April 17, 2017 Magneto Vulnerability: Cybercriminals Drawn to E-commerce Exploit 2 min read - A newly released Magneto vulnerability comes with serious risk of total e-commerce compromise. Here's what businesses and shoppers need to know.
April 11, 2017 Critical Vulnerabilities Put ICS Security at Risk 2 min read - A new potential problem for ICS security stems from CODESYS, a hardware-independent middleware layer for programming IIoT and ICS devices.
Risk Management March 28, 2017 Simplifying Risk Management 5 min read - To properly manage risk, security analysts must understand the threats and vulnerabilities that exist on their networks and assess their consequences.
March 22, 2017 Burgenoning Bug Bounty Programs Up the Ante 2 min read - Bug bounty programs are now paying out more to white-hat hackers, but they're also tightening regulations on payments and structure.
March 14, 2017 Got SAP HANA? Your Calendar Just Filled Up With Zero-Day Critical Vulnerabilities 3 min read - SAP HANA customers should invest in an active threat monitoring and detection solution — meaning a SAP-specific threat vector detection.
March 7, 2017 Widespread Bug Bounty Program Could Help Harden Open Source Security 2 min read - As part of HackerOne's effort to improve open source security, the vulnerability disclosure firm made its bug bounty program available for free.
March 7, 2017 Wireshark Squashes Bugs With New Network Protocol Analyzer Update 2 min read - The Wireshark development team addressed dozens of vulnerabilities, segmentation flaws and bugs with the latest version of its network protocol analyzer.
Software Vulnerabilities March 6, 2017 Cheap Shock: Why Shellshock Is Still a Thing 2 min read - Although security researchers discovered Shellshock more than two years ago, it remains popular among fraudsters with basic skill sets and light wallets.
February 22, 2017 Security Flaw Could Leave Businesses Vulnerable to Attack 2 min read - A security flaw in Java and Python could allow cybercriminals to bypass firewalls, potentially putting enterprise information at risk.
CISO February 22, 2017 Time to End the Tension Between Corporate Remediation and Security Teams 2 min read - Although remediation and security teams are working toward a common goal, their conflicting priorities, culture and tools often lead to discord.