Posted on 23 January 2015. | Google has released information about and proof-of-concept exploit code for three separate zero-day vulnerabilities affecting Apple's OS X operating system.
Posted on 22 January 2015. | HealthCare.gov, the health insurance exchange website operated by the US government, is sending out personal health information about its users to advertising companies.
Posted on 22 January 2015. | As employees increasingly demand a more mobile and social workplace, the pressure is on for enterprises to deliver the same technology experience employees have in their personal lives to their work lives.
Posted on 21 January 2015. | NSA Playset aims to make cutting edge security tools more accessible.
Posted on 21 January 2015. | Lumenta recently appointed Brandon Hoffman as their new CTO. We took this opportunity to get his perspective on the industry.
Posted on 23 January 2015. | The DMARC specification has emerged in the last couple years to pull together all the threads of email authentication technology under one roof—to standardize the method in which email is authenticated, and the manner in which reporting and policy enforcement is implemented.
Posted on 23 January 2015. | Adobe has released an out-of-band update for Flash Player, which fixes a security flaw (CVE-2015-0310) that could be used to circumvent memory randomization mitigations on the Windows platform.
Posted on 21 January 2015. | Brandon Hoffman, Lumeta's CTO, talks about the management strategies that are essential in the information security industry. He also offers advice to those stepping into the CTO role for the first time, and talks about the evolution of network situational awareness.
Posted on 20 January 2015. | Attackers have become more proficient at taking advantage of gaps in security to evade detection and conceal malicious activity, according to Cisco.
Posted on 19 January 2015. | Rather than spend resources on measures such as pen testing, it’s now perhaps more relevant to find ways of monitoring for, rooting out, identifying and taking remedial action against malware and threats already inside a network.