BusyBox flaws highlight need for consistent IoT updates

Security researchers have found and reported 14 vulnerabilities in the BusyBox userspace tool that’s used in millions of embedded devices running Linux-based firmware. While the flaws don’t have high criticality, some of them do have the potential to...

Tabletop exercises: Six sample scenarios

A tabletop exercise is an informal, discussion-based session in which a team talks through their roles and responses during an emergency, walking through one or more example scenarios. It’s a great way to get business continuity plans off the written...

Malware detection in 9 easy steps

All antivirus software misses a significant percentage of malware. This is because professional malware writers design their malware and botnet ecosystems to self-update whenever they start getting detected. While antivirus engines eventually sniff out millions of...

The 7 best password managers for business

Enterprise password manager features to look for For starters, businesses will need administrative capabilities to manage multiple users and applications. Some vendors covered here include capabilities to automatically provision and de-provision user access to...

What is IPsec?

IPsec (IP security) is a suite of protocols developed to ensure the integrity, confidentiality and authentication of data communications over an IP network. While the flexibility of the IPsec standards has drawn the interest of the commercial sector, this same...