Saleem Padani

162 Flips | 1 Magazine | 8 Likes | 1 Following | 7 Followers | @SaleemPadani | COO, Mediaops Inc.

DevSecOps Day at RSAC 2018 - Who Will be There

The DevSecOps Tribe continues to thrive as we plunge into 2018. At RSA Conference 2018, we'll all get together to hear the latest from DevSecOps …

Nexus

GDPR Countdown Checklist: 3 Strategic To-Do’s for Cybersecurity Teams

Over the past two years, many IT security teams began working closely with their business unit colleagues on implementing new security solutions, or …

Personal Data

RSAC 2018 Keynote Lineup: Plenty of Women. This Committee Is Owed an Apology

After taking a lot of heat, some of it seemingly unjustified, the RSA Conference (RSAC) announced the final lineup of keynote speakers for the 2018 …

Senate Committees

Meltdown Patches Left Windows 7, Server 2008 Systems Even More Vulnerable

Microsoft’s January and February patches for the Meltdown vulnerability introduced an even more dangerous flaw that left Windows 7 and Server 2008 R2 …

Information Security

Mastering Hybrid Cloud Security

Enterprises have embraced hybrid cloud — here’s what you need to know when it comes to security<p>You’d think by now all the cloud-computing buzzwords …

Drupal Websites at Risk Due to Highly Critical Vulnerability

The Drupal Project has released patches for a highly critical vulnerability that affects all supported versions of the popular CMS, is very easy to …

Information Security

Low-Priority Threats: The Achilles Heel of Security Teams

No company has ever been breached as a result of a high-severity alert. There may be a few exceptions, but high-severity alerts are not generally …

Information Security

EMC Patches Serious Flaws in Data Protection Suite

EMC has released security fixes for three vulnerabilities that, when combined, can be used to take full control of products from its Data Protection …

Information Security

The Dark Side of Quantum Computing

Quantum computing has long promised the next major leap forward in computing power. In fact, in 2017 Google announced a new quantum chip that shows …

Quantum Computing

Dormant Can Be Dangerous: Avoiding Administrative Rights Misuse

We’ve all seen the headlines. A major brand-name company we trust was hacked—customer data was exposed, the brand’s reputation is damaged and …

Social Issues

CISO Challenges in 2018

To stay ahead of threats, CISOs will need to enter 2018 in steep learning mode. Their priorities will include integrating artificial intelligence, …

You Can Now Help Identify Middleboxes Holding Back TLS 1.3 Adoption

TLS 1.3 promises great improvements for the encrypted Web, both in terms of security and performance. However, its adoption has been held back for …

Hackers Infect Magento Shops With Malware Through Extension Flaw

Attackers are breaking into online shops built with Magento by exploiting a known cross-site scripting vulnerability within a popular extension used …

Information Security

Backdoors Found in Three More WordPress Plug-ins

In what is becoming an increasingly common type of software supply chain attack, three more WordPress plug-ins that recently changed ownership got …

Information Warfare: The Year Ahead

Will 2018 be a year without conflict? Not likely. Will we see information warfare in 2018? Most definitely. Indeed, the possibility of information …

Attackers Exploit Android Application Package Flaw to Hide Malware

Attackers have started to exploit a vulnerability patched this month in Android that enables the bundling of malware with Android application files …

Cybersecurity

DevSecOps: 2018 is the Year Quality and Security Finally Merge

A flaw is a flaw is a flaw. And as DevSecOps practices take root in an enterprise, don’t be surprised when software engineering teams are finally …

Application Security

Script Kiddie Responsible for Large Satori Botnet

Security researchers believe that a recently discovered botnet of more than 250,000 routers was actually created by an amateur hacker with limited …

Information Security

Lithuania Bans Kaspersky Lab Products on Critical Systems

It seems the U.S. government’s ban on Kaspersky Lab products is having echoes in other countries. The Lithuanian government also wants the company’s …

Global Undersea Cables Vulnerable to Russia's Special Ops

British defense officials have added their voice to those of others highlighting the threat posed by the capabilities of the Russian military and …

Yet Another WordPress Extension Changes Owner and Gets Backdoored

A WordPress plug-in called Captcha with more than 300,000 active installations contained a backdoor that allowed its maintainer to gain unauthorized …

Information Security

China's Economic Espionage via the Non-Attributable Hand

As we come to the end of the tumultuous 2017, the award for sleight of hand perhaps should go to China and its intelligence apparatus, the Ministry …

Predicting 2018: Manufacturers Shift to Hardware Security

The market for cybersecurity is getting more saturated by the hour. Companies and products keep popping out of the woodwork, claiming to provide new …

Cybersecurity

U.S. Officially Accuses North Korea for WannaCry Attack

The U.S. government says it has evidence that North Korea was responsible for the WannaCry ransomware outbreak that infected around 300,000 computers …

Cybersecurity

Data Forensics: A New Frontier in Malware Prevention and Detection

Companies devote around 90 percent of their cybersecurity resources to prevention and detection. Through regular patching and other basic prevention …

Cybersecurity

Déjà Vu All Over Again – Russian Active Measures

Reviewing the current discourse surrounding the use of social networks by Russia, one cannot help but have a sense of déjà vu, as the tried and true …

Russia

New Triton Malware Framework Attacks Critical Infrastructure

Security researchers have come across new malware designed to infect specialized safety controllers used in industrial infrastructure, in what is …

Cybersecurity

What to Expect in Data Privacy Trends for 2018

As an incurable risk taker, I risk sounding like the Grinch. ‘Tis the season of predictions, and it is so so easy to predict “more of the same” when …

Online Privacy

Global Traffic to High-Profile Sites Believed Hijacked

Global internet traffic to IP addresses belonging to Google, Facebook, Microsoft, Apple and other high-profile tech companies was rerouted Tuesday …

Information Security

Many Websites Vulnerable to 19-Year-Old TLS Decryption Attack

Many websites, firewalls and load balancers are vulnerable to an attack that can allow hackers to decrypt TLS traffic between them and users or to …

Information Security