Veracode CEO on the Relationship Between Security and Business Functions: Security Can’t Be Effective in a Silo

Veracode CEO Sam King says that security can???t be successful, and in fact will become a blocker, if it operates in a silo. She recently sat down for a fireside chat with Mahi Dontamsetti, State Street CTRO, and Jim Routh, MassMutual CISO, to share her thoughts and observations on communicating about security to the Boardツ?and […]

Google looks at bypass in Chromium’s ASLR security defense, throws hands up, won’t patch garbage issue

Engineers write off GC abuse because Spectre broke everything anyway In early November, a developer contributing to Google’s open-source Chromium project reported a problem with Oilpan, the garbage collector for the browser’s Blink rendering engine: it can be used to break a memory defense known as address space layout randomization (ASLR).… The Register – Security

Imperva pretty adamant that security analytics aggregator product Sonar is not ‘one dashboard to rule them all’

Uh huh… it’s a good time to be in enterprise security analytics Tired of keeping up with security alerts from your system? Worried that your Security Operations Centre (SOC) is getting deluged in low-level reporting? Fear not: Imperva has produced an aggregator aggregation product that sits over the top of all your other alert-generating security […]

Cyber-attackers work 24/7 … but what about your security team?

If you want the lowdown on managed detection and response, clock this Promo  One thing you can say about cyber-attackers. They don’t keep office hours. They – or their code – will chip away at your systems, all day, every day, looking for a way in before quietly exploiting it for as long as possible.… […]

Red Hat Security Advisory 2021-0717-01

Red Hat Security Advisory 2021-0717-01 – IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 8 to version 8 SR6-FP25. Issues addressed include buffer overflow and bypass vulnerabilities. Packet Storm

Next Page »