Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Tripwire launches Penetration Testing Assessment and Industrial Cybersecurity Assessment services to help organizations find vulnerabilities in their systems. [Read More]
Wireshark 3.0.0 has been released and one of the most important changes is that WinPcap has been replaced with the Npcap packet sniffing library. [Read More]
Offensive Security announces the release of Kali Linux 2019.1, which patches bugs and updates Metasploit to version 5.0. [Read More]
Researchers demonstrate that Intel’s SGX technology can be abused to hide an advanced piece of malware that can allow attackers to steal data and conduct activities on the victim’s behalf. [Read More]
The Swiss government has launched a public bug bounty program with rewards of up to $50,000 for its e-voting systems. Researchers from all around the world invited to participate. [Read More]
Huawei's top executive in Europe brushed off Western critics and defended the company's track record against accusations that it could serve as front for Chinese spying. [Read More]
Two members of the U.S. House of Representatives have sent a letter to Apple to obtain some clarifications on how the tech giant handled the recently disclosed FaceTime spying bug. [Read More]
Researchers discover over two dozen RDP vulnerabilities, including ones that allow a malicious RDP server to hack a device running the client RDP software. [Read More]
A US energy company, identified by some as Duke Energy, received a $10 million fine from the North American Electric Reliability Corporation (NERC) for nearly 130 violations of Critical Infrastructure Protection standards. [Read More]
The UK Information Commissioner’s Office (ICO) has fined Leave.EU and Eldon Insurance, and plans on auditing them both in the upcoming period. [Read More]

FEATURES, INSIGHTS // Audits

rss icon

Marcus Ranum's picture
To communicate about our metrics, we need ways that we can ground our experience in terms of “normal” for us; Otherwise, we really can't communicate our metrics effectively with anyone who isn't in a similar environment.
Jon-Louis Heimerl's picture
Security is a creature of habit. Security likes things to stay the same. Change brings chaos. Chaos is bad for security. But, we can help control the security of our environment by following good security habits.
Gant Redmon's picture
A new amendment to Texas' breach notice law is designed to make it easier for Texas entities to comply with Texas law by giving those entities the choice of notifying under Texas law or the law of residents of other states.
Nimmy Reichenberg's picture
While regulations and ensuing IT audits go beyond firewalls and firewall policies, these devices are often a good place to start when it comes to becoming "audit-ready" and gaining continuous visibility of what's going on in your network.
Dr. Mike Lloyd's picture
Santa doesn’t care if you were naughty or nice on Christmas Eve – what matters is how you did all year. Security is much the same.
Steve Ragan's picture
For most CISOs, the pain of an audit is part of the job, but it doesn’t have to be the nightmare that most of the IT community envisions.
Jeff Hudson's picture
Too many IT and risk managers are surprised by security breaches, compromised keys or operational failures that occur from sheer neglect that result when you leave your valuable keys as exposed as a password on a post-it. Hefty, potential fines for failing to comply with regulations are risk enough, but the risks of ignoring these vulnerabilities extend even further.
Michael Goff's picture
The vast majority of ISVs are focused on prospecting and lead generation while overlooking potential sales funnel leakage due to piracy. Any vendor that is serious about its longevity needs to know if it has a software piracy problem.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!