January 22, 2020
Microsoft has ended support for Windows 7 and Windows Server 2008, but you can purchase extended security updates. Here's what you need to do to implement them. Read more â¶
What is a buffer overflow? And how hackers exploit these vulnerabilities
How Adobe monitors cloud deployments to control shadow IT
Data on the rise: 4 new challenges security must master
What the Brexit Withdrawal Agreement Bill means for data protection and the GDPR
US elections remain vulnerable to attacks, despite security improvements
Hiring scarce security talent: 8 secrets to working with recruiters
5G networks are no longer a dream of the future. Theyâre finally here and delivering faster speeds with lower latency. Read more â¶
A buffer overflow or overrun is a memory safety issue where a program does not properly check the boundaries of an allocated fixed-length memory buffer and writes more data than it can hold. This causes data to overflow to adjacent memory space, overwriting the information there, which often leads to crashes and exploitable conditions. Read more â¶
DEALPOST
These web-based courses are perfect for anyone who doesnât have the time to attend traditional classes Read more â¶
Keeping an eye on your cloud deployments is key to preventing yet another data breach. Adobe's MAVLink program does just that. Read more â¶
Data is information security's bread and butter, but the rise of data brings both new challenges and new opportunities. To meet them, security needs to change its relationship with data. Read more â¶
Boris Johnson's Withdrawal Agreement Bill (WAB) largely leaves existing data protection regulation in place, but changes are still possible. Read more â¶
Continued Russian interference, insecure paperless voting processes will sow doubt about the next election despite some security improvements. Read more â¶
Recruiters can be a valuable resource, especially when you're looking to hire for specialized and in-demand skills. Here's how to make the most of the relationship. Read more â¶