The Latest in IT Security

1

Kevin Gosschalk, CEO at Arkose Labs: Start by ensuring your organization doesn’t have any easily solved vulnerabilities. This is where things like bug-bounty programs come into play because they are really good at finding the low-hanging fruit. The goal is to make it more expensive for attackers by moving the attack surface as far out […]

Read more ...

1

The new browser update arrives only a couple of weeks after Google patched four security flaws with the release of Chrome 77.0.3865.90, including two vulnerabilities that, combined with another type of weakness, could result in a sandbox escape. Previously, Google released Chrome 77 to the stable channel with patches for a total of 52 vulnerabilities. […]

Read more ...

1

Available as a free software update for all Macs introduced mid-2012 or later, macOS Catalina addresses security flaws in components such as CoreAudio, Crash Reporter, IOGraphics, Kernel, Notes, PDFKit, and WebKit, among others. The fixed bugs include multiple memory corruption issues, a race condition, a logic issue, an issue with the handling of links in […]

Read more ...

Categories

WEDNESDAY, OCTOBER 23, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks