US Gov backs Google’s alarm: warns against HTTPS interception products
The US Government has warned organizations to take extra precautions when using TLS inspection software due to widespread problems with certificate validation.
The US Government has warned organizations to take extra precautions when using TLS inspection software due to widespread problems with certificate validation.
After yet another Flash zero-day, Microsoft has unveiled plans to phase out the buggy software for good.
Data breaches are inevitable and waiting for a breach to occur before designing an incident response plan is a recipe for failure. It’s a question of when the breach will occur and how you will respond, not if you will be breached. 100% prevention simply doesn’t exist, so having a plan to deal with a security breach is now more important than ever. You probably already have an incident response plan from a technical perspective. Phrases such as preparation, identification, containment, eradication and lessons learned.
Wayne Tufek | 15 Sep | Read more
Public-sector organisations suffered by far the most security incidents but had proportionally the fewest out of 20 surveyed industries in which data was confirmed lost, Verizon has found in a major data-breach report that also concluded security teams have less time than ever to act against new attacks.
David Braue | 15 Apr | Read more
Resource-stretched CSOs were forced to investigate an average of 1.5 security incidents every week last year and lost significant amounts of time playing catch-up with ever-nimbler cybercriminals, a survey of IT and security professionals has found.
David Braue | 15 Apr | Read more
Upon discovering that someone has illegitimately accessed data on the network, IT managers initially believe (hope, really) that the threat came from outside. But as recent, headline-grabbing data breaches demonstrate, a lapse in internal security — whether accidental or malicious — is often what enabled the attack to succeed, in spite of robust external security. Download this whitepaper to see how to minimize the risk of the internal threat to the availability, confidentiality and integrity of AD.