For many companies, vulnerability management still amounts to an ongoing game of whack-a-mole to identify and remediate threats.
Researchers have created a tool that uses Git repositories to demonstrate how Agile and other software development approaches could have security issues.
Many companies have adopted the practice of recruiting a team of hackers to poke holes in their networks and assess their incident response capabilities.
The Department of Justice (DOJ) offered guidance on vulnerability disclosure programs, which will assist organizations in navigating legal issues.
A Controller Area Network (CAN) Bus standard vulnerability could impact the security of connected automobiles and other products.
Researchers discovered unpatched vulnerabilities in radiation monitoring devices (RMDs) that attackers could leverage to breach nuclear power plants.
Psychological security refers to the notion that to defend a network against threats, security professionals must be able to think like cybercriminals.
The SHELLBIND Trojan exploits a recently patched Samba vulnerability to steal data from connected network-attached storage (NAS) devices.
Google is rolling out a number of protections to combat phishing attacks through plug-ins. These verification steps will help users practice due diligence.
When patching legacy systems is simply not an option, security teams must take steps to minimize the risks associated with outdated software.