Developers of the widely used WordPress content management system intentionally delayed announcing that a recent patch fixed a severe vulnerability. Read More ▶ |
|
| White Paper: Leidos A comprehensive look at the top four challenges facing your security operations is the first step to mitigating them. Why not approach them as opportunities to strengthen your cybersecurity posture and better protect your assets! This white paper discusses the universal challenges facing every SOC: Resource allocation, Threat alert management, Vendor dependencies, Intelligence standardization Read More ▶ | Mobile security company Zimperium is putting out the alert to make sure users are cognizant of these apps when they head into app stores. Read More ▶ |
| The CanaKit 2.5A Raspberry Pi power supply / adapter has been specially designed and tested for the new Raspberry Pi 3 and incorporates an inline noise filter for highest stability and reliable operation. Read More ▶ |
| Cisco Systems has fixed a critical vulnerability that could allow hackers to take over servers used by telecommunications providers to remotely manage customer equipment such as routers. Read More ▶ |
| | RSA Conference 2017 will take on the threat posed by the internet of things, something that was demonstrated last fall by the DDoS attacks that took down Dyn data centers and many of the high-profile Websites it supports. Read More ▶ |
| Sanctions imposed by former President Obama on Russia for hacking during the U.S. election had an unintended side effect: they essentially barred U.S. tech firms from selling new IT products in the country. Read More ▶ |
| White Paper: Leidos A comprehensive look into how organizations can develop and implement a successful insider threat detection program. This white paper outlines the five steps to success: Gain Leadership Support, Leverage the Latest Technology, Develop a Communications Plan, Execute a Training and Awareness Campaign, Establish a Governance Structure Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|