The Latest in IT Security

1

Successful digital transformation requires internal disruption, and CIOs intent on embracing a digital future must often alter their IT operating models to get there. Nowhere is this more evident than when it comes to developing software and services. To build software faster, CIOs are kicking old waterfall habits in favor of agile methodologies in which […]

Read more ...

1

Problem: How do you store a password but make it nearly impossible to recover the plaintext in the event that the database with the password hash is compromised? When doing software development, it’s critical to review these functions. Having good development standards for your team will ensure that people store passwords properly and avoid mistakes […]

Read more ...

1

A newly discovered hooking technique can go completely undetected by the current implementation of PatchGuard, CyberArk security researchers warn. Called BoundHook, the method relies on causing an exception in a very specific location in a user-mode context, as well as on catching that exception to gain control over the thread execution. It can bypass PatchGuard, […]

Read more ...

1

More than 4 million mobile apps are currently in production, but only 29% on average are tested for bugs, and nearly a third of these contain significant vulnerabilities, according to a recent Ponemon Institute survey. Enterprises, meanwhile, are expected to accelerate their mobile app development in the coming months, according to a recent Gartner survey. […]

Read more ...

Categories

SUNDAY, JANUARY 21, 2018

Featured

Archives

Latest Comments

Social Networks