Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Some U.S. government agencies still rely on knowledge-based identity verification despite the fact that the OPM and Equifax breaches have made this system insecure. [Read More]
Facebook has partially restored the View As feature abused by hackers last year in a massive data breach that affected 29 million accounts. [Read More]
ZombieLoad, RIDL and Fallout: Intel processors are vulnerable to more speculative execution side-channel attacks that can allow malware to obtain sensitive data. [Read More]
Apple claims it recently removed several parental control applications from the App Store due to their use of “highly invasive” mobile device management (MDM) technology. [Read More]
ImmuniWeb launches free online tool designed for testing websites, including PCI DSS compliance, CMS security, web server security, and privacy issues. [Read More]
Ireland’s privacy regulator says it’s investigating Facebook over the social media giant’s recent revelation that it had left hundreds of millions of user passwords exposed. [Read More]
NIST updates its ACTS toolkit to help developers of safety-critical applications, such as the ones powering aircraft and nuclear power plants, find errors and make their software safer. [Read More]
Facebook said it expects a fine of up to $5 billion from the Federal Trade Commission, which is investigating whether the social network violated its users’ privacy. [Read More]
British Prime Minister Theresa May has reportedly approved a limited role for China's Huawei to help build a 5G network in the UK, shrugging off security warnings from senior ministers and Washington surrounding the telecoms giant. [Read More]
FireEye releases an open source tool designed to automate the analysis of Adobe Flash files to identify malware and prevent infections. [Read More]

FEATURES, INSIGHTS // Audits

rss icon

Marcus Ranum's picture
To communicate about our metrics, we need ways that we can ground our experience in terms of “normal” for us; Otherwise, we really can't communicate our metrics effectively with anyone who isn't in a similar environment.
Jon-Louis Heimerl's picture
Security is a creature of habit. Security likes things to stay the same. Change brings chaos. Chaos is bad for security. But, we can help control the security of our environment by following good security habits.
Gant Redmon's picture
A new amendment to Texas' breach notice law is designed to make it easier for Texas entities to comply with Texas law by giving those entities the choice of notifying under Texas law or the law of residents of other states.
Nimmy Reichenberg's picture
While regulations and ensuing IT audits go beyond firewalls and firewall policies, these devices are often a good place to start when it comes to becoming "audit-ready" and gaining continuous visibility of what's going on in your network.
Dr. Mike Lloyd's picture
Santa doesn’t care if you were naughty or nice on Christmas Eve – what matters is how you did all year. Security is much the same.
Steve Ragan's picture
For most CISOs, the pain of an audit is part of the job, but it doesn’t have to be the nightmare that most of the IT community envisions.
Jeff Hudson's picture
Too many IT and risk managers are surprised by security breaches, compromised keys or operational failures that occur from sheer neglect that result when you leave your valuable keys as exposed as a password on a post-it. Hefty, potential fines for failing to comply with regulations are risk enough, but the risks of ignoring these vulnerabilities extend even further.
Michael Goff's picture
The vast majority of ISVs are focused on prospecting and lead generation while overlooking potential sales funnel leakage due to piracy. Any vendor that is serious about its longevity needs to know if it has a software piracy problem.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!