'Cloud Snooper' Attack Circumvents AWS Firewall Controls Possible nation-state supply chain attack acts like a "wolf in sheep's clothing," Sophos says.
Kr00k Wi-Fi Vulnerability Affected a Billion Devices Routers and devices with Broadcom and Cypress Wi-Fi chipsets could be forced to sometimes use encryption keys consisting of all zeroes. Now patched, the issue affected a billion devices, including those from Amazon, Apple, Google, and Samsung.
US State Dept. Shares Insider Tips to Fight Insider Threats The insider threat is a technology, security, and personnel issue, officials said in explaining an approach that addresses all three factors.
5 Ways to Up Your Threat Management Game Good security programs start with a mindset that it's not about the tools, it's what you do with them. Here's how to get out of a reactive fire-drill mode with vulnerability management.
Commonsense Security: Leveraging Dialogue & Collaboration for Better Decisions Sometimes, good old-fashioned tools can help an enterprise create a cost-effective risk management strategy.
Open Cybersecurity Alliance Releases New Language for Security Integration OpenDXL Ontology is intended to allow security components to interoperate right out of the box.