SharePoint users are breaching security policies
A study, conducted amongst attendees at last month’s Microsoft’s SharePoint Conference in Las Vegas, has found that at least 36% of SharePoint users are breaching …
Microsoft releases Threat Modeling Tool 2014
The Microsoft Threat Modeling Tool 2014 is the latest version of the free Security Development Lifecycle Threat Modeling Tool that was previously released back in 2011. …
Downtime explanation
You’ve probably noticed we were offline yesterday for nearly 13 hours. The problem was with our hosting provider, Sago Networks, who reportedly experienced an issue with …
Samsung Galaxy S5 fingerprint scanner can be tricked
Samsung’s newly released Galaxy S5 phone sports a fingerprint scanner embedded in the home button that works well but unfortunately, like iPhone 5S’ TouchID before …
Security pros actively hiding negative facts from executives
A new Ponemon Institute study exposes a severe gap in security visibility and perception between C-level executives and IT security staff. In nearly 60 percent of the …
ModSecurity 2.8.0 released
ModSecurity makes full HTTP transaction logging possible, allowing complete requests and responses to be logged. It can also monitor the HTTP traffic in real time in order to …
Heartbleed threatens mobile users
As time passes, it becomes more and more obvious that almost no-one is safe from the danger created by the existence of the OpenSSL Heartbleed bug. In the days after the …
The security of the most popular programming languages
A new WhiteHat Security report takes a deeper look into the security of a number of the most popular programming languages including .Net, Java, ColdFusion, ASP and more. …
Hardware manufacturer LaCie suffered year-long data breach
French computer storage hardware manufacturer LaCie has suffered a data breach that affected a yet unconfirmed number of their customers. “On March 19, 2014, the FBI …
Heartbleed: VMware starts delivering patches
VMware has announced that it has started shipping patches for its products that have been impacted by the OpenSSL Heartbleed bug. “VMware is acutely aware of the …
Half of IT pros make undocumented changes to IT systems
57% of IT professionals have made undocumented changes to their IT systems that no one else knows about; while as many as 40% of organizations don’t have formal IT …
Businesses take little action to mitigate the insider threat
While businesses are growing increasingly aware of the insider threat, they still lack enforceable controls to stop and punish perpetrators. A LogRhythm survey of 1,000 IT …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online