Security News > 2019 > May

Why Isn't GDPR Being Enforced?
2019-05-02 10:17

Politico has a long article making the case that the lead GDPR regulator, Ireland, has too cozy a relationship with Silicon Valley tech companies to effectively regulate their privacy practices....

You Want to Automate Your Security Architecture - Now What?
2019-05-02 09:50

The biggest cybersecurity challenge in enterprise remains keeping ahead of the “bad guys.” As fast as security gaps are plugged, new vulnerabilities appear and are targeted for the next attack. read more

We dunno what's worse: Hackers ransacked Citrix for FIVE months, or that Equifax was picked to help mop up the mess
2019-05-02 09:12

Hardly reassuring on any level Back in March, remote desktop specialist Citrix admitted hackers had romped through its core systems, and had purloined internal business documents. Now we're...

Microsoft 365 updates for better enterprise data privacy
2019-05-02 09:04

Microsoft has announced new privacy controls for Microsoft 365 enterprise customers: they will be able to revoke access to encrypted emails, block sensitive information from being shared or leaked...

Pre-Installed Software Flaw Exposes Most Dell Computers to Remote Hacking
2019-05-02 08:19

If you use a Dell computer, then beware — hackers could compromise your system remotely. Bill Demirkapi, a 17-year-old independent security researcher, has discovered a critical remote code...

Google Adds New Option to 'Auto-Delete' Your Location History and Activity Data
2019-05-02 07:48

Google is giving you more control over how long you want the tech company to hold on to your location history and web activity data. Google has introduced a new, easier, privacy-focused...

Sinister secret backdoor found in networking gear perfect for government espionage: The Chinese are – oh no, wait, it's Cisco again
2019-05-02 07:02

Better ban this gear from non-US core networks, right? Right on cue, Cisco on Wednesday patched a security vulnerability in some of its network switches that can be exploited by miscreants to...

Many Vulnerabilities Found in Wireless Presentation Devices
2019-05-02 06:14

Researchers at Tenable have discovered a total of 15 vulnerabilities across eight wireless presentation systems, including flaws that can be exploited to remotely hack devices. read more

Open source security: The risk issue is unpatched software, not open source use
2019-05-02 06:04

Many of the trends in open source use that have presented risk management challenges to organizations in previous years persist today. However, new data also suggest that an inflection point has...

Supply chain attacks: Mitigation and protection
2019-05-02 05:30

In software development, a supply chain attack is typically performed by inserting malicious code into a code dependency or third-party service integration. Unlike typical cyber attacks, supply...