Product marketing manager from Thycotic, Erin Ducan, discusses privileged access in this Digital Summit session. Erin sets the stage with this: “We know that cyber attackers are utilizing new technology and automation to discover vulnerabilities more rapidly. For most organizations, the attack surface into which these attackers can infiltrate is massive. It is filled with hundreds,
Have a hard time coming up with the answers to these puzzle questions? We know a great place to look for more clues… Snuggle up with your hot beverage of choice, take a break from the perils of facing reality, and hack away at The Edge’s Dark Reading cybersecurity crossword puzzle. It might be just
Mobile security experts share their go-to advice for protecting iPhones from hackers, thieves, and fraudsters. 1 of 11 Now more than ever, we depend on smartphones to keep us connected to each other, to our employers, to our finances and healthcare providers. We use our phones to shop, bank, and access corporate applications and information.
Cross-site scripting has been around longer than most security professionals have been on the job. Why is it still such an issue when we’ve known about it for so long? In cyber security, attention is concentrated on the new — zero-day exploits, for example, are big news and big business. But old threats can still
Enterprise Vulnerabilities From DHS/US-CERT’s National Vulnerability Database CVE-2020-12431PUBLISHED: 2020-05-21
A Windows privilege change issue was discovered in Splashtop Software Updater before 184.108.40.206. Insecure permissions on the configuration file and named pipe allow for local privilege escalation to NT AUTHORITY/SYSTEM, by forcing a permission change to any Splashtop files and directories, with result… CVE-2020-12828PUBLISHED: 2020-05-21
The long debate over whether encryption and anonymity shield too much criminal behavior also has staged a resurgence. Nations whose governments pursue a centralized model of contact tracing are more likely to see a massive surge in citizens adopting privacy-enhancing technologies — in some cases by a factor of 10x or more, according to messaging security
Verizon’s annual data breach report shows most attackers are external, money remains their top motivator, and web applications and unsecured cloud storage are hot targets. Today’s attackers are taking greater advantage of human factors, with more exploitation of errors such as misconfiguration and misdelivery, Verizon’s “2020 Data Breach Investigation Report” (DBIR) finds. Errors, along with
During this digital summit panel, Suresh Chawdhary, head of security & privacy for Nokia, stresses the importance of a layered, multi-pronged cyber security approach to best protect from phishing and whaling. This layer defense mechanism moves away from a one-size-fits-all strategy, ensuring that everyone across the enterprise is well equipped to stay protected against threats.