Six System and Software Vulnerabilities to Watch Out for in 2019

Wouldn’t it be an easier life if we didn’t have to worry about the exploitation of vulnerabilities in solutions and software on which we have spent good time and resources? A world where correctly configured systems configured were left alone to perform their functions until they became redundant and/or needed replacing?

Source: tripwire Continue reading “Six System and Software Vulnerabilities to Watch Out for in 2019”

Ask the Experts: What Will Have the Greatest Impact on ICS Security in the Next 5-10 Years?

As we noted in August 2018, industrial control system (ICS) security has become more complicated since the introduction of the web. Organizations are now bringing together the logical and physical resources of both information technology (IT) and operational technology (OT). This creates various ICS securitychallenges, including how each team must learn from and work with the other in the interest of preserving the organization’s security as a whole.

Source:tripwire Continue reading “Ask the Experts: What Will Have the Greatest Impact on ICS Security in the Next 5-10 Years?”

How Will Brexit Affect Cybersecurity for UK Organizations?

As a vendor, Tripwire gets asked a lot of questions from customers and potential clients about how developments in the wider world might affect digital security. One of those forces that’s on everyone’s mind is Brexit. Representatives from some of our potential customers as well as our existing clients are asking us what to focus on and what to do. Specifically, they’re wondering

Source: tripwire Continue reading “How Will Brexit Affect Cybersecurity for UK Organizations?”

Research Memory access integrity: detecting fine-grained memory access errors in binary code

Abstract

As one of the most notorious programming errors, memory access errors still hurt modern software security. Particularly, they are hidden deeply in important software systems written in memory unsafe languages like C/C++. Plenty of work have been proposed to detect bugs

Continue reading “Research Memory access integrity: detecting fine-grained memory access errors in binary code”

Blog at WordPress.com.

Up ↑