Tag: EN

Canon Patches Seven Critical Flaws in Small Office Printers

  Canon, a Japanese electronics company, released software patches on Monday that address seven major vulnerabilities impacting numerous small office printer models.  Buffer overflow flaws are the issues that can be used to execute code remotely over a network or…

HPE Cybersecurity Challenge: Data Breach Sparks Investigation

  Hewlett Packard Enterprise (HPE), a leading technology company, is currently grappling with a potential security breach as reports emerge of sensitive data being offered for sale on a prominent hacking forum. This latest incident underscores the persistent challenges faced…

On Software Liabilities

Over on Lawfare, Jim Dempsey published a really interesting proposal for software liability: “Standard for Software Liability: Focus on the Product for Liability, Focus on the Process for Safe Harbor.” Section 1 of this paper sets the stage by briefly…

Were 3 Million Toothbrushes Really Used for a DDoS Attack?

Three million electric toothbrushes were reportedly used for disruptive DDoS attacks, but cybersecurity experts questioned the claims. The post Were 3 Million Toothbrushes Really Used for a DDoS Attack? appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

How to Predict Your Patching Priorities

Implementing a smart and timely approach to patching remains one of the primary ways for organizations to protect their networks from attackers. The post How to Predict Your Patching Priorities appeared first on SecurityWeek. This article has been indexed from…

Cohesity to acquire data security firm Veritas

Cohesity, a leading provider of security software, has made a significant public announcement regarding its intention to acquire data security firm Veritas, a move that is poised to elevate the valuation of the combined entity to over $7 billion. This…

2054, Part IV: A Nation Divided

“The people are in the streets. We can’t ignore them any longer. Really, we have little choice. Either we heal together, or we tear ourselves apart.” An exclusive excerpt from 2054: A Novel. This article has been indexed from Security…

Unified Identity – look for the meaning behind the hype!

If you’ve listened to software vendors in the identity space lately, you will have noticed that “unified” has quickly become the buzzword that everyone is adopting to describe their portfolio. And this is great! Unified identity has some amazing benefits! …