Email Alerts
-
Report highlighting SCADA insecurities alarmist, says ICS expert
Study from vulnerability management firm Positive Technologies Security contends that 39% of systems in the U.S. and Europe are vulnerable to attack. News
-
Symantec study highlights complexity of risks posed by zero-day exploits
Zero-day exploits are typically used in targeted attacks, but public disclosure of unpatched flaws significantly increases the use of the exploits. News
-
Application vulnerability disclosures rise, Microsoft finds
The Black Hole attack toolkit is fueling many of the exploits targeting the vulnerabilities, according to Microsoft. News
-
Rapid7 acquires Mobilisafe to assess mobile device risks
Mobile risk management vendor Mobilisafe assesses employee smartphones and tablets for platform vulnerabilities. News
-
Age-old vulnerabilities, attack techniques consistently trip enterprises
Windows security has improved, but longstanding Unix and network vulnerabilities remain an easy target for determined attackers. News
-
Pen testers should broaden scope, focus more on people, expert says
Pen testers often focus on system errors and application flaws, but employees are often an enterprise's greatest weakness, explains Chris Nickerson. News
-
Vulnerability researcher on layered security plan mistakes
A layered security plan is good, but Argonne National Laboratory vulnerability researcher Roger Johnston warns against too many layers. Video
-
AT&T applies new tactics to advanced persistent threat protection
After a year researching and implementing new advanced persistent threat protection tactics, the telco giant has put several new defenses in place. News
-
Using the network to prevent an Oracle TNS Listener poison attack
Expert Michael Cobb details the Oracle TNS Listener poison attack and tells how enterprises can use the network to defend vulnerable applications. Tip
-
Black Hat 2012: Rodrigo Branco on new malware research database
Video: Qualys vulnerability researcher Rodrigo Branco discusses his new malware analysis system that will serve as a malware research database. Video
Security Management Strategies for the CIO