Vulnerabilities

5 signs you've been hit with an advanced persistent threat

Do you have valuable data on your network? Noticing odd network behavior? You could be the victim of an APT attack

What does it take for companies to stay on top in the new landscape of data security

Eight new cyber threats detected every second; organizational compliance failure is the main reason behind this surge. Compliance transcends geographical boundaries; companies find themselves cornered by rising security threats, and increasingly complex laws. Most data is on the Cloud, and most of it is highly sensitive as well as unstructured data.

Police cracks the whip on world's largest DDoS marketplace

A joint operation by law enforcement agencies around the world has shut down webstresser.org, which launched 4 million DDoS attacks and targeted banks, governments and enterprises. 

How lean development improved software security at Fannie Mae

Continual improvement methodologies strengthen security, shorten dev cycles and help the c-suite see infosec’s value.

Delzad P Mirza is group CISO at Shapoorji Pallonji Group

The former Head of Information Security and Compliance at Tata Technologies will spearhead cybersecurity across the Shapoorji Pallonji Group.

New Georgia law criminalizes good-faith security research, permits vigilante action

Georgia cybersecurity folks are outraged about SB 315, and warn that it could cost the state jobs.

97 percent organizations unprepared for Gen V attacks: Report

The Check Point Software Technologies’ security report states that 77 percent of CISOs expressed concern that their organizations aren’t equipped to handle these modern day attacks.

10 tips to minimize IoT security vulnerabilities

Online Trust Alliance spells out best practices for testing, purchasing, networking and updating IoT devices to make them and the enterprise more secure.

What is cross-site scripting (XSS)? Low-hanging fruit for both attackers and defenders

With XSS, attackers enter malicious code into a web form or web app URL to trick the application into doing something it's not supposed to do.

Adobe’s CSO talks security, the 2013 breach, and how he sets priorities

Brad Arkin has led Adobe's new approach to security and aims to make sure one of history’s biggest data breaches doesn’t happen again.

MS Office vulnerabilities, unexplained outage puts Microsoft in a tough spot

The biggest software company in the world, Microsoft has had a rough month with significant spikes in targeted malware attacks and an out-of-the-blue Office 365 outage that threw enterprises out of gear all over the globe.