How to optimize your bug bounty programs

In this Help Net Security interview, Roy Davis, Manager – Vulnerability Management & Bug Bounty at Zoom, discusses the role bug bounty programs play in identifying security vulnerabilities and facilitating collaboration with researchers. He … Continue reading How to optimize your bug bounty programs

Congress rails against UnitedHealth Group after ransomware attack

House lawmakers argue that growing consolidation in the health care sector has created vulnerabilities to cyberattacks.

The post Congress rails against UnitedHealth Group after ransomware attack appeared first on CyberScoop.

Continue reading Congress rails against UnitedHealth Group after ransomware attack

How Google’s 90-day TLS certificate validity proposal will affect enterprises

Announced last year, Google’s proposal to reduce the lifespan of TLS (transport layer security) certificates from 13 months to 90 days could be implemented in the near future. It will certainly improve security and shrink the window of opportunity for … Continue reading How Google’s 90-day TLS certificate validity proposal will affect enterprises

Stopping security breaches by managing AppSec posture

Many security vulnerabilities result from human error, and the majority of these are reflected in the application layer. These errors may occur at any stage in the software development life cycle, from code to cloud. In this Help Net Security video, Go… Continue reading Stopping security breaches by managing AppSec posture

Congress sounds alarm on lax dam cybersecurity

Amid concerns of growing cybersecurity risks, the federal office in charge of hydroelectric dam security only has four employees.

The post Congress sounds alarm on lax dam cybersecurity appeared first on CyberScoop.

Continue reading Congress sounds alarm on lax dam cybersecurity

CISA faces resource challenge in implementing cyber reporting rules

The Cybersecurity and Infrastructure Security Agency’s reporting requirements represent a sea change for when private entities will have to report cybersecurity incidents.

The post CISA faces resource challenge in implementing cyber reporting rules appeared first on CyberScoop.

Continue reading CISA faces resource challenge in implementing cyber reporting rules

Space is essential for infrastructure. Why isn’t it considered critical?

There are 16 critical infrastructure sectors, and experts are deeply divided on whether space systems should be the 17th.

The post Space is essential for infrastructure. Why isn’t it considered critical? appeared first on CyberScoop.

Continue reading Space is essential for infrastructure. Why isn’t it considered critical?