ISACA releases guide for performing business-relevant assessments
Establishing confidence in IT processes and controls is important, but audit and assurance processes often represent a pain point for business partners. Their perception is …
Real-time identity alerts reduce fraud losses
Experian announced Precise IDSM Personal Protection Alerts, a product that notifies individuals in real time that their personal information is being used in an authentication …
Apache server bug allows remote code execution
The existence of a “moderately critical” Apache HTTP Server vulnerability whose exploitation could allow attackers to compromise the system and execute arbitrary …
Evernote rolls out 2-factor authentication for paying customers
2013 seems the be the year of 2-factor (or 2-step) authentication. Following the introduction of the feature by the likes of Apple, Microsoft, Twitter and WordPress, Evernote …
Google defines disclosure timeline for actively exploited bugs
The debate regarding responsible vulnerability disclosure and full vulnerability disclosure has been started many times in the past, and it’s an issue that will continue …
Migration and monitoring of Microsoft environments
Dell Software announced a series of new enhancements designed to help organizations optimize the migration, management and monitoring of Microsoft environments. Dell Software …
Drupal.org forces password reset following breach
The server hosting the official website of Drupal, the popular content management platform, has been compromised and sensitive user data was accessed by the attackers, the …
The social smart lock of the future
Today at the D: All Things Digital conference, designer Yves Behar and technology entrepreneur Jason Johnson launched the August Smart Lock. The intuitive new lock and access …
GFI Software buys online backup vendor IASO
GFI Software acquired the online backup software company IASO, based in The Netherlands. IASO provides cloud-based solutions that provide customers with secure backup and …
Chinese army announces drill to test its digitalized forces
The Chinese People’s Liberation Army (PLA) has announced it will be holding a military exercise in June, aimed at testing “new types of combat forces including …
Judge orders porn suspect to decrypt his hard drives
After having first decided against forcing a suspect to decrypt a number of hard drives that were believed to be his and to contain child pornography, a U.S. judge has changed …
Ruby on Rails bug is being exploited in the wild, researcher warns
Administrators of servers running Ruby on Rails are advised once again to upgrade to the latest versions of the framework (3.2.11, 3.1.10, 3.0.19, and 2.3.15), as a …
Featured news
Resources
Don't miss
- Why we must go beyond tooling and CVEs to illuminate security blind spots
- Making security and development co-owners of DevSecOps
- Review: Passwork 7.0, self-hosted password manager for business
- What a mature OT security program looks like in practice
- Machine unlearning gets a practical privacy upgrade