How many cloud-based applications are running in your environment? Probably more than you think, if the results of a new survey of IT and security professionals released last week by the Cloud Security Alliance (CSA) are any indication.
- By John K. Waters
The 25-year-old flaw, which was just discovered on Wednesday, leaves systems running Linux and Mac OS X open to remote code execution attacks.
The remaining members will be absorbed into Cloud & Enterprise and Legal and Corporate Affairs groups.
The retirement of support for Windows Server 2003 will be one of the most important of the predictable security issues of 2015.
- By Scott Bekker
The pulled item marks the third month in a row in which Microsoft has had to address issues with its monthly security update.
The tech company said it was fined $250,000 per day for not handing over requested user data.
This month's offering includes one "critical" and three "important" bulletins that look to fix 42 different flaws.
Your organization's security plans are only as good as those that are willing to enforce it.
Microsoft has an evolving plan to help organizations address their legacy Internet Explorer support problems, but it only goes so far.
The issues could ultimately lead to a system being caught in a crash/reboot loop.
This moth's Security Update addresses a total of 37 flaws.
Microsoft's new security protection feature for Internet Explorer that blocks older installations of ActiveX will now start to take effect on Sept. 9, instead of the earlier announced Aug. 12 date, and it will only block Oracle Java ActiveX for now.
Microsoft wants organizations and individuals to use the latest Internet Explorer versions, so much so that it announced some new policy changes today.
Plus: Researchers create unlock key to reverse high-profile ransomware "CryptoLocker."
Microsoft plans to add ActiveX blocking capabilities into certain versions of its Internet Explorer browsers on Aug. 12.
This week's incident highlights the need for a change in attitudes relating to corporate security.
The study took a look at 16 multinational enterprises in the first half of 2014 to map out what the top trouble areas for IT are.
The latest version adds two new mitigation features and support for 64-bit systems.
Since Edward Snowden first revealed major cloud companies' cooperation with the NSA's covert surveillance, Microsoft and other vendors have been fighting hard to restore their image through public measures to protect users' privacy. While Redmond readers respect the effort to varying degrees, they're taking their own countermeasures.
When it comes to enterprise security, you're not paranoid -- everyone is out to get you.