The Latest in IT Security

Posts Tagged ‘Risk’

An unpatched command injection vulnerability could allow hackers to take over enterprise networking products from Ubiquiti Networks. The vulnerability was discovered by researchers from SEC Consult and allows authenticated users to inject arbitrary commands into the web-based administration interface of affected devices. These commands would be executed on the underlying operating system as root, the […]

Read more ...

How do you handle third party risk assessments? Assessing the risk of vendors and partners is not new. Some organizations have entire teams dedicated to the process. We have a variety of models and methods. You can even – and it’s a bit meta – outsource your third-party risk assessment to a … third party. […]

Read more ...

Our threat research report The Hidden Data Economy highlights the value criminals place on data about us. However, what’s missing in this report is research on stolen medical data. That prompted questions about whether underground marketplaces exist for medical data, and if they do, what is the value of that data. We researched these questions […]

Read more ...

Categories

FRIDAY, MARCH 24, 2017

Featured

Archives

Latest Comments

Social Networks