This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Back in November 2012, a Chrome Releases blog post mysteriously stated: "Congratulations to Pinkie Pie for completing challenge: 64-bit exploit". Chrome patches and autoupdates bugs pretty fast but this is a WebKit bug and not every consumer of WebKit patches bugs particularly quickly. So I've waited a few months to release a full breakdown of the exploit.
NopSec is pleased to announce the immediate availability of a new Executive Dashboard for Unified VRM. NopSec continues the rapid pace of innovation with new capabilities that provide customers with a graphical view of prioritized vulnerabilities and at-a glance progress toward fixes. Michelangelo Sidagni, Chief Technology Officer at NopSec, had this to say about the Executive Dashboard, “Our customers requested the ability to confidently gauge the vulnerabilities and risk at the present moment
Prevention vs. clean up. It’s a security question all financial institutions should ask themselves. When it comes to providing a trusted customer environment, banks are typically better at resolving problems stemming from non-predictive authentication and fraud than preventing them. That’s because they continue to allow criminals to get their foot in the door.
Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.
In a recent article posted by Robert McGarvey in the Credit Union Times, Threat of the Week: APT Will Get You , he talks about advanced persistent threats, referencing the high-profile hacks at large news and media companies. NopSec’s Chief Technology Officer, Michelangelo Sidagni, contributed as an expert source for the article. “These are very sophisticated attackers,” said Michelangelo Sidagni, chief technology officer at NopSec, a New York security firm.
We observe a common misconception that companies believe they are doing “vulnerability management” when, more often than not, they are simply performing “vulnerability identification”. I came across an insightful article written by Mark Hatton in SecurityWeek titled, “ Three Mistakes Companies Make When it Come to Vulnerability Management ”. Below are my own observations and comments on the topic.
Cyber Security was all over the news recently. Facebook revealed that it was hacked – even though it came out with the news only after a month. Then Apple said it was hacked but it admitted that no damage was made. Then Burger King admitted that its Twitter account was hacked (see picture above) and its logo was substituted with that of McDonald’s.
Cyber Security was all over the news recently. Facebook revealed that it was hacked – even though it came out with the news only after a month. Then Apple said it was hacked but it admitted that no damage was made. Then Burger King admitted that its Twitter account was hacked (see picture above) and its logo was substituted with that of McDonald’s.
Crain’s New York Business, there is an article written by Matthew Flamm that discusses the pervasiveness of cyber attacks and the implications for New York companies. He makes an assertion that, “New York may become more hospitable to entrepreneurs as the number of engineers and investors attracted to the local tech scene grows.” The article then goes on to spotlight NopSec, “getting attention from large, well-reputed VCs” according to Steve Berg of RTP Ventures.
It has been hard to keep up with my news alert due to all the IT security headlines. “ Hackers in China Attacked The Times for Last 4 Months ” in the New York Times, and “ Chinese Hackers Hit U.S. Media ” in The Wall Street Journal. Cyber-attacks on the rise Although unfortunate and painful for the companies involved, high-profile security attacks and breaches are positive for the industry overall from the perspective of increasing the awareness and education of the need to employ an ongoi
It looks like the Federal Government is getting serious about IT security. “Now our enemies are also seeking the ability to sabotage our power grid, our financial institutions, and our air traffic control systems,” Mr. Obama said in his State of the Union address. See “ Obama Order Gives Firms Cyberthreat Information ” by the New York Times. My understanding is that the order targets improvements in information sharing and developing a risk framework and best practices, called the Cybersecurity
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content