Security News

"God Mode" requires special USB debugging connector The security researchers who found a way to compromise Intel's Management Engine last year have just released proof-of-concept exploit code for...

Hunting the known unknowns Analysis Who'd have thought it? Diagnostic event streams and log files are fashionable at last.…

Jennifer Bayuk of Decision Framework Systems on Putting Principles Into PracticeHow is risk management evolving as a result of ubiquitous cybersecurity risks? Jennifer Bayuk, CEO of Decision...

RapidRatings announced the release of a new application programming interface (API) suite providing financial risk analysis for clients and partners that can be integrated into existing in-house...

Tom Field and Naresh Persaud of CA Technologies reflect on key findings from their recent Executive Roundtable on Modern IAM.

Patch management has always been an evergreen topic for security practitioners. Each time poor patching is identified as the root cause of a breach, it triggers a new flood of opinions on the...

Salk Lake City-based RiskRecon, which offers solutions to help companies manage third-party cyber risk, has raised $25 million in Series B financing, the company announced Wednesday. read more

86 Percent of Bugs Patchable Within 24 Hours, Says Flexera's Alejandro LavieOne measure of why it's so difficult for organizations to keep their software patched and better secured: Of the nearly...

read more

OverWatchID announced the release of its Dynamic WebUI Engine for privileged access management (PAM). The Dynamic WebUI Engine supports network infrastructure web user interfaces (WebUIs)....