Security News

Cisco Live 2018: How Tufin's automation solutions and expanded Cisco partnership simplifies security policy management
2018-06-12 23:47

Joe Schreiber, technical director at Tufin, explains how their change automation solution simplifies security policy management and discusses how they are expanding support for Cisco ASA and FirePOWER.

Facebook Defends Against Device-Integrated APIs Policy, But Concerns Remain
2018-06-04 17:17

Facebook is again in hot water after an article alleged it struck deals with device-makers to access users' data.

Privacy Policy
2018-05-24 15:52

Privacy Policy - Effective date: May 25, 2018 read more

Whitepaper: Future-proofing your password policy
2018-05-23 13:25

Users are accumulating more and more passwords, and many of the recent breaches are the direct result of their compromise. As hackers find new ways to exploit password-protected systems, widely...

Google Discloses Windows Lockdown Policy Zero-Day
2018-04-23 08:18

Google Discloses Unpatched Windows Lockdown Policy Bypass read more

New National Academies Report on Crypto Policy
2018-02-16 15:17

The National Academies has just published "Decrypting the Encryption Debate: A Framework for Decision Makers." It looks really good, although I have not read it yet. Not much news or analysis yet....

Critical "Same Origin Policy" Bypass Flaw Found in Samsung Android Browser
2017-12-29 12:33

A critical vulnerability has been discovered in the browser app comes pre-installed on hundreds of millions of Samsung Android devices that could allow an attacker to steal data from browser tabs...

Transparency as a Policy
2017-12-19 17:47

Transparency is an interesting concept, especially for cyber security organizations. I say that as I recently experienced a complete lack of transparency – and what followed was confusion turned...

The 10 misconceptions of using a policy-based approach for access control
2017-10-23 14:55

The principle of Attribute Based Access Control (ABAC) has existed for many years. It’s the evolution from simple access control lists and role-based access control, to a highly flexible system...