
Week in review: BA breach, Magento sites under attack
Here’s an overview of some of last week’s most interesting news and articles: How metrics can enhance the effectiveness of security programs Choosing the right …

Tor Browser 8 is out: What’s new?
Version 8 of Tor Browser, the multiplatform browser that routes traffic through the Tor anonymity network, has been released this week. About the Tor Browser and this latest …

New infosec products of the week: September 7, 2018
IDERA updates toolset for SQL Server security and compliance SQL Secure and SQL Compliance Manager work together to help database administrators establish and enforce security …

Financial info of 380,000 British Airways customers stolen in site, app breach
British Airways has suffered a data breach and has confirmed that personal and financial details of some 380,000 customers have been compromised. About the breach “From …

Back to school: Lessons in endpoint security
It’s back to school season, and students, teachers and administrators are returning to campuses and classrooms. All of those students and staffers are working on desktops and …

How metrics can enhance the effectiveness of security programs
For anyone responsible for maintaining their organization’s security posture, the findings from the SANS 2018 Security Operations Center (SOC) Survey should come as no …

Cisco fixes a host of security holes, including latest Apache Struts flaw
Cisco has plugged a heap of security holes – three of which are critical – in a variety of its products. The critical flaws The flaws deemed critical are: A DoS …

Qualys Community Edition: Discover IT assets, manage vulnerabilities, scan web apps
In this podcast recorded at Black Hat USA 2018, Anthony Mogannam, Product Manager, SME/SMB Solutions at Qualys, talks about issues related to open source software and Qualys …

Remotely exploitable flaw in Schneider Electric PLCs is a danger to OT networks
A vulnerability in the Schneider Electric Modicon M221, a programmable logic controller (PLC) deployed in commercial industrial facilities worldwide, can be exploited to …

How leadership implements cyber resiliency across their organizations
A majority of executives around the world feel they face a “specialist-generalist” dilemma as to whom leads on cyber resiliency due to its critical nature across …

IT security teams are being locked out of IoT projects
Trend Micro revealed that organizations around the world are exposing themselves to unnecessary cyber risk by failing to give IT security teams a voice when planning IoT …

Software-defined networking is turning concern about security in the cloud on its head
In an era when enterprises always have to grapple with processing large amount of information through big data technology, security has emerged as the most important measure …