Tripwire, Inc., announced the results of research on risk-based security management in the healthcare and pharmaceutical industries.
Browsing: Malware and Vulnerabilities
According to a post on the Russian cybercrime forum, i2Ninja offers a similar set of capabilities to the ones offered by other major financial malware:
Amit Klein, CTO at Trusteer, an IBM company, has compiled what Trusteer sees to be the most dangerous malware trends for 2014. See his comments and an infographic below
SSL expiration has been making headlines lately with Netcraft recently reporting over 200 certificates have expired in relation to the US government shutdown.
By combining our best-of-breed privileged identity access control with Securonix’ advanced risk and threat analytics, we deliver real value
Proper session management is an ongoing challenge for mobile application developers. It’s not uncommon for mobile apps to have multiple session management errors, putting the application at risk.
Shadow IT, the latest phrase for the informal layer of IT built and used inside your organisation that you have almost no control over.
Unique FIPS certified and PIN activated USB flash drive datAshur recognised for robust security at the 2013 BCS & Computing UK IT Industry Awards London
In response to the recent Microsoft Patch, security experts Tripwire have made the following comments:
NT OBJECTives CTO Dan Kuykendall to Present “Revenge of the Geeks, Hacking Fantasy Football Sites” at AppSec USA