Securing Elections

Elections serve two purposes. The first, and obvious, purpose is to accurately choose the winner. But the second is equally important: to convince the loser. To the extent that an election system is not transparently and auditably accurate, it fails in that second purpose. Our election systems are failing, and we need to fix them. Today, we conduct our elections… Continue reading Securing Elections

IT audit best practices: Technological changes give rise to new risks

IT security and privacy, IT governance and risk management, regulatory compliance, emerging technology and cloud computing are the key issues impacting IT audit plans in 2018, according to a benchmarking study from Protiviti and ISACA. To whom within t… Continue reading IT audit best practices: Technological changes give rise to new risks

Wire shares results of independent security audit of its secure messaging apps

When I last spoke to Alan Duric, co-founder and (at the time) CEO of the company developing secure messaging application Wire, he stressed the importance of independent and regular security audits of software. The company had already previously engaged… Continue reading Wire shares results of independent security audit of its secure messaging apps

GDPR: Right to Erasure and Data Portability

Organizations that collect and process personal data from EU citizens are faced with an advancing deadline to get their procedures in line with the General Data Protection Regulation (GDPR). The…
The post GDPR: Right to Erasure and Data Portability a… Continue reading GDPR: Right to Erasure and Data Portability

Pandora’s Box: Auditing for DDoS Vulnerabilities, Part II

The Rise of the “Availability Vulnerabilities” Availability problems aren’t necessarily unique; however, the testing is certainly different. This “availability security problem” is resulting in an increased risk to enterprises whose business models are tied to time (government elections, financial trading, online promotional retailers, insurance reconciliations, etc.). As a result, many organizations are asking themselves if […]

The post Pandora’s Box: Auditing for DDoS Vulnerabilities, Part II appeared first on Radware Blog.

The post Pandora’s Box: Auditing for DDoS Vulnerabilities, Part II appeared first on Security Boulevard.

Continue reading Pandora’s Box: Auditing for DDoS Vulnerabilities, Part II

Office 365 Audit Logging Generates Lots of Data – and Some Odd Entries

Office 365 audit logging generates a lot of data – sometimes too much. The trick is to know what events are recorded and what applications capture. Some pretty strange audit events turn up in the log, but everyone should relax because they are just traces of the system doing its own thing.

The post Office 365 Audit Logging Generates Lots of Data – and Some Odd Entries appeared first on Petri.

Continue reading Office 365 Audit Logging Generates Lots of Data – and Some Odd Entries