Threatpost

@threatpost

Threatpost is the first stop for fast-breaking security news, conversations and analysis from around the world.

Vrijeme pridruživanja: siječanj 2009.

Medijski sadržaj

  1. 23. sij

    Are you impacted? -Check if your FMC Software is configured to authenticate users of the web-based management interface via an external LDAP server -Check if external authentication using an LDAP server is configured on the device (System > Users > External Authentication)

    Prikaži ovu nit
  2. 22. sij

    Respondents in the poll were split about the right amount of time that’s appropriate to release PoC code after a flaw has been disclosed (See the chart below for the breakdown).

    Prikaži ovu nit
  3. 21. sij

    TOMORROW: Join our free Threatpost webinar as a panel of experts discuss risk and share their top 8 best practices: Register >>

  4. 21. sij

    Don't miss our webinar tomorrow where a panel of experts from and will discuss the 8 best mobile app practices: Register today >>

  5. 19. sij

    A panel of experts will discuss the top 8 best application development practices in our upcoming webinar. Comment your own best practices below. REGISTER TODAY >>

  6. 18. sij

    In the rush to create a popular app, can become an afterthought. Join our Threatpost webinar to hear the top 8 best development security practices. REGISTER TODAY >>

  7. 13. sij

    can become an afterthought in app development. Our upcoming Threatpost webinar will list out the top 8 best practices. REGISTER TODAY >>

  8. 10. sij

    A panel of experts will discuss the top 8 best application development practices in our upcoming webinar. Comment your own best practices below. REGISTER TODAY >>

  9. 10. sij

    The California Consumer Privacy Act has been adopted, but the strictest U.S. regulation still comes with challenges.

  10. 9. sij

    In the rush to create a popular app, can become an afterthought. Join our Threatpost webinar to hear the top 8 best development security practices. REGISTER TODAY >>

  11. 17. pro 2019.

    During our tomorrow, a panel of experts will discuss the rules of engagement for third-party contractors and how to handle supply-chain risks. One day left to register! >>>

  12. 16. pro 2019.

    During our upcoming Threatpost webinar, we'll discuss risks around third-party vendors with a panel of experts, including Dr. Larry Ponemon of , Harlan Carvey with and Lance James with . REGISTER>

  13. 6. pro 2019.

    In the past week, authorities have cracked down on Evil Corp., money mules, and other groups.

  14. 5. pro 2019.

    has paid out $20,000 to a bounty hunter who discovered a session cookie issue, due to “human error,” on the platform.

  15. 5. pro 2019.

    Hundreds of thousands of phone bills for AT&T, Verizon and T-Mobile subscribers were exposed to anyone with an internet connection, thanks to the oversight of a contractor working with .

  16. 5. pro 2019.

    A related Thursday report shed some light on the lavish lifestyle of Yakubets, who drives a customized Lamborghini supercar with a personalized number plate that translates to “Thief.”

    Prikaži ovu nit
  17. 4. pro 2019.

    We talked to the about how is being tracked on the web and mobile devices, how consumers can protect themselves – and why it’s not all bad news.

  18. 4. pro 2019.

    Risk around third-party vendors can lead to disasters. Join our Threatpost webinar as we discuss managing third-party risks with experts Dr. Larry Ponemon of Ponemon Institute, Digital Guardian's Harlan Carvey and Flashpoint’s Lance James. REGISTER:

  19. 3. pro 2019.

    The Department of Homeland Security plans to extend facial recognition checks to all travelers entering and leaving the U.S. – including previously-exempt U.S. citizens.

  20. 2. pro 2019.

    The U.S. government’s agency issued a draft directive mandating all agencies to develop disclosure policies, which would give ethical hackers clear guidelines for submitting bugs found in government systems.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·