The Apache Struts 2 Vulnerability and the Importance of Patch Management

The disclosure of an Apache Struts 2 vulnerability made the framework a lucrative target and highlighted the importance of patch management.

The post The Apache Struts 2 Vulnerability and the Importance of Patch Management appeared first on Security Intelligence.

Continue reading The Apache Struts 2 Vulnerability and the Importance of Patch Management

Don’t Let Remote Management Software Contribute to Building Botnets

IT leaders must be vigilant when using remote management software. Attackers can exploit these tools to infect devices with malware and build botnets.

The post Don’t Let Remote Management Software Contribute to Building Botnets appeared first on Security Intelligence.

Continue reading Don’t Let Remote Management Software Contribute to Building Botnets

Data Breaches and the Importance of Account Protection and Incident Response

Data breaches can be devastating to an organization. Defense against data breaches starts and ends with account protection and incident response.

The post Data Breaches and the Importance of Account Protection and Incident Response appeared first on Security Intelligence.

Continue reading Data Breaches and the Importance of Account Protection and Incident Response

Will Blockchain Technology Replace Traditional Business Models?

Blockchain technology has become a hot trending topic within the computer world in the last couple years. There’s more to it than just bitcoins.

The post Will Blockchain Technology Replace Traditional Business Models? appeared first on Security Intelligence.

Continue reading Will Blockchain Technology Replace Traditional Business Models?

Security Training for Incident Handling: What Else Is Out There?

This follow-up article offers even more options for improving incident handling through training courses, workshops and challenges.

The post Security Training for Incident Handling: What Else Is Out There? appeared first on Security Intelligence.

Continue reading Security Training for Incident Handling: What Else Is Out There?

The New Glibc Getaddrinfo Vulnerability: Is It GHOST 2.0?

Is the new glibc getaddrinfo vulnerability really GHOST 2.0? Signs point to yes, so organizations should patch this vulnerability immediately.

The post The New Glibc Getaddrinfo Vulnerability: Is It GHOST 2.0? appeared first on Security Intelligence.

Continue reading The New Glibc Getaddrinfo Vulnerability: Is It GHOST 2.0?

Security Training for Incident Handlers: What’s Out There?

Security professionals focused on incident handling and response have the opportunity to learn a lot from security training and certifications.

The post Security Training for Incident Handlers: What’s Out There? appeared first on Security Intelligence.

Continue reading Security Training for Incident Handlers: What’s Out There?