Application & Infrastructure Risk Management: …

Before getting more scanning tools, think about what’s needed to defend your organization’s environment and devise a plan to ensure all needed tools can work together productively. To effectively manage cyber-risk, organizations need to gain visibility into existing application and infrastructure vulnerabilities while also learning how to manage them proactively….

read more

DHS to Require Federal Agencies to Set …

The Cybersecurity and Infrastructure Security Agency (CISA) publishes a draft document mandating a vulnerability disclosure policy and a strategy for handling reports of security weaknesses. The US government will require each civilian agency to create a public policy for software-vulnerability disclosure, as well as a strategy for handling any potential…

read more

7 Ways to Hang Up on Voice Fraud

Criminals are coming at us from all direction, including our phones. Don’t answer that next call without reading this tips first. 1 of 8 Whether landline or mobile, for work purposes or personal use, phones are part of our everyday lives. Criminals know this, too, so it’s little wonder why…

read more

Malicious SDK Reappears in …

Months after the Tushu SDK was found infecting Android apps on Google Play, its operators are back with new evasive techniques. Researchers who analyzed a new pool of malicious Android applications found they contained a new version of the Tushu SDK, which was seen infecting apps on Google Play earlier…

read more

Employee Privacy in a Mobile Workplace

Why businesses need guidelines for managing their employees’ personal information — without compromising on security. Consumer privacy has long been the focal point of controversies regarding how companies handle personal data. While this is clearly an important matter, it has kept the spotlight off of another important issue: the way…

read more