It’s hard to know how many systems are already compromised by the log4j security vulnerability. It may take months or even years until we know if most critical systems were patched in time.
As employees travel during the holidays, many will be taking their work along for the journey. The surge in remote work due to the COVID-19 pandemic means that security professionals must remain vigilant this holiday season.
A new feature in Tesla Model 3 vehicles raises concerns of road safety and asks the question: who is responsible for duty of care when it comes to distracted driving?
Blumira research team has discovered an alternative attack vector in the Log4j vulnerability that relies on a basic Javascript WebSocket connection to trigger the RCE locally via drive-by compromise.
There are strategies for avoiding the downsides of typical micromanagement, however, by following the path of enlightened micromanagement. Here are a few tips.
The Department of Homeland Security has awarded Rutgers University a grant to conduct research into threat detection and mitigation at "soft targets" like schools, stadiums and other public venues.
Here are seven questions to ask vendors to guide your organization's evaluation of enterprise resource planning (ERP) application security, risk and compliance solutions.