Security News

Report Outlines 10 Years' Worth of Serious IncidentsHackers have repeatedly stolen valuable data - including launch codes and flight trajectories for spacecraft - from NASA's Jet Propulsion...

Many of the Problems Are Also Common in the U.S.Similar to security deficiencies often found in the U.S. healthcare sector, weak security controls and practices are putting Australian patient data...

Cybersecurity, privacy and technologies—from mission-critical to digitally transformative—top the list of challenges IT audit teams and leaders grapple with every day, according to a study...

Use Enpass audit tools to identify weak, identical, and old passwords.

If Enpass is your password manager of choice, there are three handy audit tools you should be using. Jack Wallen explains.

What Can Healthcare Entities Learn From HHS OIG Report?The Department of Health and Human Services' information security program has received a "not effective" rating based on an audit. What can...

A new type of DDoS attack that abuses the HTML5 Ping-based hyperlink auditing feature has been detected following a major attack emanating from primarily Chinese-speaking mobile users of the...

GAO Audits Find Systems Treasury Department Uses Have Security FlawsThe computer systems the U.S. Department of the Treasury uses to track the nation's debt have serious security flaws that could...

Auditors face an onslaught of new technologies, systems and regulations to incorporate into assessments. New audit programs from global technology association ISACA give auditors additional...

Hey, at least it was discovered, eventually, and fixed – which is the whole point The Swiss Federal Chancellery (SFC) on Tuesday said security researchers have found an fascinating flaw in the...