Cybersecurity- Insiders

Cyber – The Latest Front on the Election Battlefield

Alastair Paterson wrote an interesting post about Cyber - The Latest Front on the Election Battlefield that I would like to share. "To say that the...

Mirai Botnet Infects Devices in 164 Countries

 Ionut Arghire wrote an interesting post about Mirai Botnet Infects Devices in 164 Countries that I would like to share. "Mirai, the infamous botnet used in...
Cybersecurity- Insiders

Teen Arrested for Cyberattack on 911 Emergency System

 Eduard Kovacs  wrote an interesting post about Teen Arrested for Cyberattack on 911 Emergency System that I would like to share. "An 18-year-old teen from Arizona...
Cybersecurity- Insiders

Hacking the Presidential Election: Can It Happen?

Hackers can leverage lots of technical vulnerabilities to affect election results. But a coordinated attack would be tough, due to voting systems' fragmented nature. Earlier...
Cybersecurity- Insiders

Cloud Adoption Finally on the Rise at Federal Agencies

It’s been more than five years since the Obama administration unveiled its Federal Cloud Computing Strategy, a cloud-first initiative that urged federal agencies to...

VMware Flaws Allow Security Bypass on Mac OS X

Eduard Kovacs wrote an interesting post about VMware Flaws Allow Security Bypass on Mac OS X that I would like to share. "VMware has patched a...
Cybersecurity- Insiders

ARM accelerates secure IoT from chip to cloud

25 October 2016 Cambridge, UK, Oct. 25, 2016 - ARM has released its most comprehensive product suite ever to deliver new levels of security, efficiency,...
Cybersecurity- Insiders

But Wait…There’s more: IoT Devices Still Terrible at Security

And the hits just keep on coming. In a new study, security firm ForeScout has shown that it takes fewer than three minutes to...

Android Root Exploits Abuse Dirty COW Vulnerability

 Ionut Arghire wrote an interesting post about Android Root Exploits Abuse Dirty COW Vulnerability that I would like to share. "The “Dirty COW” Linux kernel vulnerability that...
Cybersecurity- Insiders

5 Steps to Stronger Vendor Security and Reduced Supply Chain Risk

Watch the webinar: https://www.brighttalk.com/webcast/5418/228055 Third party vendors and digitally connected supply chains provide significant operational and cost efficiencies. But they also expose businesses to significant...