Trend Micro Security 16 – DLL Search-Order Hijacking and Potential Abuses (CVE-2019-15628) December 2, 2019 Hugh Taylor Off Cyber Policy in the News, Trend Micro Security 16 - DLL Search-Order Hijacking and Potential Abuses (CVE-2019-15628) Trend Micro Security...
Autodesk Desktop Application – Privilege Escalation to SYSTEM (CVE-2019-7365) December 2, 2019 Hugh Taylor Off Cyber Policy in the News, Autodesk Desktop Application - Privilege Escalation to SYSTEM (CVE-2019-7365) Autodesk Desktop Application - Privilege Escalation...
Kaspersky Secure Connection – DLL Preloading and Potential Abuses (CVE-2019-15689) December 2, 2019 Hugh Taylor Off Cyber Policy in the News, Kaspersky Secure Connection - DLL Preloading and Potential Abuses (CVE-2019-15689) Kaspersky Secure Connection - DLL...
Tiny alterations in training data can introduce “backdoors” into machine learning models December 2, 2019 Hugh Taylor Off Cyber Policy in the News, Tiny alterations in training data can introduce "backdoors" into machine learning models In TrojDRL: Trojan...
Firewalls in 2020: Tension Between Complexity and Policy December 2, 2019 Hugh Taylor Off Articles and Opinion, Featured, Firemon’s sixth annual State of the Firewall Report reveals a segment of IT management and...
State of Hybrid Cloud 2019 December 2, 2019 Hugh Taylor Off Cyber Security Research, State of Hybrid Cloud 2019 This report reveals new findings from surveying more than 400...
Why Cybersecurity Needs To Focus More On Customer Endpoints December 2, 2019 Hugh Taylor Off Cyber Security Research, Why Cybersecurity Needs To Focus More On Customer Endpoints Gartner predicts that Global Information Security...
FireEye research reveals 51% of organisations don’t believe they’re ready for cyberattack | | Intelligent CIO Europe December 2, 2019 Hugh Taylor Off Cyber Security Research, FireEye research reveals 51% of organisations don't believe they're ready for cyberattack | | Intelligent...
Crypto 2020: Security Trends Next Year and Beyond December 1, 2019 Hugh Taylor Off Cyber Security Research, Crypto 2020: Security Trends Next Year and Beyond âThe weakest link in the cryptocurrency system...
Enterprise IoT: Pushing security to the edge December 1, 2019 Hugh Taylor Off Cyber Security Research, Enterprise IoT: Pushing security to the edge Kirk Wolfe, VP of Corporate Development, Kollective, discusses...