2018 might well be a year Intel would like to forget, especially where its processors are concerned. It has now revealed that millions of its chips have yet another flaw, which could potentially be used by malware to steal sensitive data.
Maybe not, says Twitter’s former CISO, but there are risks with Facebook's move from a centralized to a distributed security model in the wake of Alex Stamos's departure.
Chief security officers should play a key role in building trust with customers, and that translates to better customer acquisition, greater customer loyalty, and more revenue.
Whether you need a pentesting team, a bug bounty program, or a vulnerability disclosure plan, several crowdsourcing platforms can take the risk and pain from the process.
Reveals how the infamous Trojan has evolved into a complex malware capable of delivering multiple attack payloads such as Banking Trojans.