Week in review: POODLE targeting TLS, insider threats, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, reviews and articles: Software security in a market for lemons Programming has always been …
FIDO Alliance prepares for industry adoption of strong authentication in 2015
The FIDO (Fast IDentity Online) Alliance published final 1.0 drafts of its two specifications – Universal Authentication Framework (UAF) and Universal 2nd Factor (U2F). …
Insider threats 101: The threat within
Recent events – both in the United States and in Japan – have forced IT administrators everywhere to reevaluate the possibility of insider threats. Because of …
Payment gateway provider breached
New Jersey-based Charge Anywhere, whose electronic payment gateway solutions route payment transactions from merchants’ Point-of-Sale (PoS) systems to their payment …
Do senior executives understand their role in data security?
There are four distinct groups of organization when it comes to measuring how much value senior executives place on their company’s data and how well that data is …
10 strategies to protect patient information
Data breaches, lawsuits, medical identity theft—all cringe-worthy realities—and the threats to patient data have never been greater. With cybercrime targeting healthcare, …
Security deficiencies that increase data breach risk
Many businesses still struggle with information security deficiencies and common security weaknesses that can elevate their risk of data breaches. Based on a global survey of …
Security trends you should NOT worry about in 2015, and five you should
Along with its latest predictions, which examine the likelihood of common network security prophecies next year, WatchGuard’s security research team also included five …
Browser vulnerabilities to become biggest endpoint challenge
A growing number of flaws in web browsers is viewed as the biggest endpoint security headache by today’s IT decision-makers, according to Malwarebytes. With the number …
Corporate data: Protected asset or a ticking time bomb?
Despite a growing number of data breaches occurring under the glare of the public spotlight, 71 percent of employees in a new survey report that they have access to data they …
Cyber attacks now longer than ever
Cyber attacks have reached a tipping point in terms of quantity, length, complexity and targets. As cyber threats are growing and expanding to new targets, 52% of respondents …
Microsoft released seven advisories, three are critical
December’s Patch Tuesday brings us seven advisories, three of which are listed as Critical. Depending on how you want to count it, we see a total of 24 or 25 CVEs …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)