September 2019 Patch Tuesday forecast: Microsoft security update will be complete

Microsoft began an aggressive six-month campaign in March of this year to switch the digital signature on all operating system and product updates from using Secure Hash Algorithm 1 (SHA-1) to SHA-2. This required installing the current SHA-2 algorithm… Continue reading September 2019 Patch Tuesday forecast: Microsoft security update will be complete

Supply chain security: Five IT strategies for choosing vendors wisely

With the proliferation of SaaS solutions, API integrations and cloud computing, virtually everything in the modern enterprise is connected to untold number of outside entities. In fact, many business processes depend on this connectivity, even when doi… Continue reading Supply chain security: Five IT strategies for choosing vendors wisely

Security hole opens a billion Android users to advanced SMS phishing attacks

Check Point Research has revealed a security flaw in Samsung, Huawei, LG, Sony and other Android-based phones that leaves users vulnerable to advanced phishing attacks. The affected Android phones use over-the-air (OTA) provisioning, which allows mobil… Continue reading Security hole opens a billion Android users to advanced SMS phishing attacks

Security pros need more and better visibility into their cloud networks

In this Help Net Security podcast, Kevin Sheu, VP Product Marketing and Marcus Hartwig, Senior Product Marketing Manager at Vectra AI, discuss the Vectra superhero survey from Black Hat USA 2019, which provides insight into the current cloud adoption a… Continue reading Security pros need more and better visibility into their cloud networks

How to reduce the attack surface associated with medical devices

As the number of connected medical devices continues to rise, so does healthcare organizations’ attack surface. “Most medical devices available in the healthcare system today were not built with security in mind and it will take years until they are re… Continue reading How to reduce the attack surface associated with medical devices

Google discovers websites exploiting iPhones, pushing spying implants en masse

Unidentified attackers have been compromising websites for nearly three years, equipping them with exploits that would hack visiting iPhones without any user interaction and deliver a stealthy implant capable of collecting much of the sensitive informa… Continue reading Google discovers websites exploiting iPhones, pushing spying implants en masse

CISO priorities: Implementing security from the get-go

Dr. David Brumley, CEO of ForAllSecure, a Carnegie Mellon computer science professor (on leave), and part of the team that won the DARPA Cyber Grand Challenge, was, at one time, a dishwasher and a line chef. That was before going back to get his high s… Continue reading CISO priorities: Implementing security from the get-go

Cybersecurity in the age of the remote workforce

With the advent of cloud services and the proliferation of high end mobile devices (think iOS devices and Android phones), the workforce is moving inexorably to a mobile one where managers and employees are no longer tied to the office. What initially … Continue reading Cybersecurity in the age of the remote workforce

Knowing what’s on your hybrid-IT environment is fundamental to security

In this Help Net Security podcast recorded at Black Hat USA 2019, Shiva Mandalam, VP of Products, Visibility and Control at Qualys, talks about the importance of visibility. Whether on-prem (devices and applications), mobile, endpoints, clouds, contain… Continue reading Knowing what’s on your hybrid-IT environment is fundamental to security

What the education industry must do to protect itself from cyber attacks

Data breaches show no signs of slowing down and companies across many industry verticals fall victim to what now seems to be a regular occurrence. Most attention around data breaches is on the commercial side, with Capital One being the recent high-pro… Continue reading What the education industry must do to protect itself from cyber attacks