February 29, 2016 Secure Connections? Virtually All SSL VPN Servers Miss the Mark 2 min read - A recent study from High-Tech Bridge indicated that the vast majority of SSL VPN servers are unsecured, and many are years behind the industry.
February 25, 2016 Drupal 6 Hits the End-of-Life Milestone 2 min read - Drupal 6 hit its end-of-life mark, meaning the service is now unsupported. Users may be vulnerable to exploits by cybercriminals.
Application Security February 23, 2016 Mobile Application Security: Risks and Responsibilities 2 min read - The world is becoming more mobile, but that only increases the risks facing organizations and highlights the need for application security measures.
February 22, 2016 Researchers Find VoIP Phones Vulnerable to Simple Cyberattacks 2 min read - Security researchers recently discovered a possible vulnerability in voice-over-IP (VoIP) phones that could put users at risk.
February 11, 2016 Logical Consequences: Siemens Plugs High-Severity PLC Gaps 2 min read - Siemens recently came under fire for high-severity vulnerabilities in some of its PLCs, highlighting a broader problem with IoT.
February 4, 2016 WirelessHART Networking Technology Products Have Vulnerabilities, Researchers Say 2 min read - Products with WirelessHART networking technology have vulnerabilities that are not yet patched, which could expose industrial systems to significant risk.
Software Vulnerabilities February 4, 2016 Custom and Open Source Code: A New Approach to Application Security Management 3 min read - Using open-source components can put application security at risk, but the efforts of a partnership between IBM and Black Duck could change that.
Cloud Security February 2, 2016 Tor: What Lies Beneath the Onion’s Skin 3 min read - Many people have heard of Tor, or The Onion Router, but how many actually know the details of this privacy tool and how it came to be?
Intelligence & Analytics January 26, 2016 Managing Security Vulnerabilities and Risks: It’s About Outcomes 3 min read - One of the best ways to deal with vulnerabilities is to look at them in context, but you need security tools that can provide that context first.
January 21, 2016 ICS-CERT Reports Increase in FY2015 Infrastructure Attacks 2 min read - The U.S. Industrial Control System Cyber Emergency Response Team (ICS-CERT) reported an increase in critical infrastructure incidents in FY2015.