You searched for heartbleed/ | SC Media

Your search for heartbleed/ returned 118 results

Your search for heartbleed/ returned 118 results

Sort Results:

Relevant Recent
Features, Security News

Where enterprise CISOs go wrong

The best laid plans are often fraught with mistakes – some big, some more nuanced. Evan Schuman looks at where CISOs can fall short. Enterprise security today, at least at the $4 billion annual revenue level and up, is in a precarious place. Despite GDPR and best security practices insisting on having complete global datamaps,…
Executive Insight

Open source in your data center – what you should know

Open-source software started out as a grassroots movement and morphed in a short time into a mega-industry. Today, open-source code boosts modern business application delivery – allowing development and operation teams to be more agile, enjoy solutions that are custom-fit to their needs, and lower development and rollout costs.  There’s no question that open-source solutions…
Executive Insight

Cryptography is our digital immune system

A fifth, man-made domain serving as a great force multiplier for commerce and free expression, cyberspace has also made us more vulnerable.  We have intertwined nearly every aspect of society including critical infrastructure, business, and communication to internet technology, all of which was not initially designed to be secure in this hyper-connected world.  No organism,…
Vulnerabilities

Yahoo banishes ImageMagick after version it was using was found vulnerable to data exfiltration

Yahoo has reportedly shelved its use of ImageMagick image processing software after a researcher discovered two vulnerabilities that could be exploited to pull user content in unauthorized fashion from the memory of Yahoo’s private servers. Security researcher Chris Evans, who discovered the vulnerabilities, dubbed them Yahoobleed #1 and Yahoobleed #2, because they evoked memories of…
In Depth

Extreme hoarders: Zero-day edition

Nation-states are stockpiling software exploits to compromise and spy on their rivals. But do their gains represent a loss for manufacturers, developers and the public? Bradley Barth reports.
Next post in Vulnerabilities