AvatarJeff WilliamsFlipboardIcon version of the Flipboard logoOhio becomes first state to release vulnerability policy for election-related websitescyberscoop.com - Sean LyngaasOhio’s secretary of state has established guidelines for security experts to find and help fix software flaws in the state’s election-related …
AvatarJeff WilliamsAvatarAvatarSecurity bugs let these car hackers remotely control a Mercedes-Benzverified_publisherTechCrunch - Zack WhittakerFew could ever forget back in 2015 when security researchers Charlie Miller and Chris Valasek remotely killed a Jeep’s engine on a highway with a Wired reporter at the wheel. Since then, the car hacking world has bustled with security researchers looking to find new bugs — and ways to exploit them — …
AvatarJeff WilliamsAvatarAvatarUniting for better open-source security: The Open Source Security Foundationverified_publisherZDNET - Steven Vaughan-NicholsWe can make open-source software safer and more secure when we all work together. Eric S. Raymond, one of open-source's founders, famously said, …
AvatarJeff WilliamsFlipboardIcon version of the Flipboard logo'Hidden Property Abusing' Allows Attacks on Node.js Applicationsdarkreading.com - Robert Lemos, Contributing WriterA team made up of security researchers from the Georgia Institute of Technology has found a way to exploit Node.js applications by manipulating the …
AvatarJeff WilliamsFlipboardIcon version of the Flipboard logoCtF | AppSecVillageappsecvillage.comPlay our CTF^2 and Win 🏆 Galore Welcome to CTF^2! AppSec Village is proud to present our official DEF CON CTF Contest. This competition's goal is to …
AvatarJeff WilliamsFlipboardIcon version of the Flipboard logoApplication Security Jumps to the Top of the CISO’s List of Prioritiescontrastsecurity.com - Contrast SecurityTune in with us on July 17, 2020 @ 10 AM PT | 1 PM ET for a special moderated webinar that will feature insights from a CISO practitioner seasoned …
AvatarJeff WilliamsAvatarAvatarLinux team approves new terminology, bans terms like 'blacklist' and 'slave'verified_publisherZDNET - Catalin CimpanuLinux creator Linus Torvalds puts stamp on proposal to use neutral language in kernel code and documentation. Linus Torvalds approved on Friday a new …
AvatarJeff WilliamsAvatarAvatarMySQL drops master-slave and blacklist-whitelist terminologyverified_publisherZDNET - Catalin CimpanuEngineering teams update internal terminologies all over the tech world. Latest examples include Twitter, JP Morgan, and Splunk. Developers behind the …
AvatarJeff WilliamsFlipboardIcon version of the Flipboard logoInfosec community debates changing ‘Black Hat’ terminologyverified_publisherDigital Trends - By Georgina TorbetA Google security researcher has chosen to withdraw from speaking at the Black Hat security conference this year and has asked the information …
AvatarJeff WilliamsFlipboardIcon version of the Flipboard logoHow Unconventional Professional Backgrounds Can Strengthen a Cybersecurity Teamdarkreading.com - Ericka Chickowski, Contributing WriterIf you dig into the rosters of many successful cybersecurity teams — be they enterprise organizations, vendors, or service providers — more often …
AvatarJeff WilliamsFlipboardIcon version of the Flipboard logoWhy Agile & DevOps Demand New Approaches to Securing Applicationscontrastsecurity.com - Contrast SecurityJoin us to learn how to take a new approach to identifying and establishing workflows to build a strong security posture with Comcast's Distinguished …