You searched for heartbleed/ | SC Media

Your search for heartbleed/ returned 120 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Older than 2 years remove
Post remove

Your search for heartbleed/ returned 120 results

Sort Results:

Relevant Recent
Executive Insight

Open source in your data center – what you should know

Open-source software started out as a grassroots movement and morphed in a short time into a mega-industry. Today, open-source code boosts modern business application delivery – allowing development and operation teams to be more agile, enjoy solutions that are custom-fit to their needs, and lower development and rollout costs.  There’s no question that open-source solutions…
Executive Insight

Cryptography is our digital immune system

A fifth, man-made domain serving as a great force multiplier for commerce and free expression, cyberspace has also made us more vulnerable.  We have intertwined nearly every aspect of society including critical infrastructure, business, and communication to internet technology, all of which was not initially designed to be secure in this hyper-connected world.  No organism,…
InfoSec Insider

SSL/TLS Assurance

TLS is the cornerstone of secure communications for networked communications, but are you implementing and maintaining it correctly?

InfoSec Insider

News in a Minute Weekly Roundup | Sept. 22

A roundup of the top news stories in information security this week, including a new Apache vulnerability that's similar to Heartbleed, and a new study sheds light on the costs of data breaches for U.S. enterprises.

Vulnerabilities

Yahoo banishes ImageMagick after version it was using was found vulnerable to data exfiltration

Yahoo has reportedly shelved its use of ImageMagick image processing software after a researcher discovered two vulnerabilities that could be exploited to pull user content in unauthorized fashion from the memory of Yahoo’s private servers. Security researcher Chris Evans, who discovered the vulnerabilities, dubbed them Yahoobleed #1 and Yahoobleed #2, because they evoked memories of…
In Depth

Extreme hoarders: Zero-day edition

Nation-states are stockpiling software exploits to compromise and spy on their rivals. But do their gains represent a loss for manufacturers, developers and the public? Bradley Barth reports.
Next post in In Depth