auditing
80% of digital publishers don’t know how their web traffic is audited
The burden of proof is on publishers to defend their web traffic, yet 80 percent admit they don’t have insight into how their traffic is audited, raising questions about which …
Announced: Independent OpenVPN security audit
VPN service Private Internet Access (PIA) has just announced that they have contracted noted and well-reputed cryptographer Dr. Matthew Green to perform a security audit of …
VeraCrypt security audit reveals many flaws, some already patched
VeraCrypt, the free, open source disk encryption software based on TrueCrypt, has been audited by experts from cybersecurity company Quarkslab. The researchers found 8 …
Quickly audit and adjust SSH server configurations with SSH-audit
SSH-audit is a standalone open source tool for auditing and fixing SSH server configurations. It has no dependencies and will run wherever Python is available. It supports …
Mozilla will fund code audits for open source software
The Mozilla Foundation has set up the Secure Open Source (SOS) Fund, whose aim is to help open source software projects get rid their code of vulnerabilities. “The Fund …
Docker Security Scanning: Generate a security profile for Docker images
Docker announced Docker Security Scanning, an opt-in service for Docker Cloud private repo plans that provides a security assessment of the software included in container …
Security audit identified risky e-filing tax services
The Online Trust Alliance (OTA) evaluated the privacy, security and consumer protection practices of the thirteen IRS-approved free e-filing tax services. After an assessment …
Top 10 technology challenges for IT audit professionals
The top technology challenge faced by IT audit executives and professionals worldwide is to keep pace with emerging technology and infrastructure changes, including …
Review: Change and configuration auditing with Netwrix Auditor 7.0
Netwrix Auditor is a powerful change and configuration auditing platform that leverages the data collected from all parts of the company network to provide detailed …
How to find a free, secure proxy service?
There are several reasons one might want to use web proxy services, and depending on that reason, it might not be a very good idea to choose a free one randomly.Vienna-based …
BalaBit updates Shell Control Box
BalaBit announced Shell Control Box (SCB) 4 F1, an enterprise-level activity monitoring appliance that controls privileged access to remote IT systems, records activities in …
The multiple benefits of IT auditing
Regulatory compliance requirements provide instructions for organizations on how to protect the data of their employees, business operations, and customers that are stored on …
Featured news
Sponsored
Don't miss
- Patch actively exploited Microsoft SharePoint bug, CISA orders federal agencies (CVE-2023-24955)
- Debunking compliance myths in the digital era
- How CISOs tackle business payment fraud
- AI framework vulnerability is being used to compromise enterprise servers (CVE-2023-48022)
- Attackers leverage weaponized iMessages, new phishing-as-a-service platform