Security News

A steady stream of NHI-related breaches is causing some of the chatter surrounding NHI risk to veer into FUD. Given the rate at which NHis are outnumbering human identities - by some reports by as much as 45-to-1 - the hype seems warranted. Because NHIs are commonly used to access sensitive data and services across applications, allowing exposed, unmanaged NHIs to proliferate is akin to leaving all your doors and windows unlocked when you leave your house.

As Russia's invasion of Ukraine continues, the technology industry is trying to use its services to make a difference - and to keep those services available as the war makes it harder to operate. The Global Sourcing Association - a UK-based body formerly known as the National Outsourcing Association and which promotes strategic use of services resources around the world - last week reported "Evidence of service disruption as companies are struggling to exercise their business continuity plans due to the extent of the disruption and employees are having to decide if they want to stay and work or choose to evacuate the main cities."

Apple said Google’s recent analysis of vulnerabilities found January in iOS painted a misleading picture of the scope of the attacks and the risk involved

But claims of 'complete system compromise' are a little extreme Bsides Manchester A newly discovered WordPress flaw has left installs of the ubiquitous content management system potentially...

When I first started analyzing malware we stored it on floppy disks, so I know old malware when I see it. And, oddly enough, lately I’m seeing more and more of it – a phenomenon being driven, I...

Microsoft's Diana Kelley on Data Integrity and How to Frame Security IssuesIt's a quandary: How does one convey the urgency of cybersecurity without falling into the trap of spreading fear,...

Although the acronym is close to a century old, FUD (Fear, Uncertainty and Doubt) has come to be closely associated with the technology industry since the 1970s. FUD is a simple but effective...

I believe virtual reality (VR) and augmented reality (AR) are on the cusp of mass success, and will dramatically change the way we use technology. However, with new technology comes new attack...

