New Techniques Emerge for Abusing Windows Services to Gain System Control Organizations should apply principles of least privilege to mitigate threats, security researcher says.
Exchange Exploitation: Not Dead Yet The mass exploitation of Exchange Servers has been a wake-up call, and it will take all parties playing in concert for the industry to react, respond, and recover.
Wanted: The (Elusive) Cybersecurity 'All-Star' Separate workforce studies by (ISC) 2 and ISACA point to the need for security departments to work with existing staff to identify needs and bring entry-level people into the field.