Gemalto study points to ID theft as chief cause
TEISS – Brexit Will be Damaging for Information Sharing Initiatives
The potential British exit from the European Union could disrupt an engine for economic growth.
I Might Be Afraid Of This Ghost
CVE-2015-7547 is not actually the first bug found in glibc’s DNS implementation. A few people have privately asked me how this particular flaw compares to last year’s issue, dubbed “Ghost” by its finders at Qualys. Well, here’s a list of what that flaw could not exploit: apache, cups, dovecot, gnupg, isc-dhcp, lighttpd, mariadb/mysql, nfs-utils, nginx, nodejs, openldap, openssh, […]
A Skeleton Key of Unknown Strength
TL;DR: The glibc DNS bug (CVE-2015-7547) is unusually bad. Even Shellshock and Heartbleed tended to affect things we knew were on the network and knew we had to defend. This affects a universally used library (glibc) at a universally used protocol (DNS). Generic tools that we didn’t even know had network surface (sudo) are thus […]
Next Generation IDaaS: Moving From Tactical to Strategic
Today, I posted a blog entry to the Oracle Identity Management blog titled Next Generation IDaaS: Moving From Tactical to Strategic.
In the post, I examine the evolution of IDaaS and look toward the next generation of Enterprise Identity and Access Ma…
Spam Volume Falls in 2015
Financial institutions such as banks, payment systems and online shops were attacked most often with phishing emails.
PCI DSS 3.2 Expected as Soon as March
Card data security standard is moving to smaller update cycle
One-Third of IT Staff Are Hackers
33% of respondents in a survey admitted to successfully hacking their own or another organization.
Akamai Bot Manager Takes Aim at Bot Traffic
60% of an organization’s Web traffic may be generated by programs that operate as an agent for a user or another program.