Your browser does not support JavaScript or it may be disabled!
 India As It Happens
Rediff Labs will showcase innovative products that rediff is working on behind the scenes.
News   |   Images
Get Realtime News
on your webpage

About 181 results for "chris wysopal"

Former L0pht man 'Mudge' leaves Google for Washington

Mudge, a once-feared and now-respected member of the "L0pht" hacker collective, is headed to Washington to set up a software version of Underwriters' Laboratory. While it's not yet clear exactly how the once-famed L0pht member, real name Peiter ... The Register, 2 days ago

5 images for chris wysopal, 1 week ago
Dominion Post, 5 days ago, 3 months ago
TechCrunch, 4 months ago
I Stock Analyst, 4 months ago

Government ranks bottom for app security, financial services on top

Security in the Modern World: The ITProPortal Report free todownload now: Web and mobile applications produced or used by government are the least likely to adhere to standard security policies such as OWASP Top 10 when initially ...
 ITProPortal.com4 days ago Cyber-Security Is a Top Priority in Corporate Boardrooms  EWeek1 month ago

Software developers aren't implementing encryption correctly

Lack of specialized training for developers and crypto libraries that are too complex lead to widespread encryption failures Despite a big push over the past few years to use encryption to combat security breaches, lack of expertise among ...
 Computerworld1 week ago Software developers are failing to implement crypto correctly, data reveals  CSO AU1 week ago Software Developers Failing to Implement Crypto Correctly, Data Reveals  Individual.com4 days ago Software devs failing to implement crypto correctly  TechCentral.ie4 days ago

In 1998, hackers warned that internet would become a security disaster

This story is the second of a multi-part project on the internet's inherent vulnerabilities and why they may never be fixed. Part 1: Part 2: The seven young men sitting before some of Washington DC's most powerful lawmakers weren't graduate students ... week ago 'LOpht' and the inherent vulnerabilities of the internet  The Interpreter1 week ago
Computerworld Hong Kong

Security in Government Applications Going by the Wayside

Considering that the government may be not only one of the biggest holders of personally-identifiable informatio n, but perhaps the biggest issuer of such information, it's not hard to see where people would prefer that that information be safe. A ...
 TMC Net1 week ago The government is falling behind on application security  CIO Australia1 week ago

Older programming setback

Reliance on outdated programming languages has hamstrung government security, according to the IT security company Veracode's 2015 State of Software Security Report. That study is divided into seven vertical markets government, financial services, ...
 Professional Security1 week ago Code Reuse Propagates Security Flaws  Data Center Journal1 week ago Developers are copying security defects to your software, scientists warn CNET  NewsListOnline1 week ago Programmers are copying security flaws into your software, researchers warn  CNET News1 week ago
Business Insider

EXCLUSIVE: Mammoth federal hack part of broader campaign against the U.S., experts say

The spectacular hacking assault on the federal government's Office of Personnel Management is just part of a broader, systematic campaign against the most valuable U.S. cyber-assets, public and private, that is ongoing and likely includes operations ...
 FOXNews.com1 week ago This latest cyberattack is 'an extremely urgent situation,' expert says  Business Insider4 weeks ago The federal government was hacked and experts are both frightened and unsurprised  BusinessInsider.sg4 weeks ago
Information Age

Britain is paying the price of cybercrime

Lost revenue is just one part of the story. Loss of reputation or brand damage poses a serious threat to companies The past few years have seen a staggering increase not only in the number of instances of cybercrime but also in severity. This is in ...
 Information Age1 week ago

Government Remediates Only a Quarter of All Vulnerable Apps

Web and mobile applications produced or used by government organizations are more likely than those in other industries to fail standard security policies. Veracode's 2015 State of Software Security report has revealed that government ...
 Infosecurity Today1 week ago Study: government compliance-based vulnerability remediation is failing  SearchSecurity.com1 week ago Government Sector Ranked Last in Remediating Web and Mobile Application Vulnerabilities  Securities Technology Monitor1 week ago Cybersecurity threat discussion (finally) in boardroom  SearchSecurity.com1 month ago
Information Age

How the fight against cybercrime is transforming 21st century policing

The new world of cybercrime has clearly been acknowledged, but continued investment in this area must be a priority if the police are to stay one step ahead of hackers In an increasingly digitised world, people face a new threat and a new breed of ...
 Information Age1 week ago Cybersecurity on the agenda for 80 percent of corporate boards  Network World Asia4 weeks ago Cybersecurity strategies and the boardroom  Net Security1 month ago
Prev | Next
Personalize your Realtimeclose [x]
Add content to your personalized tab - My News
Add upto 6 topics of your interest:
for eg.2g Scam , World
Personalize the tabs display. ( You can add or remove the tabs )
AlertsGet updates on latest news & your favourite topics right in your inbox.Set an Alert|Manage your Alerts


Realtime News

on your Webpage

Add Widget >Get your members hooked!
Get updated on latest news & your favorite topics right in your inbox!
More     Less