Home Tags Auditing

Tag: Auditing

Features of secure OS realization

There are generally accepted principles that developers of all secure operating systems strive to apply, but there can be completely different approaches to implementing...

Already on probation, Symantec issues more illegit HTTPS certificates

EnlargeOwn Work reader comments 16 Share this story A security researcher has unearthed evidence showing that three browser-trusted certificate authorities owned and operated...

Google ventures into public key encryption

Google announced an early prototype of Key Transparency, its latest open source effort to ensure simpler, safer, and secure communications for everyone.The project’s goal...

8 Docker security rules to live by

Odds are, software (or virtual) containers are in use right now somewhere within your organization, probably by isolated developers or development teams to rapidly...

Code Reuse a Peril for Secure Software Development

The amount of insecure software tied to reused third-party libraries and lingering in applications long after patches have been deployed is staggering. It’s a habitual...

Facebook Releases Free Certificate Transparency Monitoring Tool

The movement toward Certificate Transparency (CT) has brought about a healthy improvement, not only in the way organizations monitor and audit TLS certs, but also...

OpenVPN will be audited for security flaws

The next major version of OpenVPN, one of the most widely used virtual private networking technologies, will be audited by a well-known cryptography expert. The...

Thales Releases Advanced Encryption Solutions for Secure Docker Containers, Simplified Deployment...

Vormetric Data Security Platform expansion includes patented, non-disruptive encryption deployment and advanced Docker encryptionDecember 8, 2016 – Thales, a leader in critical information systems,...

ESET Multi-Device Security 10

Many security suite product lines form a simple progression, at least on the Windows platform. It goes like this: basic antivirus, entry-level suite, feature-rich...

SpeedCast Introduces SIGMA Net

A new standard in cloud-based vessel management with security by designSydney, Australia, November 30, 2016 - SpeedCast International Limited (ASX: SDA), a leading global...

How Do You Protect Your Perimeter When You’ve Blown it to...

By Ian Kilpatrick, Executive Vice President Cyber-Security, Nuvias Group and Chairman Wick Hill GroupIn 2016, we are subject to near constant headlines detailing the...

CompSci Prof raises ballot hacking fears over strange pro-Trump voting patterns

Calls for audit of votes in key swing states just to make sure nothing went awry Donald Trump's surprise win in the United States' presidential...