Sen. Ron Wyden (D-Ore.) is once again advocating in favor of better cybersecurity for the U.S. government in a new letter asking that all government domains stop Adobe Flash use. Adobe Flash has long been under fire from the infosec community for security risks, and major web browsers have been moving away from the platform
News
Cyber Security Reviews NEWS brings you the latest daily updates on trends and happenings around the globe.
The Ponemon Institute’s latest study on data breach costs highlights the rise of what it calls “mega breaches,” which are the worst types of security incidents in terms of costs and data exposed. The “2018 Cost of a Data Breach Study: Global Overview,” which was sponsored by IBM Security, details the cost enterprises incur after
Organizations have many concerns when it comes to employee travel, from reimbursements and company credit cards to hotel and flight arrangements. But IT should add mobile device security threats to the list. It’s easy for organizations with users that travel domestically or internationally to overlook mobile device security threats. These threat actors are not stereotypical
Bouncy Castle is a collection of cryptographic APIs for Java and C#, but it was recently reported that some of… the Bouncy Castle keystore files are vulnerable to hash collisions, which enable attackers to use brute force attacks to crack the cryptography behind C# and Java applications. How is this possible? What solutions has Bouncy
There is more to ransomware response than restoring data from known good backups. Having a comprehensive ransomware… incident response plan is crucial for information security programs — it can serve as the foundation of those programs — and every incident response plan should include a feedback loop to update the information security program when new
If IT professionals can master enterprise patch management — a vital cog in any security strategy — they can address many of their security challenges. Enterprise patch management is certainly nothing new, and almost every business struggles with it in some way. Just look at any of the annual security surveys — patching, or lack
The inability of many online services to keep their users’ passwords secure from cybercriminals, combined with… the inherent weaknesses of passwords as a means of authentication, are forcing governments and the IT industry to establish a viable, long-term replacement. The U.S. Commission on Enhancing National Cybersecurity hopes to see “no major breaches by 2021 in
It sounds great to be able to assess information from threats targeting organizations all around the globe and not just the ones coming directly at you. But threat intelligence tools, and the loads of data they deliver, can turn out to be about as useful as junk mail. Expensive junk mail. This handbook on global
Thank you for joining! Next-generation firewalls are integrated, hardware- or software-based, network security tools designed to detect and block sophisticated attacks. The NGFWs available on the market today can vary significantly from one another in many ways, including both price and the specific features provided. Choosing the best next-generation firewall requires careful study of the