Effective Pen Tests Follow These 7 Steps Third-party pen tests are part of every comprehensive security plan. Here's how to get the most from this mandatory investment.
Q1 2019 Smashes Record For Most Reported Vulnerabilities in a Quarter Once again, a high-proportion of the reported flaws have no current fix, according to Risk Based Security.
Artist Uses Malware in Installation A piece of 'art' currently up for auction features six separate types of malware running on a vulnerable computer.
DevOps Repository Firms Establish Shared Analysis Capability Following an attack on their users, and their shared response, Atlassian, GitHub, and GitLab decide to make the sharing of attack information a permanent facet of their operations.
When Older Windows Systems Won't Die Microsoft's decision to patch unsupported machines for the critical CVE-2019-0708 flaw is a reminder that XP, 2003, and other older versions of Windows still run in some enterprises.
A Trustworthy Digital Foundation Is Essential to Digital Government Agencies must take steps to ensure that citizens trust in the security of government's digital channels.
Exposed Elasticsearch Database Compromises Data on 8M People Personal data exposed includes full names, physical and email addresses, birthdates, phone numbers, and IP addresses.