Qualys, Inc. has announced that its security research team found a critical vulnerability in the Linux GNU C Library (glibc) called GHOST.
Browsing: Identity and access management (IAM)
Rob Miller comments on the recent disclosure of another vulnerability found in industrial control system (ICS) software.
Phil Lee of Fieldfisher discusses the impact of President Obama’s proposed laws on privacy.
Chris Stoneff of Lieberman Software Corporation provides some tips on how the enterprise, staff personnel, and users can fix weak passwords.
Neil Thacker of Websense comments on Cisco’s claim that nearly half of all websites that deploy OpenSSL could still be vulnerable to Heartbleed.
Abby Terlecki of Social Monsters discusses a 007-type secure satellite-based mobile hotspot can make the difference between a great day and disaster.
Andrew Mabbitt of MWR InfoSecurity comments on the news that Chinese spies have reportedly stolen the designs for Australia’s new warplane.
Amrit Williams of CloudPassage discusses what lessons the U.S. CENTCOM Twitter hack should teach organizations.
Checkmarx explains how the Game of Hacks bridges the gap between app developers’ coding abilities and their security literacy.
32 percent of respondents who share an Internet-enabled device do not take any precautions to protect their data, says Kaspersky Lab.