5 Fundamental But Effective IoT Device Security Controls

Matt Dunn, the associate managing director for cyber-risk at Kroll, discusses how to keep networks safe from insecure IoT devices. As the pandemic continues to fuel the shift to remote work, numerous manufacturers have capitalized on this movement to create a...

Linux Kernel Bug Opens Door to Wider Cyberattacks

The information-disclosure flaw allows KASLR bypass and the discovery of additional, unpatched vulnerabilities in ARM devices. An information-disclosure security vulnerability has been discovered in the Linux kernel, which can be exploited to expose information in the...

Microsoft April 2021 Security Updates

1.0 Introduction Microsoft has released updates to address multiple vulnerabilities in Microsoft software. 2.0 ImpactA remote attacker could exploit some of these vulnerabilities to take control of an affected system. 3.0 Affected Products Azure AD Web Sign-inAzure...

Intel aims for supply chain edge with new data center chip

Navin Shenoy, executive vice president and general manager of the data platforms group at Intel Corp, holds one of the company’s “Ice Lake” data center chips in an undated handout photo released on April 6, 2021. By Stephen Nellis Intel Corp on...

Threat Intelligence

TIP Defined Threat The potential for any other party to access or interfere with the normal planned operations of an information network. Common threats today include: APTPhishingMalwareBotnetsDDOSRansomware Intelligence Knowledge of a threat gained by human analysts...