Please turn on your JavaScript for this page to function normally.
Wolfgang Kandek
Privacy by Design: What it is and where to build it
People tend to think about privacy in terms of the individual, but it is also critically important for the proper functioning of any business organization. This is being made …
Cloud computing: Security and evolution
What we’ve seen in the past 15 years is cloud computing becoming increasingly popular. Many companies have focused plenty of resources in making cloud computing the most …
Oracle fixes 248 vulnerabilities in January patch update
Oracle has published their Critical Patch Update (CPU) for January 2016. The Oracle CPU is quarterly and addresses the flaws in large Oracle’s product line, including their …
Flaw allows malicious OpenSSH servers to steal users’ private SSH keys
Qualys researchers have discovered two vulnerabilities in the popular OpenSSH implementation of the secure shell protocol, one of which (CVE-2016-0777) could be exploited by …
Featured news
Sponsored
Don't miss
- The growing danger of visual hacking and how to protect against it
- Beyond human IAM: The rising tide of machine identities
- Microsoft confirms second 0-day exploited by Void Banshee APT (CVE-2024-43461)
- EchoStrike: Generate undetectable reverse shells, perform process injection
- Compliance frameworks and GenAI: The Wild West of security standards