#IMOS21: Six Components of a Bug Bounty Program

#IMOS21: Six Components of a Bug Bounty Program

Speaking at the Spring Infosecurity Magazine Online Summit, Sean Poris, director, product security at Verizon Media, explored how to run a bug bounty program, outlining the six components of a successful big bounty structure. Poris explained that, by investing in bug bounties, organizations are potentially tapping into “hundreds of thousands of global hackers” that think about software and vulnerabilities in ways that internal staff might not. He also said that knowing and understanding your objectives…

Read More

FatFace Faces Customer Anger After Ill-Judged Breach Response

FatFace Faces Customer Anger After Ill-Judged Breach Response

British clothing retailer FatFace is facing a mounting storm of criticism for its handling of a “sophisticated criminal attack” which led to the compromise of customers’ personal data (PII). In an email to customers posted by HaveIGotPwned? founder Troy Hunt this week, the firm revealed that the breached data included customers’ full names, email and home addresses and partial card details (last four digits and CVV). “On January 17, 2021 FatFace identified some suspicious activity within…

Read More

CISA and NCSA Advise K-12 on Future Cybersecurity Threats

CISA and NCSA Advise K-12 on Future Cybersecurity Threats

As if they didn’t have enough on their plate with remote learning and COVID-19 safety, K-12 schools experienced a rash of ransomware attacks in 2020 that’s expected to continue through the school year and into the future. To help educators navigate the problem, the federal Cybersecurity and Infrastructure Security Agency (CISA) and nonprofit National Cyber Security Alliance (NCSA) hosted a webinar on Wednesday in which cybersecurity experts urged constant vigilance, regular training and sharing resources….

Read More

Cybersecurity overspending: It’s time to shed the belt or the suspenders

Cybersecurity overspending: It’s time to shed the belt or the suspenders

Cybersecurity overspending: It’s time to shed the belt or the suspenders | 2021-03-25 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

Are disrupted employees a new cybersecurity threat?

Are disrupted employees a new cybersecurity threat?

Are “disrupted” employees a new cybersecurity threat? | 2021-03-25 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

A new resolution: Course-correct any rushed pandemic-driven decisions

A new resolution: Course-correct any rushed pandemic-driven decisions

A new resolution: Course-correct any rushed pandemic-driven decisions | 2021-03-25 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

How Tripwire Does Configuration Management Differently

How Tripwire Does Configuration Management Differently

So many times, we hear companies say, “Our tools are just like Tripwire’s,” “We do configuration management just like Tripwire” and “We can push out policy just like Tripwire.” But as we say, this just ain’t necessarily so. You might be able to do configuration management using a “Tripwire-like” tool. You might configure it and use it set up a policy or a configuration of a system. This configuration needs to stay the way it…

Read More

Linux tricks to speed up your workday

Linux tricks to speed up your workday

One of the really nice things about working on the Linux command line is that you can get a lot of work done very quickly. With a handle on the most useful commands and some command-line savvy, you can take a lot of the tedium out of your daily work. This post will walk you through several handy tricks that can make your work load feel a little lighter and maybe be a little bit…

Read More

How to Stay Connected and Protected in a Remote Work Environment | McAfee Blogs Remote Work Tips: How to Stay Connected and Protected | McAfee Blog

How to Stay Connected and Protected in a Remote Work Environment | McAfee Blogs Remote Work Tips: How to Stay Connected and Protected | McAfee Blog

How to Stay Connected and Protected in a Remote Work Environment   Advancements in cloud solutions and collaboration tools in recent years, coupled with the necessity of going remote due to the pandemic, have empowered today’s workforce to choose where they want to work. While the ability to work from anywhere—home, the library, coffee shops or even the beach– gives employees increased flexibility, the shift from the traditional office setting has exposed security and logistical concerns….

Read More

Scientists are working on a switch to help lower the cost of using quantum computers

Scientists are working on a switch to help lower the cost of using quantum computers

As IT professionals know, enterprise server farms are huge energy consumers, and the larger they are, the more voracious their appetite. Quantum computing could help because it is not only supposed to solve complex problems exponentially faster than classical computing, it’s also supposed to do so while consuming less energy. However major barriers—such as creating the extremely low temperatures required to enable superconductivity that is used in quantum-computing components—stand in the way. Now researchers at…

Read More
1 3,538 3,539 3,540 3,541 3,542 3,873