microsoft Office Bounty Program, which is now set to run until December 31, 2017. [Read More]
Equifax shares more details about the breach and how it was discovered by the company [Read More]
VMware patches critical SVGA code execution flaw and other vulnerabilities in ESXi, vCenter Server, Workstation and Fusion [Read More]
Magento has released updates for its eCommerce platforms to address numerous vulnerabilities, including a remote code execution bug rated Critical severity. [Read More]
Mozilla revealed plans to introduce a new key establishment (Curve25519) algorithm in Firefox to improve both security and performance. [Read More]
Apple's new Secure Kernel Extension Loading (SKEL) security feature, set to be implemented in the upcoming macOS 10.13 High Sierra, is trivial to bypass, a security researcher claims. [Read More]
Equifax confirms that an Apache Struts vulnerability exploited in the wild since March has been used to breach its systems [Read More]
DHS orders government agencies to stop using Kaspersky products due to concerns about the company’s ties to Russian intelligence [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Dan Cornell's picture
Being able to properly defend applications requires organizations to first identify their attack surfaces before meaningful risk management can take place.
Marie Hattar's picture
When done successfully, continuous testing and training prevents bugs and performance issues from going out the door, while enabling developers to better spot problems in the future.
Jack Danahy's picture
It seems as though competing vendors spend more of their marketing dollars describing the insufficiency of existing solutions than they do explaining the added value that their new advancements bring.
Travis Greene's picture
To reduce exposure to malware, security teams need to learn the DevOps techniques that are being adopted across the rest of the IT organization.
Jim Ivers's picture
Medical devices are indeed vulnerable to attack, but the industry is waking up to the breadth of the problems, and several organizations are forming a vanguard to show the way forward.
Jennifer Blatnik's picture
If the WannaCry incident taught us anything, it’s that global, widespread ransomware can and will impact organizations without any notice. The time to prepare is now.
Torsten George's picture
Hackers are exploiting known vulnerabilities and are betting on the fact that organizations don’t know how to fix what really matters.
Jim Ivers's picture
With the advent of connected devices, privacy and security have become tightly linked because theft of private data is often the goal of malicious attacks.
Jim Ivers's picture
If we agree that quality and security problems are both a form of defect, then we must sufficiently address both to produce software of the highest integrity.
Adam Meyer's picture
As with anything new, you need to prepare and plan for IoT devices being in your environment to maximize the value they provide, while minimizing the inherent risk of these network-enabled devices.