By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Platform security News
April 18, 2017
A new release of NSA cyberweapons falls flat, as Windows exploits from the Shadow Brokers have mostly been patched. But unsupported systems are still at risk.
April 14, 2017
The Shadow Brokers released another cache of cyberweapons linked to the Equation Group, including Windows exploits and attack details for the SWIFT banking system.
November 11, 2016
Roundup: Russia-based APT group Pawn Storm expands spear-phishing attacks after Google's disclosure of a Windows zero-day. Plus, OpenSSL updates, IoT security and more.
October 27, 2016
An XNU kernel vulnerability in iOS and macOS was patched after being reported by Google's Project Zero. And hackers at Pwn2Own 2016 cracked the Nexus 6P and iPhone 6s.
Platform security Get Started
Bring yourself up to speed with our introductory content
NAND mirroring has been proposed to break the security in certain portable devices that use NAND flash memory for encryption. Continue Reading
Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all other applications from running. Continue Reading
Secure Shell (SSH) is a network protocol that secures data communications between computers on an insecure network using strong authentication and encryption. SSH also refers to the utility suite that implements the protocol, and which can be used ... Continue Reading
Evaluate Platform security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
DMZ networks were once widely used by enterprises, but are they still common today? Expert Judith Myerson explains why DMZs may be a good security option for some organizations. Continue Reading
APT groups have been continuously exploiting a flaw in Microsoft Office, despite it having been patched. Expert Nick Lewis explains how these attacks work and how to prevent them. Continue Reading
A flaw in Microsoft allows attackers in through executable embedded documents. Expert Nick Lewis explains the vulnerability and how enterprises can stop it. Continue Reading
Manage Platform security
Learn to apply best practices and optimize your operations.
Windows AppLocker whitelisting was discovered to be exploitable with command-line tool Regsvr32. Expert Nick Lewis explains how organizations can mitigate possible attacks. Continue Reading
Network functions virtualization can complement SDN and benefit enterprises, but there are NFV security considerations that must be addressed. Expert Judith Myerson explains. Continue Reading
In this excerpt of Hacking and Penetration Testing with Low Power Devices, author Philip Polstra describes "The Deck" -- a custom Linux distribution -- that breaks the traditional penetration model by providing pen testers an OS that runs on ... Continue Reading
Problem Solve Platform security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The Flip Feng Shui attack can target virtual machines. Expert Judith Myerson explains the exploit and describes how to prevent it from hijacking enterprise VMs. Continue Reading
Apple's removal of PPTP support on iOS 10 and Mac OS Sierra leaves companies scrambling to implement other VPN protocols. Expert Michael Cobb explains enterprise options. Continue Reading
Microsoft is banning weak passwords on many of its services with the Smart Password Lockout feature. Expert Michael Cobb explains how it works, and if it will be beneficial. Continue Reading