Dronepocalypse, Privacy, Microsoft, DLINK, Home Depot, Phishing, NIST, VenomRat, Josh Marpet, and more, are on this edition of the Security Weekly News.
You can't just buy a full zero-trust solution. Instead, you should build a zero-trust security model by implementing various components. Here’s how to evaluate vendors of those components.
Security vendors, analysts and experts often cite several "pillars" of zero-trust security. But they don't always agree on just how many zero-trust pillars there are.
Organizational models faced challenges in core security operations like threat detection and remediation, indicating a potential need for additional expertise regardless of structure.
The OWASP Top 10 gets its first update after a year, Metasploit gets its first rewrite (but it's still in Perl), PHP adds support for prepared statements, RSA Conference puts passwords on notice while patching remains hard, and more!
Legacy systems are riddled with outdated and unreliable cryptographic standards. So much so that recent proprietary research found 61 percent of the traffic was unencrypted, and up to 80% of encrypted network traffic has some defeatable flaw in its encryption
No longer can enterprises take their cryptography for granted, rarely evaluated or checke...