OWASP published the latest iteration of its Testing Guide, an informational manual designed to teach developers how to build and maintain secure application.
Browsing Category: Compliance
The United States Air Force is attempting to enhance its cyber situational awareness in order to contend with “increasingly sophisticated” threats to its networks and systems.
Roughly one in five Massachusetts residents were affected by a data breach last year, according to numbers released today by the Commonwealth.
A vulnerability in Netgear-branded ethernet switches could give an attacker full access to the hardware.
The system that’s used to produce RFID-enabled identification cards–including permanent resident IDs–by the United States Citizenship and Immigration Service has a number of serious security issues, according to a new report from the Office of the Inspector General at DHS. Among the issues the OIG found is that nearly all of the workstations in the system[...]
Google took steps toward compliance with a European privacy ruling that allows individuals to request their names be removed from search results.
In March I spoke at Cyber Intelligence Asia 2014, where CERTs from most Asians countries were presented. The fact is that only a few CERTs are now dealing in some way with industrial security, ICS and SCADA matters. One of the best of those is CERT of Japan, which is doing a great job here,[...]
The burgeoning evolution of “Internet of Things” has prompted Cisco to issue a challenge to programmers to address these security issues before they go on to become bigger problems.
Dennis Fisher talks with Bruce Schneier about the differences between bulk and targeted surveillance, the most concerning NSA revelations and making surveillance more expensive for intelligence agencies.
New report shows that health care industry intellectual property, payment information, and patient data are poorly protected and, in many cases, already compromised.