Who (Designer or User) Should be Resposible for the Correct/Secure Usage of a Tool Intended for Developers/Admins? [closed]

There is a healthy debate around a series of stack overflow posts that refer to the "RunAs" command. Specifically the discussion is in reference to design decision that the folks at Microsoft made a long time ago, to users of thi… Continue reading Who (Designer or User) Should be Resposible for the Correct/Secure Usage of a Tool Intended for Developers/Admins? [closed]

Take a Bite Out of Sweyn

If you work in the healthcare industry, you may have heard about a family of vulnerabilities called “SweynTooth.” But how serious is SweynTooth, and what should hospitals be doing to minimize risk?

The post Take a Bite Out of Sweyn appeared first on Security Intelligence.

Continue reading Take a Bite Out of Sweyn

Are Current Security Assurance Models Suitable for the Digital World?

A proactive security assurance model is a key enabler for delivering an effective operating model that encompasses the protection of people, processes and technology.

The post Are Current Security Assurance Models Suitable for the Digital World? appeared first on Security Intelligence.

Continue reading Are Current Security Assurance Models Suitable for the Digital World?

How Retail Security Can Welcome IoT Innovations Without Putting Customers at Risk

As organizations rely more on the IoT to enable internet connection at every part of the retail process, the right mindset can go a long way toward achieving a win-win for retail security.

The post How Retail Security Can Welcome IoT Innovations Without Putting Customers at Risk appeared first on Security Intelligence.

Continue reading How Retail Security Can Welcome IoT Innovations Without Putting Customers at Risk

In 2020, IoT Security Must Be Part of Your Threat Management Strategy

From a threat management perspective, there is no logic in securing IT equipment while ignoring the IoT devices active in the same environment. Organizations must consider IoT devices as well.

The post In 2020, IoT Security Must Be Part of Your Threat Management Strategy appeared first on Security Intelligence.

Continue reading In 2020, IoT Security Must Be Part of Your Threat Management Strategy

Will Weak Passwords Doom the Internet of Things (IoT)?

Weak passwords can hurt any organization’s security efforts and make any device easily hackable, but could they also be the greatest point of failure for internet of things (IoT) security?

The post Will Weak Passwords Doom the Internet of Things (IoT)? appeared first on Security Intelligence.

Continue reading Will Weak Passwords Doom the Internet of Things (IoT)?

Is it possible to detect malicious software just by analyzing the code structure?

I’m a newbie to software security. I’m designing a network and I was wondering is it possible to detect if a program upgrade being downloaded on the network is malicious just by analyzing the structure of the downloaded executable?

I tri… Continue reading Is it possible to detect malicious software just by analyzing the code structure?