Password Dependency: How to Break the Cycle

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the password dependency cycle. But how can this be done?

The post Password Dependency: How to Break the Cycle appeared first on SecurityWeek.

Continue reading Password Dependency: How to Break the Cycle

NSA Publishes Security Guidance for Organizations Transitioning to IPv6

The National Security Agency (NSA) has published guidance to help the Department of Defense (DoD) and other system administrators identify and mitigate cyber risks associated with transitioning to Internet Protocol version 6 (IPv6).
read more Continue reading NSA Publishes Security Guidance for Organizations Transitioning to IPv6

Majority of GAO’s Cybersecurity Recommendations Not Implemented by Federal Agencies

Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December 2022, the US Government Accountability Office (GAO) says in a new report.
read more Continue reading Majority of GAO’s Cybersecurity Recommendations Not Implemented by Federal Agencies

Chainguard Trains Spotlight on SBOM Quality Problem

Software engineers tracking the quality of software bill of materials have stumbled on a startling discovery: Barely 1% of all SBOMs being generated today meets the “minimum elements” defined by the U.S. government.
read more Continue reading Chainguard Trains Spotlight on SBOM Quality Problem

Netwrix Acquires Remediant for PAM Technology

Data security software vendor Netwrix has acquired Remediant, an early-stage startup working on technology in the PAM (privileged access management) category.
Financial terms of the acquisition were not disclosed. 
read more Continue reading Netwrix Acquires Remediant for PAM Technology

Fortinet Ships Emergency Patch for Already-Exploited VPN Flaw

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the flaw in the wild.
read more Continue reading Fortinet Ships Emergency Patch for Already-Exploited VPN Flaw

Project Zero Flags ‘Patch Gap’ Problems on Android

Vulnerability researchers at Google Project Zero are calling attention to the ongoing “patch-gap” problem in the Android ecosystem, warning that downstream vendors continue to be tardy at delivering security fixes to Android-powered devices.
read more Continue reading Project Zero Flags ‘Patch Gap’ Problems on Android

Palo Alto to Acquire Israeli Software Supply Chain Startup

Cybersecurity powerhouse Palo Alto Networks on Thursday announced plans to spend $195 million in cash to acquire Israeli startup Cider Security, a deal that adds software supply chain security capabilities to its Prisma Cloud platform.
read more Continue reading Palo Alto to Acquire Israeli Software Supply Chain Startup