The gang behind the Dridex computer trojan has adopted an unpatched Microsoft Word exploit used in attacks for months and used it to target millions of users. Read More ▶ |
|
| Webcast: CA Technologies Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More ▶ | Starting in September, publicly trusted certificate authorities will have to honor a special Domain Name System (DNS) record that allows domain owners to specify who is allowed to issue SSL certificates for their domains. Read More ▶ |
| A third-person tactical shooter combining genre-defining ballistics and emergent stealth tactics across the largest and most diverse environments ever seen in a Sniper Elite game. 1-2 player, dedicated co-op, and adversarial multiplayer modes. Read More ▶ |
| None of the new alleged NSA exploits leaked by the Shadow Brokers hacking group poses an immediate threat to users. Read More ▶ |
| | Security experts weigh in on stopping the danger from your own employees. Access and security awareness training are the main themes to finding the danger that is within your own walls. Read More ▶ |
| White Paper: Safebreach An invaluable technique for understanding security risks is to assess your environment. But, vulnerability assessments provide limited context, while penetration testing's point-in-time approach renders findings that are quickly out-of-date. A better approach is dynamic security assessment, as defined by Securosis analyst Mike Rothman. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|