David Brumley of Carnegie Mellon University and ForAllSecure joins Dennis Fisher to talk about securing the software supply chain.
Which platform is the riskiest: Windows, Mac, Linux, Unix, or a networking device? Latest research from Kenna Security and Cyentia Institute shows that CISOs have to consider both the number of vulnerabilities and how issues are addressed in order to determine risk.
Two vulnerabilities affecting the Mail app in iOS have been used in targeted attacks and one of the flaws requires no user interaction for exploitation.
A security researcher discovered four zero day flaws in IBM's Data Risk Manager product that can lead to remote code execution.
Vulnerabilities need to be patched, but security doesn’t stop with updates since the attackers may already be inside the network. Additional steps may be necessary, such as resetting passwords and looking for evidence of other types of infection or compromise.