New & Notable
Platform security News
December 07, 2018
New email messages revealed that Facebook app permissions were carefully implemented to avoid alerting users to the fact that the Android app was gathering call log and SMS data.
October 22, 2018
A zero-day in jQuery File Upload could affect thousands of projects because the jQuery plugin vulnerability has existed for eight years and actively exploited for at least three years.
August 29, 2018
Security researcher SandboxEscaper released proof-of-concept code for a Windows 10 zero-day on Twitter, but Microsoft has no details for a potential patch.
August 17, 2018
News roundup: Intel disclosed L1TF vulnerabilities with similarities to Spectre, but with a focus on data. Plus, the NIST Small Business Cybersecurity Act is now a law, and more.
Platform security Get Started
Bring yourself up to speed with our introductory content
SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network. Continue Reading
IT professionals must carefully consider which security tools they use to protect their Windows 10 desktops. They may want to stray from the Microsoft path in some instances. Continue Reading
IoT security is the technology area concerned with safeguarding connected devices and networks in the internet of things (IoT). Continue Reading
Evaluate Platform security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Windows Defender includes several features IT pros can use to tighten security. Application Guard, for example, isolates browser sessions to defend against internet-based attacks. Continue Reading
Unpatched software and OSes can create a huge security hole in any organization. IT should know what tools can fill in the gaps. Continue Reading
Some pioneers of AI in cybersecurity find progress thus far limited, but machine learning still offers an advancement in protecting enterprise networks and data. Continue Reading
Manage Platform security
Learn to apply best practices and optimize your operations.
NIST tested competing hash functions over a period of five years for the SHA-3 algorithm competition. Learn the details of what they discovered from Judith Myerson. Continue Reading
To ensure proper application security testing, production and non-production systems should both be tested. In this tip, expert Kevin Beaver weighs the pros and cons. Continue Reading
Can containers work in read-only mode, and how does this setup make a difference in security hardening? Continue Reading
Problem Solve Platform security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Bluetooth devices might be at risk after a new Bluetooth vulnerability was found targeting firmware and operating system software drivers. Learn how it works and can be mitigated. Continue Reading
New malware targets cryptocurrency investors through MacOS and chat platforms were recently discovered. Learn how OSX.Dummy malware works and what users can do to spot the attack. Continue Reading
Kea, an open source DHCP server, was issued a medium security advisory for a flaw that causes memory leakage in version 1.4.0. Discover the workarounds with Judith Myerson. Continue Reading