HackDig : Dig high-quality web security articles for hacker

Software Monitoring for NERC CIP – What, Why and How – Part 2

In Part 1 of this series, I walked through the background of the NERC CIP v5 controls and outlined what needs to be monitored for NERC CIP software requirements. In this final part of the series, we will take what we have learned and explore approaches for meeting the requirements, while considering security value. NERC CIP is supposed to be for security, af
Publish At:2016-07-21 14:15 | Read:3794 | Comments:0 | Tags:Featured Articles NERC CIP security software _NERC

Cisco patches critical exposure in management software

Cisco has patched what it called a critical vulnerability in its Unified Computing System (UCS) Performance Manager software that could let an authenticated, remote attacker execute commands.+More on Network World: Quick look: Cisco Tetration Analytics+Cisco UCS Performance Manager versions 2.0.0 and prior are affected and the problem is resolved
Publish At:2016-07-21 09:20 | Read:3417 | Comments:0 | Tags:Security Data Center Patches Networking Storage Virtualizati

Shlomo Kramer: a security investor looking for smart entrepreneurs to disrupt markets

Shlomo KramerRecently, endpoint-protection startup LightCyber announced a second round of funding - $20 million – including an investment from an individual investor with an impressive track record backing successful security startups: Shlomo Kramer.Kramer, who is Israeli, has a long-term relationship with the company’s CEO Gonen Fink, who worke
Publish At:2016-07-13 18:05 | Read:4010 | Comments:0 | Tags:Security Software as a Service (SaaS) Software

Software Monitoring for NERC CIP: What, Why and How – Part 1

The momentous NERC CIP v5 deadline of July 1 is now behind us.Considerable work has been done by all NERC registered entities, but there is still considerable work ahead. Some entities are still working on implementing or automating required controls. On top of that effort, the time bound process requirements (e.g. review X every Y days) kicked in on July 1.
Publish At:2016-07-13 04:45 | Read:2552 | Comments:0 | Tags:Featured Articles NERC CIP CIS security software

The truth about bug finders: They're essentially useless

Today's popular bug finders catch only about two percent of the vulnerabilities lurking in software code, researchers have found, despite the millions of dollars companies spend on them each year.Bug finders are commonly used by software engineers to root out problems in code that could turn into vulnerabilities. They'll typically report back how
Publish At:2016-07-09 04:35 | Read:2465 | Comments:0 | Tags:Application Development Software Testing Security

Intel is said to mull selling its security business

Intel is considering selling its security business as the company tries to focus on delivering chips for cloud computing and connected devices, according to a news report.The Intel Security business came largely from the company's acquisition for US$7.7 billion of security software company McAfee. Intel announced plans to bake some of the security techno
Publish At:2016-06-27 00:00 | Read:2610 | Comments:0 | Tags:Security Software Mergers and Acquisitions

Arista infringes on Cisco networking patents, trade agency says

In a move that could lead to a ban on selling its products in the United States, the US International Trade Commission has ruled that Arista does in fact infringe on a number of Cisco’s technology patents.Arista now must decide if it wants to ask the US government to overturn a so-called “import ban” or ask that an appeals court toss the decision, observ
Publish At:2016-06-24 17:15 | Read:2257 | Comments:0 | Tags:Networking Security Software Data Center

IDG Contributor Network: CIOs step inside the mind of a security hacker

Does your board question the company's approach to security? It should. Understanding your opponents can help break the cyber kill chain. Think like your opponent in this multi-player game. Begin with a framework that covers policies, standards, guidelines, and procedures to ensure consistency – earn trust.Medical and healthcare breachesThe cost of a dat
Publish At:2016-06-20 22:00 | Read:3091 | Comments:0 | Tags:Security Internet of Things Leadership and Management CIO Ro

Delphi Disillusion

Delphi Disillusion Posted by Martin Zinaich on June 19, 2016.What propels a company into higher markets has always been a mystery to me. Often it does not seem to require having the better product. When looking at the origins of some of my favorite companies, they certainly had the bet
Publish At:2016-06-20 02:05 | Read:3678 | Comments:0 | Tags:Martin Zinaich Delphi embarcadero embarcadero delphi Softwar

New Mozilla fund will pay for security audits of open-source code

A new Mozilla fund, called Secure Open Source, aims to provide security audits of open-source code, following the discovery of critical security bugs like Heartbleed and Shellshock in key pieces of the software.Mozilla has set up a US$500,000 initial fund that will be used for paying professional security firms to audit project code. The foundation will
Publish At:2016-06-10 06:30 | Read:2533 | Comments:0 | Tags:Security Open Source Software

Office 365 Advanced Security Management brings powerful protection for a price

Enterprises using Microsoft's Office 365 have a new security product that they can use to better lock down their organizations -- for a price. The company introduced a new Advanced Security Management service on Wednesday that gives companies a trio of tools aimed at helping detect security threats, provide granular controls and let IT administrators tra
Publish At:2016-06-01 20:50 | Read:1933 | Comments:0 | Tags:Security Productivity Software Software as a Service (SaaS)

Security Week-in-Review: Old software, new problems

It’s hard to keep up with the hundreds of security-specific headlines published every week. So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we explore money-stealing malware, an SAP vulnerability from 2010, and patches. Check back every Friday to learn about the latest in securi
Publish At:2016-05-14 12:35 | Read:3026 | Comments:0 | Tags:Security breaches data breach security week in review softwa

Dangerous 7-Zip flaws put many other software products at risk

Two vulnerabilities recently patched in 7-Zip could put at risk of compromise many software products and devices that bundle the open-source file archiving library.The flaws, an out-of-bounds read vulnerability and a heap overflow, were discovered by researchers from Cisco's Talos security team. They were fixed in 7-Zip 16.00, released Tuesday.The 7-Zip
Publish At:2016-05-13 02:20 | Read:2443 | Comments:0 | Tags:Security Application Development Open Source Software

Slack is letting its users take their chat credentials to other apps

Slack is offering its users a new way to sign into other applications. The company announced Tuesday that it has launched a new "Sign in with Slack" feature that lets people use their login for the chat app to sign in to participating applications. Developers of applications like Quip can now enable their users to sign in with Slack credentials, which ca
Publish At:2016-05-10 19:35 | Read:3640 | Comments:0 | Tags:Collaboration Identity Management Security Productivity Soft

Panda Security named Company of the Year at the 5th Annual “Premios Nacionales El Suplemento”

Panda Security has been awarded Company of the Year at the 5th Annual “Premios Nacionales El Suplemento“. Organized by the Spanish newspaper El Suplemento by ABC, at the “Premios Nacionales El Suplemento” well-deserved recognition is given to outstanding businesses and their hardworking professionals, who,  despite the current economy, are boosti
Publish At:2016-05-10 17:40 | Read:3545 | Comments:0 | Tags:News Panda Security Best Company of the Year Premios Naciona


Share high-quality web security related articles with you:)


Tag Cloud