API Security News

These are the news items I've curated in my monitoring of the API space that have some relevance to the API security conversation and I wanted to include in my research. I'm using all of these links to better understand how the space is security (or not) their API infrastructure, and addressing the biggest problem we face online today.

Title Source Visit
Why Startups Need an API (2012-04-21) tune.com
Why Exposed API Keys and Sensitive Data are Growing Cause for Concern (2015-01-05) www.programmableweb.com
Gogo issues fake security certificates to block in-flight streaming (2015-01-05) gigaom.com
Companies Are Freaked Out About Cybersecurity And Plan To Spend A Lot More On It This Year (2015-01-06) www.businessinsider.com
Millions of Moonpig customers have private details exposed in security leak | Metro News (2015-01-06) metro.co.uk
Attributing the Sony Attack (2015-01-07) www.schneier.com
What We Learned From The Moonpig Website Bug (2015-01-07) www.techweekeurope.co.uk
Avoid Pulling a Moonpig by Security Testing Your API (2015-01-08) blog.smartbear.com
The era of third-party apps is ending, as security risks prompt WhatsApp and Snapchat to shut down their APIs | PandoDaily (2015-01-22) pando.com
Cisco WebEx Meetings Server Authentication Bypass Vulnerability (2015-01-23) tools.cisco.com
FTC to connected device makers: Focus on security and privacy (2015-01-27) www.engadget.com
?Verizon launches security certificate service for IoT (2015-01-28) www.zdnet.com
BBC News - Cybersecurity: Tech firms urged to share data with US (2015-02-13) www.bbc.com
Embedding a ?Culture of Security? Is the Best Defense (2015-02-16) knowledge.wharton.upenn.edu
Kaspersky Lab reveals spyware on the world?s most popular hard drives, suspects the NSA (2015-02-17) thenextweb.com
Seattle Privacy Coalition Seattle Privacy Coalition - Individual privacy - Institutional transparency (2015-02-17) www.seattleprivacy.org
(2015-02-18) securitycafe.ro
IRS Encourages Poor Cryptography (2015-02-18) www.schneier.com
Using Google Cloud Platform for Security Scanning (2015-02-19) cloudplatform.googleblog.com
OAuth for Intuit demystified (2015-02-19) developer.intuit.com
The need for contextual information within multifactor authentication (2015-02-19) www.logintc.com
Using Google Cloud Platform for Security Scanning (2015-02-20) security.googleblog.com
Googles new CAPTCHA security login raises legitimate privacy concerns (GOOG) (2015-02-20) www.businessinsider.com
Two-Factor Authentication: What You Need to Know (2015-02-20) www.janrain.com
Ahoy Authy: Welcome Authy To The Twilio Family (2015-02-23) www.twilio.com
Google Tool Scans App Engine Apps for Security Vulnerabilities (2015-02-23) www.programmableweb.com
Two-factor authentication service Authy has been acquired by Twilio (2015-02-24) thenextweb.com
Twilio buys Authy, gaining the startups two-factor authentication API (2015-02-24) www.zdnet.com
Chip firms put security center stage for the internet of things (2015-02-24) gigaom.com
Every business needs to know about data protection (2015-02-24) messente.com
Twilio Makes Its First Acquisition?Scoops Up Authy To Help Deliver Secure Comms (2015-02-24) www.diversity.net.nz
Building With Authy And Twilio: Keeping Conversations Open And Security Gaps Closed (2015-02-24) www.twilio.com
Twilio buys two-factor authentication shop to boost security (2015-02-24) gigaom.com
Twilio Makes Its First Acquisition--Scoops Up Authy To Help Deliver Secure Comms - Forbes (2015-02-24) www.forbes.com
Twilio Acquires Authy to Drive Two-Factor Authentication Adoption (2015-02-25) www.programmableweb.com
Bits Blog: Privacy Group Files F.T.C. Complaint Against Samsung?s Voice-Operated TVs (2015-02-25) bits.blogs.nytimes.com
Bits Blog: Privacy Group Files F.T.C. Complaint Against Samsung?s Voice-Operated TVs (2015-02-25) bits.blogs.nytimes.com
Everyone Wants You To Have Security, But Not from Them (2015-02-26) www.schneier.com
Octopart goes HTTPS (2015-02-26) blog.octopart.com
Let?s Declare GPG a Dead End for Encrypted Email (2015-02-26) moxie.org
Does Venmo have a security problem? (2015-02-27) www.theverge.com
Uber security breach potentially exposes 50,000 drivers? private information (2015-02-27) thenextweb.com
Stumbling Upon an Uber Vulnerability (2015-02-27) hackaday.com
Protecting data on AWS cloud using powerful encryption techniques (2015-02-27) www.concur.com
Uber discloses data breach that may have affected 50,000 drivers (2015-02-27) gigaom.com
Data Security Is Becoming the Sparkle in Bitcoin (2015-03-01) www.nytimes.com
Data Security Is Becoming the Sparkle in Bitcoin (2015-03-01) www.nytimes.com
Microsoft Azure Network Security Whitepaper version 3 is now available (2015-03-02) azure.microsoft.com
Venmo still hasn?t apologized for ? let alone addressed ? its security issues (2015-03-02) pando.com
Significant Data Breaches ? February 2015 (2015-03-03) ikanow.com
Two-Factor Authentication with LoopBack (2015-03-03) strongloop.com
A How-to Guide to OAuth API Security (2015-03-03) knowledgehubmedia.com
Tempered Networks wants to secure critical infrastructure so hacks don?t lead to sewage spills (2015-03-03) gigaom.com
Google Backs Away from Default Lollipop Encryption (2015-03-03) www.schneier.com
Why Security Awareness Alone Wont Stop Hackers (2015-03-03) www.darkreading.com
Messente launches 2-step verification API (2015-03-04) messente.com
Techniques and Technologies to Increase API Security (2015-03-04) nordicapis.com
The API Briefing: Practicing Safe App Development with Secure Federal APIs (2015-03-04) www.digitalgov.gov
Adobe Launches Web Application Vulnerability Disclosure Program on HackerOne (2015-03-04) blogs.adobe.com
Passwordless SMS Authentication: Part 2 ? Building iOS Front End With Swift (2015-03-04) www.twilio.com
Looking at the Different OAuth2 Flows Supported in AzureAD for Office 365... (2015-03-04) www.andrewconnell.com
Connected Car Security (2015-03-05) www.carvoyant.com
ACE Consortium Looks to Simplify Mobile App Configuration and Security (2015-03-05) www.programmableweb.com
FREAK: Security Rollback Attack Against SSL (2015-03-06) www.schneier.com
As FTC adds encryption to its website, government remains unsure on corporate use (2015-03-06) gigaom.com
Data and Goliaths Big Idea (2015-03-06) www.schneier.com
Fridge caught sending spam emails in botnet attack (2015-03-06) www.cnet.com
Venmo fixes well-publicized security hole (2015-03-09) pando.com
API Security Breaches in the News (2015-03-09) www.apiacademy.co
Identifying When Someone is Operating a Computer Remotely (2015-03-09) www.schneier.com
White House moves WhiteHouse.gov to HTTPS by default, tying privacy to security (2015-03-10) e-pluribusunum.org
Securing Web.API Requests With JSON Web Tokens (2015-03-10) www.codeproject.com
Venmo adds two-factor authentication and email alerts after security criticism (2015-03-10) www.theverge.com
Blacklisting JSON Web Token API Keys (2015-03-10) auth0.com
Messente Announces 2-Step Verification API for Mobile Authentication (2015-03-11) www.programmableweb.com
IBM uncovers severe vulnerability in Dropbox SDK for Android (2015-03-11) www.zdnet.com
MetaCert steps out from behind its porn-blocking browsers with mobile security API (2015-03-11) pando.com
Health data breaches and fines (2015-03-12) flowingdata.com
New ? Amazon CloudFront Signed Cookies for Private Content (2015-03-12) aws.amazon.com
IBM Discloses Discovery of Dropbox SDK Vulnerability (2015-03-12) www.programmableweb.com
HDMI Splitter is also a Decrypter (2015-03-12) hackaday.com
Report: 71 percent of orgs were successfully attacked in 2014 (2015-03-12) www.scmagazine.com
New ? AWS API Activity Lookup in CloudTrail | AWS Official Blog (2015-03-12) aws.amazon.com
Threats to Information Integrity (2015-03-13) www.schneier.com
Facebook Releases ThreatExchange API Documentation (2015-03-13) www.techinvestornews.com
Testing MetaCert?s Security API Service (2015-03-14) www.raymondcamden.com
API security takes myriad forms (2015-03-14) pages.questexweb.com
Iron.io Releases Enhanced Security Package ? IP Whitelisting, VPN, and VPC Support (2015-03-16) www.iron.io
Increasing application security with mobile phone authentication (2015-03-16) thenextweb.com
For Public Comment: the HTTPS-Only Standard (2015-03-16) 18f.gsa.gov
Healthcare Security/Privacy: What is MHD beyond XDS-on-FHIR? (2015-03-16) healthcaresecprivacy.blogspot.com
Premera Blue Cross Says Data Breach Exposed Medical Data (2015-03-17) www.nytimes.com
Premera Blue Cross Says Data Breach Exposed Medical Data (2015-03-17) www.nytimes.com
The HTTPS-Only Standard (2015-03-17) https.cio.gov
Migrating APIs to HTTPS (2015-03-17) https.cio.gov
How to harden your enterprise APIs (2015-03-18) developer.ibm.com
Can Your Home Be Hacked? (2015-03-18) www.remodeling.hw.net
1 billion pieces of Personally Identifiable Information leaked in 2014 (2015-03-18) www.itproportal.com
Mandrill warns attack may have exposed some data about email (2015-03-18) www.networkworld.com
New Security Mindset: Focus On The Interior (2015-03-18) www.darkreading.com
Push notifications get end-to-end encryption with Kwikdesk?s CryptoShift (2015-03-20) thenextweb.com
Reminder to migrate to OAuth 2.0 or OpenID Connect (2015-03-20) developers.googleblog.com
Schneier on Security: New Paper on Digital Intelligence (2015-03-21) www.schneier.com
Randall Degges - Why I Love Basic Auth (2015-03-23) www.rdegges.com
How Apple Pay exposes security flaws in banking (2015-03-24) thenextweb.com
NopSec Updates Unified Vulnerability Management Service (2015-03-24) www.itbusinessedge.com
Bizcoder - Are You Or Your Customers Leaking Your API Keys? (2015-03-24) www.bizcoder.com
Phishing And the .gov TLD (2015-03-24) blog.trendmicro.com
How Is Tokenization Different Outside The U.S.? (2015-03-25) www.bluepay.com
Study: Half of app makers spend $0 on security (2015-03-25) venturebeat.com
Capabilities of Canadas Communications Security Establishment (2015-03-25) www.schneier.com
HTTP vs HTTPS: Is it Time For a Change? (2015-03-25) www.digitalgov.gov
Even more unwanted software protection via the Safe Browsing API (2015-03-25) security.googleblog.com
Authentication Using JSON Web Token (2015-03-26) www.codeproject.com
Researcher shows a ridiculously easy way to hack into smart bracelets like Fitbits (2015-03-26) www.businessinsider.com
Tinder API Hack Leaves Unsuspecting Men Hitting on Each Other (2015-03-26) www.programmableweb.com
Google Announces Safe Browsing API (2015-03-26) www.programmableweb.com
How I hacked my smart bracelet (2015-03-26) securelist.com
Why aren?t law firms required to disclose when they?ve been hacked? (2015-03-27) pando.com
Slack reveals security breach and institutes two-factor authentication (2015-03-27) thenextweb.com
Slack discloses its user database was hacked, but only after turning on two-factor authentication (2015-03-27) venturebeat.com
How This Federal Data Breach Law Could Actually Hurt Consumers (2015-03-27) www.huffingtonpost.com
The Regrettable Reason Why SSO Users Have To Be Forcibly Signed-out on Mobile (2015-03-27) slackhq.com
Last night, GitHub was hit with massive denial-of-service attack from China (2015-03-27) www.theverge.com
Slack confirms security breach, intros two-factor authentication (2015-03-27) www.zdnet.com
Is Continuous Security Part of Tinder?s API Strategy? (2015-03-27) blog.smartbear.com
Slacks security breach may be worse than its letting on (2015-03-27) www.businessinsider.com
Slack reveals February data breach (2015-03-27) pando.com
2-Factor Authentication ? Applying IT Governance Policies in the Cloud (2015-03-27) blog.profitbricks.com
How This Federal Data Breach Law Could Actually Hurt Consumers (2015-03-27) www.huffingtonpost.com
Why data breaches need their own Richter scale (2015-03-29) venturebeat.com
The Internet of Things will create a lot of security vulnerabilities ? here are ways companies can start tackling these issues (2015-03-30) www.businessinsider.com
Introducing Lookup: Fight Fraud, Improve Deliverability, and Use Local-Friendly Number Formats (2015-03-31) www.twilio.com
Critical vulnerabilities in JSON Web Token libraries (2015-03-31) auth0.com
IEEE to Drive Industry Discussion on Safeguarding of Information in a Digital World (2015-04-01) www.businesswire.com
Critical Vulnerabilities Affecting JSON Web Token Libraries (2015-04-01) threatpost.com
Snapchat?s drastic security measures shut down entire ?Internet neighborhoods? on the service (2015-04-02) venturebeat.com
Verisign Openhybrid? Cloud Signaling API Specification (2015-04-02) whitepapers.businesscomputingworld.co.uk
TrueCrypt Security Audit Completed (2015-04-03) www.schneier.com
Why Your Favorite Snapchat Apps No Longer Work (2015-04-03) techcrunch.com
Significant Data Breaches ? March 2015 (2015-04-06) www.ikanow.com
Forum Sentry API Selected by Hambs for Security Solution (2015-04-07) www.programmableweb.com
A new approach to visualizing threats (2015-04-07) blog.redcanary.coma-new-approach-to-visualizing-threats
Internet of Things devices lack fundamental security, study finds (2015-04-08) www.zdnet.com
Harnessing the full power of the Carbon Black API (2015-04-08) blog.redcanary.comharnessing-the-full-power-of-carbon-black-api
ATT To Pay $25M To Settle Investigation Into Three Data Breaches (2015-04-08) www.fcc.gov
Building device database and User Agent strings (2015-04-09) deviceatlas.com
FCC gets tough on ATT for data breach (2015-04-09) disruptiveviews.com
Akana Certifies APIs Against OWASP Top Ten Vulnerabilities (2015-04-10) www.programmableweb.com
Apple Mac OS X Rootpipe Hidden Backdoor API Patch (2015-04-11) threatpost.com
Chinas Great Cannon can intercept and redirect web traffic (2015-04-13) www.theverge.com
WordPress Releases Security Update for WP REST API Plugin (2015-04-13) www.programmableweb.com
Facebook Scrambles to Meet Security and Accessibility Needs (2015-04-13) www.programmableweb.com
Red Canary Python API Simplifies Carbon Black Data Access (2015-04-13) www.programmableweb.com
Chinas Great Cannon shoots down websites it doesnt like (2015-04-13) www.engadget.com
How to add SSL to your Heroku custom domain with SSLMate - Moncef Belyamani (2015-04-13) www.moncefbelyamani.com
Akamai Cloud Security Intelligence Provides Foundation for New Advanced, Data-driven Cloud Security Services (2015-04-14) www.akamai.com
Dropbox teams up with HackerOne for bug bounty program (2015-04-15) thenextweb.com
Transport Layer Security (2015-04-15) camfrogprocodeforfree.blogspot.com
Akamai Introduces Two New Managed Security Service Offerings to Kona Family of Cloud Security Solutions (2015-04-15) www.akamai.com
Kaspersky and Dutch Police Unveil a CoinVault Ransomware Removal Tool (2015-04-15) cointelegraph.com
Hacked Sony emails get a wider release with Wikileaks database (2015-04-16) mashable.com
TeamSnap Increases Security with New Password Policy (2015-04-20) blog.teamsnap.com
Securing The Internet of Things: Privacy, Data and Device Control (2015-04-20) konekt.io
Improving the security of our users on Wikimedia sites (2015-04-20) blog.wikimedia.org
SAIC Splunk as a Security Intelligence Platform (2015-04-21) blogs.splunk.com
Bits Blog: Smart City Technology May Be Vulnerable to Hackers (2015-04-21) bits.blogs.nytimes.com
IT Innovators: Creating a Free Web Service to Help Businesses and Individuals Know When They?ve Been Hacked (2015-04-22) windowsitpro.com
Microsoft expands its bug bounty programs to include Azure, Sway, and Project Spartan (2015-04-22) venturebeat.com
Security Breaches Lead to Bug Bounty Proliferation (2015-04-23) www.programmableweb.com
An Incredibly Insecure Voting Machine (2015-04-23) www.schneier.com
A Javascript-based DDoS Attack as seen by Safe Browsing (2015-04-25) googleonlinesecurity.blogspot.com
Algorithmia Security Bounty Program (2015-04-25) blog.algorithmia.com
Eight lessons learned hacking on GitHub Pages for six months (2015-04-26) ben.balter.com
Onc Must Clarify Roadmap Health Security Plan, Says Ehra (2015-04-26) healthitsecurity.com
How Government Healthcare Agencies Should Approach Their Vulnerabilities (2015-04-27) blogs.splunk.com
The History of Lockpicking (2015-04-27) www.schneier.com
New Tech to Watch: Automated Vehicle Occupancy Detection (2015-04-27) www.eff.org
Nice Essay on Security Snake Oil (2015-04-28) www.schneier.com
SendGrid infosec chief eats humble pie, admits email service hacked (2015-04-28) www.theregister.co.uk
The Case for Audio Monitoring on School Buses (2015-04-28) www.schoolbusfleet.com
A Day in the Life of a Stolen Healthcare Record (2015-04-29) krebsonsecurity.com
Threat Intelligence Collections in Enterprise Security 3.3 (2015-04-30) blogs.splunk.com
Appery.io Adds MetaCert Security API to App Building Platform (2015-05-01) www.programmableweb.com
SIGNIFICANT DATA BREACHES ? APRIL 2015 (2015-05-01) www.ikanow.com
API Security Deep Dive (webcast podcast) (2015-05-01) blog.apigee.com
The 10 Challenges of Securing IoT Communications (2015-05-04) www.pubnub.com
Time to say no to Lenovo? Still reeling from the Superfish scandal, Lenovo deals with another big security fail (2015-05-06) pando.com
What 700 TB of cyber threat data can do for you (2015-05-08) gcn.com
Verizon and the data breach report (2015-05-08) disruptiveviews.com
Google Patches API Explorer Clickjacking Vulnerability (2015-05-08) www.programmableweb.com
Secure Cloud Data Processing (2015-05-08) blogs.splunk.com
Who?s Scanning Your Network? (A: Everyone) (2015-05-10) krebsonsecurity.com
Were Deprecating HTTP And Its Going To Be Okay (2015-05-10) konklone.com
Stronger crypto, better security (2015-05-11) blog.fluxiom.com
Data Protection Complexity Grows Exponentially (2015-05-11) www.datamation.com
Monitoring and alerting for activities of expired user accounts (2015-05-11) blogs.splunk.com
Where Docker security may be headed (2015-05-11) opensource.com
Status on HTTPS as standard for ad delivery. We are ready, are you? (2015-05-12) blog.zanox.com
Equipping Your API With The Right Armor (2015-05-12) nordicapis.com
Amateurs Produce Amateur Cryptography (2015-05-12) www.schneier.com
Flying pigs and SSL in Varnish Cache Plus (2015-05-13) www.varnish-software.com
Google Moves Its Corporate Applications to the Internet (2015-05-13) blogs.wsj.com
OpenDNS Enforces Threat Intelligence at the Speed of Automatic (2015-05-13) blog.opendns.com
Part III: Gluu proposes free API Security Certification for Open Source community (2015-05-14) www.gluu.org
OpenDNS Creates Cloud Based Threat Intelligence API (2015-05-14) www.programmableweb.com
APIs: open up but stay secure (2015-05-14) blogs.ca.com
Necktie knots, formal languages and network security (2015-05-14) medium.com
OpenNetwork Adding Tools to Directory-Enabled App (2015-05-15) www.computerworld.com.au
OAuth 2.0 as the Solution for Three IoT Security Challenges (2015-05-15) www.gluu.org
FBI says researcher may have adjusted airplane controls from in-flight entertainment system (2015-05-16) www.theverge.com
Red Hat Survey Identifies Back-end Integration and Security as Top Challenges (2015-05-17) www.videobasedtutorials.com
St. Louis Federal Reserve Suffers DNS Breach (2015-05-18) krebsonsecurity.com
United Airlines Offers Frequent Flier Miles for Finding Security Vulnerabilities (2015-05-18) www.schneier.com
Advocates complain about the effect of Facebook?s Internet.org on privacy, security, and net neutrality (2015-05-19) pando.com
Akamai Releases Q1 2015 State of the Internet - Security Report (2015-05-19) www.akamai.com
Netflixs FIDO Guards Against Security Incidents (2015-05-19) www.infoq.com
More on Chris Roberts and Avionics Security (2015-05-19) www.schneier.com
Americans? Views on Privacy and Security (2015-05-20) www.pewinternet.org
The Logjam (and Another) Vulnerability against Diffie-Hellman Key Exchange (2015-05-21) www.schneier.com
Why the Current Section 215 Reform Debate Doesnt Matter Much (2015-05-22) www.schneier.com
Security vs privacy ? deadlock in Congress (2015-05-22) disruptiveviews.com
The Internet of Security Things (2015-05-22) lorimacvittie.sys-con.com
AWS Key Management Service Adds Support for Updating Key Aliases (2015-05-22) blogs.aws.amazon.com
The Body Cam Hacker Who Schooled the Police (2015-05-22) medium.com
Article: High Tech, High Sec.: Security Concerns in Graph Databases (2015-05-23) www.infoq.com
Don?t ask me about API security (2015-05-23) www.lorindabrandon.com
Pictures that Defeat Key Locks (2015-05-23) hackaday.com
Finding the right metrics to rate your security (2015-05-25) venturebeat.com
Securing Web APIs: The Basics with Node.js Examples (2015-05-25) resources.infosecinstitute.com
Story of the ZooKeeper Poison-Packet Bug (2015-05-25) www.schneier.com
Recent Breaches a Boon to Extortionists (2015-05-25) krebsonsecurity.com
IRS hacked, thieves made off with 100K taxpayers? data (2015-05-26) venturebeat.com
IRS says hackers have stolen personal data from over 100,000 taxpayers (2015-05-26) thenextweb.com
Race Condition Exploit in Starbucks Gift Cards (2015-05-26) www.schneier.com
Plane hacking exposes aviation industry (2015-05-26) disruptiveviews.com
Bits Blog: Security Researchers Start Effort to Protect ?Smart? Cities (2015-05-26) bits.blogs.nytimes.com
Security and access in the API age (2015-05-26) blogs.ca.com
Security Vulnerabilities in Docker Hub Images (2015-05-29) www.infoq.com
API Security in REST vs SOAP (2015-05-29) blog.smartbear.com
Google unveils Project Vault, a microSD card for storing sensitive data (2015-05-29) venturebeat.com
BeyondCorp - A New Approach to Enterprise Security (2015-05-29) static.googleusercontent.com
Accelops Enhances Its Integrated It Security Platform (2015-06-01) www.complianceweek.com
Mitigating the Top Five Common API Weaknesses (2015-06-01) blog.akana.com
Information Sharing in Financial Services Cybersecurity (2015-06-01) blog.domaintools.com
Chief Says I.R.S. Struggles to Stay Ahead of Online Attackers (2015-06-02) www.nytimes.com
The Onion on NSA Surveillance - Schneier on Security (2015-06-02) www.schneier.com
Guardly Announces Latest Software Release to Deliver Situational Awareness to Enterprise Security and Operations (2015-06-03) blog.guardly.com
Visa teams with FireEye for cyber-threat sharing program (2015-06-03) www.zdnet.com
Forum Systems API Gateway#039;s Security Architecture Leads to Top Recommendation (2015-06-03) www.programmableweb.com
Microsoft?s Azure App Service adds web vulnerability scanning from Tinfoil Security (2015-06-03) venturebeat.com
API Usability and Security (2015-06-04) www.cert.org
Preventive, Proactive and Precise Healthcare Security through Data Informed Decisions (2015-06-04) blogs.splunk.com
US government data breach puts four million Federal employees at risk (2015-06-04) thenextweb.com
Feds Say That Banned Researcher Commandeered a Plane (2015-06-04) www.wired.com
US official on China hacking government database: This is deep (2015-06-05) www.businessinsider.com
Chinese Hacking of U.S. Data May Extend to Insurance Companies (2015-06-05) www.nytimes.com
Chinese Hackers Behind Breach at Insurers Are Also Responsible for Government Attack, Researchers Say (2015-06-05) www.nytimes.com
Officials: China Suspected of U.S. Data Breach Affecting Millions (2015-06-05) www.nbcnews.com
Data compromised by US federal agency hack reportedly spans three decades (2015-06-06) www.theverge.com
Menlo Security gets $25 million to isolate, and eliminate, malware (2015-06-08) pando.com
Keycloak and dagger: Securing your services with OAuth2 (2015-06-09) www.apiman.io
Snapchat makes logging in more secure with two-factor authentication (2015-06-09) www.theverge.com
How to implement SSL/TLS in Varnish Plus? (2015-06-09) www.varnish-software.com
Ancient DNS Weakness Puts Schools at Risk (2015-06-09) www.dnsmadeeasy.com
Should Companies Do Most of Their Computing in the Cloud? (Part 2) (2015-06-10) www.schneier.com
Security Officer (PCI DSS) - Moonpig.com job with Moonpig (2015-06-10) www.fish4.co.uk
Two-Step Verification (2015-06-10) www.socketlabs.com
Anatomy of A Real World API Security Breach (2015-06-10) www.programmableweb.com
Start-up fools hackers by giving them access to fake data (2015-06-10) disruptiveviews.com
Z-Wave Home Controller API Leaves Door Open To Hackers (2015-06-11) www.programmableweb.com
Adding a BASIC Authentication Policy to a Managed Service in JBoss apiman (2015-06-11) www.apiman.io
The long life of a quick ?fix? (2015-06-12) www.washingtonpost.com
Privacy and Data Security (2015-06-12) blogs.aws.amazon.com
Password Manager LastPass Warns of Breach (2015-06-15) krebsonsecurity.com
Bits Blog: LastPass Password Manager Acknowledges Breach (2015-06-15) bits.blogs.nytimes.com
LastPass was hacked, but notes ?vast majority? of users are safe (2015-06-15) thenextweb.com
Hack of cloud-based LastPass exposes hashed master passwords (2015-06-15) arstechnica.com
Hacked Fridges Aren?t the Internet of Things? Biggest Worry (2015-06-15) www.wired.com
Cover yourself up! Protecting your services with mutual auth (2015-06-16) www.apiman.io
Google expands security rewards to bugs in Android devices, starting with Nexus 6 and Nexus 9 (2015-06-16) venturebeat.com
Announcing Security Rewards for Android (2015-06-17) googleonlinesecurity.blogspot.com
Hacking Drug Pumps (2015-06-17) www.schneier.com
Password Manager LastPass Suffers Hacking Attack (2015-06-17) www.infoq.com
Verisign: Security Services (2015-06-18) ctovision.com
Your Firewall Is Weak: Here?s Why (2015-06-18) www.novell.com
Google Offers Bounty for Android Bugs (2015-06-19) www.programmableweb.com
In Case You Missed These: Recent AWS Security Blog Posts (2015-06-19) blogs.aws.amazon.com
Taking DevOps out of the Security Danger Zone (2015-06-22) blog.loadimpact.com
?Free? Proxies Aren?t Necessarily Free (2015-06-22) krebsonsecurity.com
PCI Compliance in the AWS Cloud (2015-06-22) blogs.aws.amazon.com
Secure Spike Engine Websockets with TLS/SSL (2015-06-23) www.codeproject.com
Two Tips for Protecting Cardholder Data and Your Business, Even Past EMV (2015-06-23) www.securenet.com
How to Receive Notifications When Your AWS Accounts Root Access Keys Are Used (2015-06-23) blogs.aws.amazon.com
Myfox Introduces Security Camera With Worlds First Privacy Shutter (2015-06-24) www.saherald.co.za
HackerOne raises $25M to make the Internet safer via bug bounty programs (2015-06-24) venturebeat.com
Snapchat Still May Not Be as Safe as You Think (2015-06-25) www.motherjones.com
App Security: The Elephant in the Cloudy Room (2015-06-25) lorimacvittie.sys-con.com
Dome9 Debuts Security Visualization for AWS CloudFormation Templates (2015-06-25) www.dome9.com
Cloud Security Open API Working Group Gets Underway ~ Converge!... (2015-06-27) www.convergedigest.com
New Open API Working Group hopes to tackle cloud security issues (2015-06-29) www.fiercecio.com
CLOUD SECURITY OPEN API: THE FUTURE OF CLOUD SECURITY (2015-06-29) blog.cloudsecurityalliance.org
White Paper: A New Approach to IoT Security (2015-06-29) www.pubnub.com
CSA Creates Open Cloud Security API Working Group (2015-06-29) www.programmableweb.com
Why should you care about securing your IoT devices? (2015-06-29) blog.atmel.com
CSA, CipherCloud look to standardise APIs for cloud access security brokerage (2015-06-30) www.businesscloudnews.com
Office of Personnel Management Data Hack (2015-07-01) www.schneier.com
Dropbox might soon offer you additional free storage space if you create a stronger password (2015-07-01) www.businessinsider.com
Dropbox could offer more free storage if users improve security on their accounts (2015-07-02) venturebeat.com
Securely Mobilizing Data with a REST API Backend (2015-07-02) blog.dreamfactory.com
Spotting vulnerabilities takes many eyes (2015-07-02) www.computerworld.com
Why Your Go-To Security Tools May Not Cover APIs (2015-07-04) www.programmableweb.com
Walking the IT Tightrope: Balancing Security and Client Needs in Professional Services (2015-07-06) www.box.com
Watch out for this incredibly easy way that rental cars can intercept your smartphone data (2015-07-06) www.businessinsider.com
SIGNIFICANT DATA BREACHES ? June 2015 (2015-07-06) www.ikanow.com
DataMotion Launches API Program to Enhance App Security (2015-07-08) www.programmableweb.com
New APN Competency ? Security (2015-07-08) aws.amazon.com
Chinese hackers stole the personal information of about 7% of America from the US government (2015-07-09) www.businessinsider.com
Amazon Glacier Introduces Vault Lock (2015-07-09) blogs.aws.amazon.com
Splunk Acquires Caspida: The Future in Advanced Breach Detection is Here (2015-07-09) blogs.splunk.com
Business Briefing: Online Attacks at UCLA Health Exposed 4.5. Million (2015-07-17) rss.nytimes.com
Researchers: HTC Stored User Fingerprints as Image File in Unencrypted Folder (2015-08-10) www.theguardian.com
Hacking A Phones GPS May Have Just Got Easier (2015-08-10) www.forbes.com
Oracles security chief made a big gaffe in a now-deleted blog post (ORCL) (2015-08-11) www.businessinsider.com
Adobe, MS Push Patches, Oracle Drops Drama (2015-08-11) krebsonsecurity.com
Oracle CSO to Customers: Leave the Vulnerabilities to Us (2015-08-11) hackaday.com
Track which federal websites are using HTTPS with Pulse (2015-08-11) sunlightfoundation.com
Dropbox now lets you log in with a USB key for universal 2nd factor authentication (2015-08-12) venturebeat.com
Introducing U2F support for secure authentication (2015-08-12) blogs.dropbox.com
Django-tastypie checking of csrf token in requests (2015-08-14) python.6.x6.nabble.com
Many Leading API Management Vendors are Not So Secure After All (2015-08-14) www.axway.com
IRS hacking much more extensive than previously thought (2015-08-18) disruptiveviews.com
Intel moves to make the Internet of Things more secure (2015-08-18) venturebeat.com
Facebook API Could Potentially be Used by Hackers to Harvest Users? Personal Data (2015-08-18) www.programmableweb.com
Data stolen from Ashley Madison posted online (2015-08-18) www.zdnet.com
Nasty Cisco Attack (2015-08-19) www.schneier.com
CloudLock Exposes Application Security Services via REST APIs (2015-08-19) www.programmableweb.com
Americans are concerned about smart home data breaches (2015-08-20) www.businessinsider.com
After Ashley Madison, here are some data breaches that could actually do some good (2015-08-23) venturebeat.com
The FTC can regulate companies with bad cybersecurity, court rules (2015-08-24) www.theverge.com
How to Help Prepare for DDoS Attacks by Reducing Your Attack Surface (2015-08-26) blogs.aws.amazon.com
The Challenges of Securing REST APIs | The Security Ledger (2015-08-29) securityledger.com
OpenUMA Product Page - User-Managed Access - ForgeRock (2015-08-29) forgerock.org
Subscribe to AWS Public IP Address Changes via Amazon SNS (2015-08-31) aws.amazon.com
Using Samsungs Internet-Enabled Refrigerator for Man-in-the-Middle Attacks (2015-08-31) www.schneier.com
Dropbox Bug Bounty Program: Best Practices (2015-08-31) blogs.dropbox.com
API Security gaining maturity, but don?t get complacent (2015-09-01) blog.akana.com
Significant Data Breaches ? August 2015 (2015-09-01) www.ikanow.com
Enable Self-Signed Certificates in Azure API Management Services | Riding the Cloud (2015-09-01) divineops.net
Using Login IP Ranges for Stronger User Security (2015-09-02) developer.salesforce.com
Security is real threat to IoT supported healthcare (2015-09-02) disruptiveviews.com
Need NIST Compliance in the AWS Cloud? AWS Compliance Has You Covered: NIST 800-171 (2015-09-03) blogs.aws.amazon.com
Google Calendar is getting a new, more secure URL (2015-09-03) venturebeat.com
Security and the Big Data Cyber Sleuth (2015-09-09) www.tibco.com
Cutting unwanted ad injectors out of advertising (2015-09-10) googleonlinesecurity.blogspot.com
OWASP ZAP DOT NET API - Enabling Automated Web Application Vulnerabilty Analysis / Security Testing (2015-09-10) www.codeproject.com
ReliableSite Launches API for Resellers and Developers (2015-09-11) www.benzinga.com
API security: Key takeaways from recent breaches - Thoughts On Cloud (2015-09-11) www.thoughtsoncloud.com
eBook Released: Securing the API Stronghold (2015-09-24) nordicapis.com
How API Gateways help to integrate with OAuth security models - part 3 (2015-09-24) www.nevatech.com
No, The IoT does not need strong privacy and security to flourish (2015-09-25) radar.oreilly.com
Hilton says its checking claims of hacking at hotels (2015-09-26) venturebeat.com
Register to Attend an AWS Security Roadshow (2015-10-16) blogs.aws.amazon.com
Is the app attack surface in the cloud really different than on-premises? (2015-10-18) lorimacvittie.sys-con.com
Advertising SDK Blamed For Stealing iPhone User Data (2015-10-19) www.programmableweb.com
Working with StrongLoop (Part Four) - Locking down the API (2015-10-21) www.raymondcamden.com
Firefox is testing marking any page that sends passwords over HTTP as insecure (2015-10-21) thenextweb.com
?Fitbit tracker hacked in 10 seconds (2015-10-22) www.cbsnews.com
A hacker has figured out how to hack into internet-connected kettles and steal passwords (2015-10-24) www.businessinsider.com
Surprised? Turns out, consumers don?t trust IoT security (2015-11-06) auth0.com
Dell does a Superfish, ships PCs with easily cloneable root certificates | Ars Technica (2015-11-23) arstechnica.com
Breach at IT Automation Firm LANDESK (2015-11-25) krebsonsecurity.com
The Ultimate Guide to Mobile API Security (2015-11-27) stormpath.com
Security startup Cymmetria hires former U.S. government cyber official Jim Christy (2015-11-28) venturebeat.com
Introducing Amazon Inspector (2015-11-29) www.infoq.com
IBM opens up QRadar APIs, launches security app exchange (2015-12-08) zdnet.com.feedsportal.com
Secure your Accounts ? Team Security Best Practices (2015-12-09) blog.serverdensity.com
Internet company Easily has been hacked (2015-12-10) www.businessinsider.com
77,000 Steam users are hacked every month. Here?s how Valve is fixing it (2015-12-10) thenextweb.com
When APIs and DevOps Meet Cybersecurity (2015-12-11) www.networkworld.com
Cisco unveils API that enables customers to customize vulnerability... (2015-12-14) www.fierceitsecurity.com
Attack Against DNS Root Servers (2015-12-15) www.schneier.com
How to Automatically Update Your Security Groups for Amazon CloudFront and AWS WAF by Using AWS Lambda (2015-12-15) blogs.aws.amazon.com
British police make arrest in hack that exposed info on 6 million minors (2015-12-15) www.theverge.com
Another Way to Remove Unnecessary Permissions in Your IAM Policies by Using Service Last Accessed Data (2015-12-16) blogs.aws.amazon.com
A HIV-Positive Dating App Leaked 5,000 Users Data (2015-12-16) www.buzzfeed.com
Target Faces Major Data Leak Just Two Weeks After Settlement for 2013 Breach (2015-12-17) www.programmableweb.com
Banks: Card Breach at Landry?s Restaurants (2015-12-17) krebsonsecurity.com
The FBI is investigating Junipers big, embarrassing security hole (2015-12-18) www.businessinsider.com
Clinton and Sanders are fighting about data because campaigns are bad at protecting it (2015-12-18) www.theverge.com
Introducing the Cisco PSIRT openVuln API (2015-12-18) blogs.cisco.com
Malware-Driven Card Breach at Hyatt Hotels (2015-12-23) krebsonsecurity.com
Significant Data Breaches ? December 2015 (2016-01-04) www.ikanow.com
Security Guide: How to Protect Your Infrastructure Against the Basic Attacker (2016-01-04) blog.mailgun.com
Securing an iOS App with 2FA Using Nexmo Verify SDK (2016-01-05) www.programmableweb.com
API security is not an afterthought (2016-01-05) blogs.ca.com
How Will Data Security Change in 2016 (2016-01-06) www.callfire.com
Intuit Announces Security Enhancements for Its Professional Tax Products (2016-01-06) news.sys-con.com
Securing APIs Using SecureDB Encrypted Identity Manager (2016-01-06) securedb.co
Amazon Web Services Signs Security Addendum with California DOJ (2016-01-06) www.techwire.net
Ukraine utility hacked, customers lose power (2016-01-07) disruptiveviews.com
Security as a Business Enabler (2016-01-07) blog.cloudpassage.com
Home security camera startup Canary says its first year sales were bigger than Fitbit, GoPro, and Dropcams first year combined (2016-01-08) www.businessinsider.com
Hacked Toy Company VTech: Let Us Monitor Your House (2016-01-08) motherboard.vice.com
An Add-on for OWASP ZAP to export alerts of a web application as... (2016-01-08) neatrick.wordpress.com
Analysis ? how hackers cut power in Ukraine (2016-01-11) disruptiveviews.com
Security Update: Everything?s Good, And Getting Better (2016-01-12) slackhq.com
D-Link Webcam Hack Turns IoT Device into Backdoor (2016-01-12) threatpost.com
Prediction #7: Internet of Things becomes a security nightmare (2016-01-13) www.cringely.com
Startup Afero Platform Addresses Internet of Things Communications Security (2016-01-13) www.infoq.com
US Spy Chiefs Personal Accounts Hacked (2016-01-13) www.securityweek.com
IBM acquires real-time analytics firm to combat payment fraud (2016-01-15) disruptiveviews.com
More than 300 Hyatt hotels were leaking customer credit card data (2016-01-15) thenextweb.com
Hyatt Card Breach Hit 250 Hotels in 50 Nations (2016-01-15) krebsonsecurity.com
Endpoint Detection Response (EDR) Evaluation Guide: 13 Questions You Need to Answer (2016-01-15) www.redcanary.co
MongoDB/NoSQL Injection - Security (2016-01-16) dzone.com
API enhancements for improved access control integrations (2016-01-18) www.prosecurityzone.com
Ripple + EFF: Open Approach to Security Will Define Next Chapter of Finance (2016-01-18) ripple.com
The FDA wants medical device creators to pay attention to cybersecurity (2016-01-19) www.theverge.com
Secure REST APIs from common attack vectors (2016-01-19) securedb.co
Simple approach to manage CORS in Asp.Net Web API (2016-01-19) www.codeproject.com
The Internet of Things sucks: Nest leaked home addresses (2016-01-20) thenextweb.com
CORS? Of Course! (2016-01-22) www.apiman.io
Cover yourself up! Protecting your APIs with mutual auth (2016-01-22) www.apiman.io
Storage of Records of Background Checks Shifted After Last Year?s Security Breach (2016-01-22) www.nytimes.com
Using Logs for Security Compliance: Part 1 (2016-01-22) blog.logentries.com
Princeton Finds Security Flaws In Range Of Internet Of Things Devices (2016-01-22) www.techtimes.com
Nest confirms its smart thermostat quietly leaked user data (2016-01-22) mashable.com
Internet of Things security is so bad, there?s a search engine for sleeping kids (2016-01-23) arstechnica.com
Deep Security Concerns Underline Technologys New Promise: Internet of Things (IoT) (2016-01-25) dzone.com
How to Help Protect Sensitive Data with AWS KMS (2016-01-25) blogs.aws.amazon.com
How to Encrypt OAuth Tokens in 10 minutes With SecureDB (2016-01-25) www.programmableweb.com
The State of Securing RESTful APIs with Spring (2016-01-25) www.infoq.com
Lockr Key Management Service for Drupal and WordPress Now Available (2016-01-26) www.programmableweb.com
Internet of things security years away from being fully baked, says Forrester (2016-01-26) www.zdnet.com
Google?s new Security Panel in Chrome will push developers into an HTTPS future (2016-01-26) thenextweb.com
Chrome gets a security panel to help developers deploy HTTPS (2016-01-26) venturebeat.com
St. Lukes Hospital reports possible data breach involving patients info (2016-01-26) www.recordonline.com
The Pentagons plan to defend the power grid against hackers - CSMonitor.com (2016-01-26) www.csmonitor.com
Wendy?s Probes Reports of Credit Card Breach (2016-01-27) krebsonsecurity.com
5 tips for securing your AWS cloud (2016-01-27) www.networkworld.com
Vulnerable IoT devices are changing the cybersecurity landscape (2016-01-28) www.businessinsider.com
New York Department of Consumer Affairs investigates connected baby monitor hacks (2016-01-28) thenextweb.com
Presentation: Is that API Secure? (2016-02-02) www.infoq.com
Security vs. Surveillance (2016-02-03) www.schneier.com
Security as a Business Enabler (2016-02-03) dzone.com
Securing Your AWS Investments is a Shared Responsibility (2016-02-04) blog.cloudpassage.com
Box launches KeySafe service for secure storage of encryption keys (2016-02-04) venturebeat.com
API Security Lessons from Fisher-Price?s Smart Toy Bear Security Flaw (2016-02-04) blog.smartbear.com
AWS FedRAMP-Trusted Internet Connection (TIC) Overlay Pilot Program (2016-02-04) blogs.aws.amazon.com
SSL Certificates for Elastic Load Balancing (2016-02-06) docs.aws.amazon.com
Hacker dumps data on 10K DHS employees, threatens FBI next (2016-02-08) thehill.com
Visa leverages open API model to give consumers security controls (2016-02-09) www.fiercefinanceit.com
The Perception of Privacy and Security on the Internet (2016-02-09) dzone.com
3 Tips for Helping Your Online Business Recover From a Data Breach (2016-02-09) en.blog.zyncro.com
Hacked Toy Company VTech?s TOS Now Says It?s Not Liable for Hacks (2016-02-09) motherboard.vice.com
The Impact of Cybersecurity?s Top Breaches of 2015 ? cyber incidents get bigger and go mainstream (2016-02-11) www.ikanow.com
RapidSSL is here (2016-02-11) opensrs.com
API Security Lessons From Fisher-Price?s Smart Toy Bear Security Flaw (2016-02-11) dzone.com
Complex Adaptive Security (2016-02-12) blog.cloudpassage.com
Securing the IoT ? madness or huge opportunity? (2016-02-12) disruptiveviews.com
Security vendor expects slower spending in cyber security (2016-02-12) disruptiveviews.com
Spring Data REST ? Data Meets Hypermedia and Security (2016-02-13) dzone.com
Get Off of My Cloud: The New Security of Cloud Infrastructure (2016-02-15) dzone.com
Interview: Addressing the Emerging Challenges of Social Data and Security (2016-02-15) www.brandwatch.com
AWS Security Checklist - General (2016-02-15) aws-de-media.s3.amazonaws.com
DC Inno on IKANOW, ?a startup that uses big data to crush hackers?? (2016-02-16) www.ikanow.com
Hospital Forced Back to Pre-Computer Era Shows the Power of Ransomware (2016-02-16) www.technologyreview.com
Hack Brief: Hackers Are Holding an LA Hospital?s Computers Hostage (2016-02-16) www.wired.com
API Security is Easier Said Than Done (2016-02-18) www.programmableweb.com
Concern Around Mapping and Discussing Shadow Mobile APIs Shows Signs of an Imbalance (2016-02-18) dzone.com
Are There API Terms of Use With Specific Language for Privacy and Security? (2016-02-18) www.programmableweb.com
How Can API Risks and Vulnerabilities Be Mitigated? (2016-02-18) www.programmableweb.com
Could Third Party Certification Authorities Play a Role in API Security? (2016-02-18) www.programmableweb.com
APIs are Critical to the Internet but Frequently Targeted for Attack (2016-02-18) www.programmableweb.com
How Does The External Availability of APIs Impact Their Security? (2016-02-18) www.programmableweb.com
Must API Developers Be Certified for Privacy or Security Standards by Your Organization? (2016-02-18) www.programmableweb.com
What Are the Perceived and Actual Security Concerns for APIs? (2016-02-18) www.programmableweb.com
Java EE Security API Moving Forward (2016-02-19) dzone.com
This Week in Security: Week #7 (2016-02-22) dzone.com
CloudFlare launches registrar to prevent DNS hijacking attacks (2016-02-23) www.zdnet.com
62% of Information Security Pros Expect a Breach in 2016 ? and They May Be Too Optimistic (2016-02-23) www.ikanow.com
IKANOW Introduces Channel Partner Program (2016-02-24) www.ikanow.com
Docker Production Deployment Security Considerations (2016-02-24) www.bmc.com
Eavesdropping by the Foscam Security Camera (2016-02-24) www.schneier.com
How to Use AWS WAF to Block IP Addresses That Generate Bad Requests (2016-02-24) blogs.aws.amazon.com
Introducing CloudFlare Registrar: Designed for Security, Not the Masses (2016-02-24) blog.cloudflare.com
This is Why People Fear the ?Internet of Things? ? Krebs on Security (2016-02-24) krebsonsecurity.com
Hackers can access the Nissan Leaf via insecure APIs (2016-02-24) www.computerworld.com
DDoS Security Solutions to Protect Your Business from any Loss (2016-02-25) dzone.com
Who needs long sessions to learn about security? (2016-02-25) blogs.ca.com
Poor API Security Leaves Nissan LEAF Vehicles Vulnerable to Hackers (2016-02-25) www.programmableweb.com
Nissan LEAF Security Flaws Exposed via Hacking (2016-02-25) myinforms.com
Nissan pulls the Leafs phone app after security vulnerabilities come to light (2016-02-25) www.theverge.com
Microsoft launches Azure Security Center Advanced Threat Detection, third-party tools coming in a few weeks (2016-02-25) venturebeat.com
100,000 free credits to help us support DMARC (2016-02-26) postmarkapp.com
Article: Securing the Modern Software Delivery Lifecycle (2016-02-27) www.infoq.com
IRS identifies more cyberattacks to access tax data (2016-02-27) venturebeat.com
An Apology to Our Employees (2016-02-28) blog.snapchat.com
CipherCloud Announces Cloud Security Broker (2016-02-29) talkincloud.com
DDoS, Web Attacks Surge; Repeat Attacks Become the Norm (2016-02-29) www.akamai.com
Akamai Advances Kona Site Defender to Meet the Challenges Posed by Constantly Evolving Web Application and DDoS Threat Landscape (2016-02-29) www.akamai.com
DDoS attacks surge in Q4, says Akamai (2016-02-29) www.zdnet.com
How to Build a Culture of Security (2016-02-29) www.tune.com
Announcing Industry Best Practices for Securing AWS Resources (2016-02-29) blogs.aws.amazon.com
Announcing Industry Best Practices for Securing AWS Resources - AWS Security Blog (2016-02-29) blogs.aws.amazon.com
Staying afloat: the DROWN Attack and CloudFlare (2016-03-01) blog.cloudflare.com
In Case You Missed These: AWS Security Blog Posts from January and February (2016-03-01) blogs.aws.amazon.com
GuardiCore Extends Its Data Center Security Platform (2016-03-01) www.datacentertalk.com
New Security Framework for Amazon Web Services Released (2016-03-01) blogs.adobe.com
Thieves Nab IRS PINs to Hijack Tax Refunds (2016-03-01) krebsonsecurity.com
Detect DNS Spoofing, Protect Your Digital Identity (2016-03-02) blog.catchpoint.com
Dwolla Defends Security Practices in the Face of CFPB Fine (2016-03-02) bankinnovation.net
The IoT: New Opportunities Bring New Security Challenges (2016-03-02) www.ariasystems.com
Square API Leaves Apps Vulnerable to XSS Attacks (2016-03-02) www.programmableweb.com
DROWN Attack (2016-03-03) www.schneier.com
This report just raised a major red flag about IoT security (T) (2016-03-03) www.businessinsider.com
How DMARC and a custom Return-Path work together (2016-03-03) postmarkapp.com
The DROWN Attack (2016-03-03) www.foxycart.com
Consumers dont care if their connected car can get hacked - heres why thats a problem (2016-03-07) www.businessinsider.com
IRS Suspends Insecure ?Get IP PIN? Feature (2016-03-07) krebsonsecurity.com
How to Automate Restricting Access to a VPC by Using AWS IAM and AWS CloudFormation (2016-03-07) blogs.aws.amazon.com
How to Reduce Security Threats and Operating Costs Using AWS WAF and Amazon CloudFront (2016-03-08) blogs.aws.amazon.com
Apple vs. the FBI: What It Means for Privacy and Security (2016-03-09) knowledge.wharton.upenn.edu
Top Security Twitter Accounts (2016-03-09) blog.domaintools.com
Hacking Ukraines Power Grid (2016-03-09) www.schneier.com
eero: A Mesh WiFi Router Built for Security (2016-03-09) krebsonsecurity.com
Blocking Abusive IP Addresses With Iptables on Linux (2016-03-10) dzone.com
DDoS hack attacks are growing at an alarming rate (2016-03-10) www.businessinsider.com
How to Detect and Analyze DDOS Attacks Using Log Analysis (2016-03-10) dzone.com
Hackers prove how easy it is to invade smart homes - but theres a silver lining (2016-03-10) www.businessinsider.com
Privacy, Security, and Encryption (2016-03-10) www.graphite.org
Delivering Security Through Modern API Architecture (2016-03-11) pages.3scale.net
Snapchat: Bug Bounty Program - Get Rewards through HackerOne (2016-03-11) hackerone.com
New Regulatory Territory for CFPB: Data Security (2016-03-14) bankinnovation.net
Thieves Phish Moneytree Employee Tax Data (2016-03-16) krebsonsecurity.com
Custom Security With a Spring Boot/Elide Json API Server (2016-03-16) dzone.com
Avoid Sharing Key Pairs for EC2 (2016-03-16) dzone.com
Pulling Git Into a Docker Image Without Leaving SSH keys Behind (2016-03-17) dzone.com
Security Issues ? Overview and Examples (2016-03-17) www.codeproject.com
How to Secure Kong Admin (2016-03-18) apiplug.com
FBI warns car makers and owners about vehicle hacking risks (2016-03-18) venturebeat.com
Certificate Transparency for Untrusted CAs (2016-03-21) security.googleblog.com
Heroku Behind the Curtain: Patching the glibc Security Hole (2016-03-21) blog.heroku.com
Knowns and Unknowns: What it Means to Shift from Prevention to Detection and Response (2016-03-22) www.ikanow.com
Uber will pay hackers up to $10,000 to find bugs in its system (2016-03-22) www.theverge.com
Welcome all bug bounty hunters (2016-03-22) medium.com
Security for APIs, or APIs for Security? (2016-03-23) www.huffingtonpost.com
HTTP Strict Transport Security (HSTS) and NGINX (2016-03-23) www.nginx.com
Is DevOps Bad for Security? (2016-03-24) dzone.com
Google shares data center security and design best practices (2016-03-24) cloudplatform.googleblog.com
Digital: Security, Privacy and Customer Experience (2016-03-25) bankinnovation.net
Snapchat shares security best practices for running on GCP (2016-03-25) cloudplatform.googleblog.com
Verizon says security breach leads to customer data leak (2016-03-25) venturebeat.com
How Well Do You Know API Security (2016-03-28) blog.akana.com
How to Easily Identify Your Federated Users by Using AWS CloudTrail (2016-03-28) blogs.aws.amazon.com
Secful Aims to Automatically Detect and Thwart API Attacks in Real-Time (2016-03-30) www.programmableweb.com
Advanced Web Security Topics (2016-03-31) dzone.com
5 API Testing ?Must Haves? for API Security, Reliability, Performance (2016-03-31) blog.parasoft.com
The Most Important Security Practice Everyone Forgot (2016-04-01) stormpath.com
Identity and access management: Where security and operations meet (2016-04-04) blogs.ca.com
Ghost Riders: Combatting Account Take Overs (2016-04-04) medium.com
Best Buy will Not Issue API Keys to Free Email Accounts and Wants to Get to Know Your Company (2016-04-05) dzone.com
Malware Information Sharing Platform MISP - A Threat Sharing Platform (2016-04-05) www.circl.lu
Keep IoT security close to your heart (2016-04-05) blogs.ca.com
Sentry enter body-worn camera market (2016-04-06) www.securityworldhotel.com
New Ovum Study Looks at API Security Practices, Revealing Basic Security Measures and Attack Vectors Overlooked and Disconnect Between Developers and IT Security Teams (2016-04-07) www.marketwired.com
New Study Demonstrates Lack of Focus on API Security (2016-04-08) www.programmableweb.com
Today in OpenGov: Welcome to the age of (open) data breach journalism? (2016-04-11) sunlightfoundation.com
5 API Testing ?Must Haves? for API Security, Reliability, Performance (2016-04-11) dzone.com
This Week in Security ? Mumblehard, Flash Player, Hacking Team, FBI, WhatsApp, Nitol, Chrome (2016-04-11) dzone.com
Tutorial: Securing your GitLab Pages with TLS and Lets Encrypt (2016-04-11) about.gitlab.com
Covering Your Assets: Data Encryption in API Management (2016-04-13) www.apiman.io
Growing Eddystone with Ephemeral Identifiers: A Privacy Aware Secure Open Beacon Format (2016-04-14) developers.googleblog.com
Detect DNS Spoofing, Protect Your Digital Identity (2016-04-14) dzone.com
Security Risks of Shortened URLs (2016-04-18) www.schneier.com
Details about Junipers Firewall Backdoor (2016-04-19) www.schneier.com
A simple approach to PCI DSS compliance for Google Cloud Platform (2016-04-19) cloudplatform.googleblog.com
Viber says it?s now encrypted, but won?t tell us how secure our chats are (2016-04-19) thenextweb.com
Survey Highlights Security Concern Among IoT Developers (2016-04-19) www.programmableweb.com
Now Generally Available: Amazon Inspector (2016-04-20) blogs.aws.amazon.com
The Current State of Healthcare Endpoint Security (2016-04-21) duo.com
Here Is How to Secure a Cloud Database (2016-04-22) maxkatz.org
Privacy and Security ? Is There A Difference? (2016-04-22) dzone.com
Securing the Connected World (2016-04-25) dzone.com
Over 1m dating site user details leak online ? and they include 170 government addresses (2016-04-25) thenextweb.com
That USB drive you found has more than just spring break photos (2016-04-25) www.chicagotribune.com
Security Considerations with Camel HTTP Services (2016-04-26) dzone.com
Using HTTPS to Secure Your Websites: An Intro to Web Security (2016-04-26) auth0.com
State of IoT Security - Qamp;A (2016-04-27) www.kony.com
How to Import IP Address Reputation Lists to Automatically Update AWS WAF IP Blacklists (2016-04-28) blogs.aws.amazon.com
Your Friendly Slack Bot Might Be Exposing Your Companys Conversations (2016-04-28) motherboard.vice.com
Never Put Secrets in URLs and Query Parameters (2016-04-29) www.fullcontact.com
Simple, Secure Role Based Access Control (RBAC) For REST APIs (2016-04-29) dzone.com
Using HTTPS to Secure Your Websites: An Intro to Web Security (2016-04-29) dzone.com
Slack tokens: what they are, how they?re used, and how to keep your data safe (2016-04-29) medium.com
API Security: The 4 Defenses of The API Stronghold (2016-04-30) nordicapis.com
How to Optimize and Visualize Your Security Groups (2016-05-02) blogs.aws.amazon.com
Stronger protection and more control over security settings with CloudFlare?s new cPanel plugin (2016-05-02) blog.cloudflare.com
Cisco patch stops attackers from taking over TelePresence systems (2016-05-04) www.computermagazine.com
Watch engineers hack past a smart home?s front door (2016-05-04) www.futurity.org
Qualcomm security flaw impacts Android devices, project APIs (2016-05-05) www.zdnet.com
Introducing TAuth: Why OAuth 2.0 is bad for banking APIs and how were fixing it (2016-05-05) blog.teller.io
Distil Networks: when bad bots feed on API endpoints (2016-05-06) www.computerweekly.com
Crowdsource your security knowledge: A simple guide to OWASP Top 10 (2016-05-06) betanews.com
State of IoT Security ? Qamp;A (2016-05-09) dzone.com
Automating Penetration Testing in a CI/CD Pipeline (2016-05-09) dzone.com
Docker Security Scanning now available to Docker cloud users (2016-05-10) www.zdnet.com
Google Mobile Management: Introducing Mobile Audit in the Reports API (2016-05-10) googleappsdeveloper.blogspot.com
Docker Security Scanning (2016-05-10) www.infoq.com
Humanizing Security Data Visualization (2016-05-10) blogs.splunk.com
The Iot Security Checklist (2016-05-10) dzone.com
Wendy?s: Breach Affected 5% of Restaurants (2016-05-11) krebsonsecurity.com
SWIFT says their bank customers are responsible for security (2016-05-12) disruptiveviews.com
Tumblr discloses email security breach (2016-05-12) www.zdnet.com
Security Solutions and Services for the IoT (2016-05-12) www.remotemagazine.com
Security vs privacy ? mixed messages for tech companies this week (2016-05-13) disruptiveviews.com
Security challenges for the industrial Internet of Things (2016-05-17) disruptiveviews.com
Duo Secures Data in the European Union (2016-05-18) duo.com
Facebook, LinkedIn, Twitter: The New Cyberweapons Of Choice (2016-05-18) blogs.forrester.com
LinkedIn Says Hackers Are Trying to Sell Fruits of Huge 2012 Data Breach (2016-05-18) www.nytimes.com
CUJO ? Smart firewall for your connected home (2016-05-18) www.getcujo.com
As Scope of 2012 Breach Expands, LinkedIn to Again Reset Passwords for Some Users (2016-05-18) krebsonsecurity.com
Security and risk professionals: Team up with your marketing peers to design your customers privacy experiences (2016-05-19) blogs.forrester.com
Evolving the Safe Browsing API (2016-05-20) security.googleblog.com
Deep Insert ATM Skimmers May Pose a Risk to Your Money (2016-05-23) www.privacyrights.org
XenAPI For XenForo 1.4.1 SQL Injection (2016-05-24) packetstormsecurity.com
Consumer Readable Security Labels for IoT devices (2016-05-24) disruptiveviews.com
Skimmers Found at Walmart: A Closer Look (2016-05-25) krebsonsecurity.com
Demisto Extends Its Security ChatBot With Industry Leading Security Products to Cover Entire Security Incident Lifecycle From Creation to Close (2016-05-25) worldnews.se
Google Launches Version 4 of its Safe Browsing API (2016-05-25) www.programmableweb.com
Bug Bounty, 2 years in (2016-05-27) blog.twitter.com
Bug Bounties Considered Harmful (2016-05-31) dzone.com
Securely Expose Protected Resources as APIs with App42 API Gateway (2016-05-31) blogs.shephertz.com
What to Do When Mobile and IoT Explode the Attack Surface (2016-06-02) ikanow.com
Who is Really Responsible for API Security? (2016-06-06) www.programmableweb.com
Wells Fargo Partners With Xero to Avoid Cyber Attacks (2016-06-07) www.bidnessetc.com
User Data Security (2016-06-07) dzone.com
Palantir?s Struggles and Big Data?s Evolution in Information Security (2016-06-08) ikanow.com
10 Most Common Web Security Vulnerabilities (2016-06-09) dzone.com
The Auto I ? Smart vehicle security system with a 360 degree dash cam (2016-06-10) www.kickstarter.com
Twitter locks some accounts after 32 million passwords appear on dark web (2016-06-10) www.theverge.com
Blurring the Line: Performance and Security (2016-06-11) blog.catchpoint.com
Why SQL Injection Vulnerabilities Still Exist (2016-06-13) dzone.com
Rapid7 discloses remote code execution flaw in Swagger (2016-06-23) www.computerweekly.com
Swagger Vulnerability Leads to Arbitrary Code Injection (2016-06-23) threatpost.com
Internet Connected Toothbrushes Launch Coordinated DDoS Attack, Take Down Colgate Website (2016-06-28) dyn.com
Security Enforcement of Microservices (2016-06-28) dzone.com
Cisco is spending $293 million to buy cloud security company CloudLock (CSCO) (2016-06-28) www.businessinsider.com
How to Lock Down Elasticsearch, Kibana, and Logstash and Maintain Security (2016-06-28) qbox.io
FireMon: The Enterprise Security Management Vanguard (2016-06-29) risk-management.cioreview.com
Free Online Training to Help You Learn AWS Security Fundamentals (2016-06-30) aws.amazon.com
Researchers Identify Security Vulnerability Involving Swagger (2016-07-05) www.programmableweb.com
Securing a Web API Service Layer (2016-07-06) security.stackexchange.com
How to handle security risks in Red Hat virtualization environments (2016-07-07) www.techrepublic.com
MongoDB Tips and Tricks: Collection-Level Access Control (2016-07-07) dzone.com
Oops! Wearables can leak your PINs and passwords (2016-07-08) techcrunch.com
Increase Security by Transitioning From Monolith to Microservices Architecture (2016-07-08) dzone.com
How Audit Logs Help Confirm and Correct Security Policy (2016-07-10) dzone.com
Ever Use Someone Else?s Password? Go to Jail, says the Ninth Circuit (2016-07-11) www.eff.org
How to Restrict Amazon S3 Bucket Access to a Specific IAM Role (2016-07-11) blogs.aws.amazon.com
Report on the Vulnerabilities Equities Process (2016-07-11) www.schneier.com
PCI DSS 3.2 Urges Stronger Access Security for Third Parties As Breaches Continue (2016-07-11) duo.com
Microsoft Launches Azure Information Protection for Documents (2016-07-11) www.infoq.com
Pokemon Go Is a Hacker?s Dream (2016-07-11) www.thedailybeast.com
Tweet: Is #Pokemon Go Stealing your Data? Read more to find out if you#039;re affected. https://t.co/l2J644gcnF (2016-07-11) twitter.com
Understanding Chain Hacking: A Guide to Botnets (2016-07-13) www.huffingtonpost.com
Tweet: Securing Your #IoT Devices and Services with JSON Web Tokens https://t.co/h4Y6rD57pY #security https://t.co/rgeoVrPsB0 (2016-07-13) twitter.com
8 Security Considerations for API Testing (2016-07-14) blog.smartbear.com
Top 50 InfoSec Blogs You Should Be Reading | Digital Guardian (2016-07-14) digitalguardian.com
8 Security Considerations for API Testing (2016-07-17) dzone.com
XML-RPC and Why It?s Time to Remove it for WordPress Security (2016-07-18) premium.wpmudev.org
Security software that uses code hooking opens the door to hackers (2016-07-19) www.computerworld.com
Securio - Managed Security Platform - Security on all Devices (2016-07-20) www.globalvelocity.com
ARM, Symantec and more join forces to bolster IoT security (2016-07-20) www.theinquirer.net
Real-Time Security Intelligence, the future of security (2016-07-21) www.itsecurityguru.org
Microsoft Launches Azure Security Center (2016-07-21) techspective.net
How Will Banks Secure the New Channels ? Messaging, Video, Chatbots? (2016-07-21) bankinnovation.net
Twitters Vine Source code dump (2016-07-22) avicoder.me
3 Things You Must Do to Ensure Data Security (2016-07-23) dzone.com
AWS Becomes First Cloud Service Provider to Adopt New PCI DSS 3.2 (2016-07-25) blogs.aws.amazon.com
In Security, Know That You Know Nothing (2016-07-26) www.darkreading.com
Microsoft given 3 months to fix Windows 10 security and privacy (2016-07-26) www.itsecurityguru.org
Pornhub Hacked to Access Billions of Users? Information (2016-07-26) www.itsecurityguru.org
Network Security and CMDBs: Why Graph Visualization Is Essential (2016-07-26) dzone.com
Devs and Their Responsibility to Secure Cloud Systems (2016-07-26) dzone.com
One password reset to rule them all! (2016-07-26) scotthelme.co.uk
Kimpton Hotel Chain Investigating Possible Payment Card Breach (2016-07-27) www.darkreading.com
How to Audit Cross-Account Roles Using AWS CloudTrail and Amazon CloudWatch Events (2016-07-27) blogs.aws.amazon.com
Osram Smart Light Bugs Affect Wi-Fi Security (2016-07-27) www.pcmag.com
Dropbox adds more security, collaboration controls to woo the enterprise (2016-07-27) www.zdnet.com
Vixies Farsight Rolls Out Its First Enterprise DNS Security Service (2016-07-27) www.darkreading.com
(2016-07-29) www.nginx.com
Software-Defined Security: The Missing Piece in Your SDDC Strategy (2016-07-29) networking.cioreview.com
How to Roll Your Own Threat Intelligence Team (2016-07-29) www.darkreading.com
Building an Effective Incident Response Plan (2016-07-29) www.infosecurity-magazine.com
Gain practical advice on how to set-up a threat hunting capability within your organization #IMVC16 https://t.co/pALjTfDWec (2016-07-29) www.infosecurity-magazine.com
Sapience Launches Self-Serve API Security Risk Assessment Tool (2016-07-29) www.programmableweb.com
Serious privacy flaws discovered in Glow fertility tracker app (2016-07-30) techcrunch.com
SwiftKey Stops Cloud Sync Following User Data Leak (2016-08-01) www.itsecurityguru.org
Companies still struggling with security of data in the cloud (2016-08-01) disruptiveviews.com
How to Protect Yourself or Organization from Malware (2016-08-01) www.itsecurityguru.org
UK SMEs not prioritising better online security (2016-08-01) www.itsecurityguru.org
Tweet: Powerful new feature now available: remove sensitive data from API test results before it is stored: https://t.co/HRfQkwoz9b (2016-08-01) twitter.com
5 Email Security Tips to Combat Macro-Enabled Ransomware (2016-08-02) www.darkreading.com
Security Weekly #475 ? Federico Kirschbaum (2016-08-02) securityweekly.com
New Jeep hack allows remote steering, acceleration (2016-08-02) thehill.com
Kaspersky Lab Kicks Off Its First Bug Bounty Program (2016-08-02) www.darkreading.com
We Asked Hackers To Predict The Future of Hacking (2016-08-02) motherboard.vice.com
Millions of Yahoo Accounts Pop Up for Sale on the Dark Web (2016-08-02) www.pcmag.com
Hacker Dumps Sensitive Patient Data From Ohio Urology Clinics (2016-08-02) motherboard.vice.com
Exclusive: Hackers accessed Telegram messaging accounts in Iran - researchers (2016-08-02) www.reuters.com
Hack Brief: Hackers Breach the Ultra-Secure Messaging App Telegram in Iran (2016-08-02) www.wired.com
Hackers compromise dozens of Telegram chat accounts in Iran (2016-08-02) www.theverge.com
Iranian hackers called ?Rocket Kitten? go spearphishing on Telegram (2016-08-02) disruptiveviews.com
Yahoo probes possible huge data breach (2016-08-02) www.bbc.co.uk
Bitfinex disables trading on exchange after hack (2016-08-03) www.reuters.com
How to Educate Yourself About Cloud Security (2016-08-03) dzone.com
NIST is No Longer Recommending Two-Factor Authentication Using SMS (2016-08-03) www.schneier.com
Telegram Pushes Back on Hack Reports (2016-08-03) www.pcmag.com
The Business Case for TLS 1.2 for Monitoring Data Transactions (2016-08-03) www.bmc.com
Malware found in 75% of top 20 commercial banks in the US, says SecurityScorecard (2016-08-03) www.itsecurityguru.org
Cisco Releases Security Updates (2016-08-03) www.us-cert.gov
Rational Security: The Who Hacked My Ballot Box? Edition (2016-08-03) www.lawfareblog.com
Telegram denies Iranian mass breach (2016-08-03) www.bbc.co.uk
Wordpress Security: The Ultimate 32-step Checklist (2016-08-03) sharepointsocial.de
(2016-08-03) www.itsecurityguru.org
Ransomware Hit 40 Percent of Businesses in the Last Year (2016-08-03) www.pcmag.com
Mozilla Releases Security Updates (2016-08-03) www.us-cert.gov
Threat Intelligence Currency in the API Economy (2016-08-03) linkis.com
Pokemon Go Developer Defends Third-party Crackdown Amid Backlash (2016-08-04) www.bloomberg.com
Apple Announces Security Bounty Program (2016-08-04) www.theverge.com
Rich Mogull on Apple?s Security Bounty Program (2016-08-04) securosis.com
(2016-08-04) www.theverge.com
Apple?s Finally Offering Bug Bounties?With the Highest Rewards Ever (2016-08-04) www.wired.com
Interview with hardware hacker Star Simpson (2016-08-04) boingboing.net
Apple offers big cash rewards for help finding security bugs (2016-08-04) www.reuters.com
(2016-08-04) www.programmableweb.com
Testing a Self-Contained JavaEE App Using Arquillian and Docker (2016-08-04) dzone.com
Can companies ever keep our data safe? (2016-08-04) www.bbc.co.uk
Apple announces long-awaited bug bounty program (2016-08-04) techcrunch.com
Apple?s bug bounty program favors quality over quantity (2016-08-04) www.pcworld.com
US health insurer warns 3.7m after cyber-attack (2016-08-04) www.bbc.co.uk
Apple announces invitation-only bug bounty program at Black Hat conference (2016-08-04) www.pcworld.com
Google partners with Dashlane for an open-source login API (2016-08-04) techaeris.com
Hacker Creates Software Ratings System (2016-08-04) www.darkreading.com
Dashlane, Google launch ?OpenYOLO?, an API-based password project for Android apps (2016-08-04) techcrunch.com
Dashlane and Google team up for OpenYOLO security project (2016-08-04) www.pcworld.com
Flaw in period tracker app highlights security concerns with connected health services (2016-08-04) www.dailydot.com
Jeep hackers: How we swerved past Chrysler?s car security patches (2016-08-05) www.itsecurityguru.org
Uploadcare on Social Networks and Cloud Servers Security (2016-08-05) medium.com
Hacking the TSA?s Master Keys: 3D Printing Adds a New Dimension to Privacy and Security (2016-08-05) www.fabbaloo.com
Researcher hides stealthy malware inside legitimate digitally signed files (2016-08-05) www.pcworld.com
Apple offers reward for finding security flaws (2016-08-05) www.itsecurityguru.org
The Imperva HTTP/2 Vulnerability Report and NGINX (2016-08-05) www.nginx.com
Understanding Threat Intelligence ROI (2016-08-05) www.itsecurityguru.org
Huge data breach at health system leads to biggest ever settlement (2016-08-05) www.itsecurityguru.org
Could online bug hunting make me rich? (2016-08-05) www.bbc.co.uk
Def Con: Do smart devices mean dumb security? (2016-08-06) www.bbc.co.uk
Car Hackers Return to Black Hat with New Attacks to Drive You Off the Road (2016-08-06) www.pcmag.com
Metasploit for Machine Learning: Deep-Pwning (2016-08-06) n0where.net
Using Cyber Threat Intelligence to Reduce Actors Opportunities (2016-08-06) www.securityweek.com
Datadog Adds Real-Time Security Monitoring With Immunio (2016-08-07) dzone.com
Data Protection From The Inside Out (2016-08-08) www.darkreading.com
Hackers hit Oracles Micros payment systems division (2016-08-08) www.pcworld.com
The Terrible Security Of Bluetooth Locks (2016-08-08) hackaday.com
Hackers Breach Hundreds of Thousands of Cash Registers (2016-08-08) www.pcmag.com
Are unsecure medical devices opening the backdoor for hackers? (2016-08-08) www.itsecurityguru.org
Proof-of-concept ransomware for smart thermostats demoed at Defcon (2016-08-08) boingboing.net
Keep Calm and Send Telegrams! (2016-08-08) telegram.org
4 Steps To Secure Serverless Applications (2016-08-08) medium.com
DEF CON 24: Mudge The Consumer Reports for Software Security (2016-08-09) duo.com
Building A Detection Strategy With The Right Metrics (2016-08-09) www.darkreading.com
The Importance of Security When It Comes to Data Accuracy (2016-08-09) dzone.com
Intersections: DevOps, Release Engineering, and Security (2016-08-09) dzone.com
Web Application Security Scanner Evaluation Criteria (2016-08-09) projects.webappsec.org
Apple says banks can?t touch iPhone NFC without harming security (2016-08-10) www.itsecurityguru.org
Zero-Day Hunters Will Pay Over Twice as Much as Apple?s New Bug Bounty Programme (2016-08-10) motherboard.vice.com
USENIX Security Best Paper 2016 ? The Million Key Question ? Origins of RSA Public Keys (2016-08-10) www.lightbluetouchpaper.org
Apple Announces Upcoming Invite-Only Bug Bounty Program (2016-08-10) www.programmableweb.com
Fake QR code app gets hacker into luxury airport lounges for free (2016-08-10) www.itsecurityguru.org
Securing Kafka REST API endpoints (2016-08-10) serverfault.com
New! Import Your Own Keys into AWS Key Management Service (2016-08-11) blogs.aws.amazon.com
New malware campaign spreads backdoors instead of ransomware (2016-08-11) www.itsecurityguru.org
New ? Bring Your Own Keys with AWS Key Management Service (2016-08-11) aws.amazon.com
Big Data Security Issues in the Enterprise (2016-08-11) www.bmc.com
Securing Slack Webhooks With Firebase and Node.js (2016-08-11) cliffordhall.com
Secure Boot snafu: Microsoft leaks backdoor key, firmware flung wide open (2016-08-11) arstechnica.com
A security expert who in his spare time discovers data breaches affecting millions explains why he does it (2016-08-12) www.businessinsider.com
Thieves can wirelessly unlock up to 100 million Volkswagens, each at the press of a button (2016-08-12) www.itsecurityguru.org
Kaspersky Internet Security (2017) (2016-08-12) www.pcmag.com
Millions of Volkswagen cars can be unlocked via hack (2016-08-12) www.bbc.co.uk
Drive a Volkswagen? Think Twice About Using Keyless Entry (2016-08-12) www.pcmag.com
Making Open Banking safe is simple, despite concerns over cybersecurity (2016-08-12) www.itsecurityguru.org
Where Is The Ethical Line When Defining And Securing The API Landscape? (2016-08-12) dzone.com
Airtel is sniffing and censoring CloudFlare?s traffic in India and CloudFlare doesn?t even know it. (2016-08-12) medium.com
6 Things To Know For Securing Amazon Web Services (2016-08-13) www.darkreading.com
Web API ? Security Review ? How to Hack an API and Get Away with It (2016-08-13) www.linkedin.com
HEI Hotels reports point-of-sale terminals breach (2016-08-14) www.pcworld.com
Metapacket analyzes outbound network traffic to flag and block malware (2016-08-15) techcrunch.com
Major Hotel Chains Hacked, Credit Card Details Stolen (2016-08-15) www.pcmag.com
SignalFire New Firmware Adds AES-128 Encryption to its Wireless Remote Monitoring Product Line (2016-08-16) www.remotemagazine.com
New Crypto-Currency Rewards Users For Participating In DDoS Attacks (2016-08-16) www.itsecurityguru.org
API Security: Ways to Authenticate and Authorize (2016-08-16) dzone.com
3 Ways to Fortify Your APIs to Make Sure They?re Battle Ready (2016-08-16) blog.smartbear.com
Updated Whitepaper Available: AWS Best Practices for DDoS Resiliency (2016-08-16) blogs.aws.amazon.com
Can Openness in the US Government Lead to Better Application Security? (2016-08-16) dzone.com
Prevent Security Breaches Due to Out-of-Date Flash Vulnerabilities (2016-08-17) duo.com
What Mr. Robot Can Teach Businesses About Security (2016-08-17) www.darkreading.com
Security Must Become Driving Force For Auto Industry (2016-08-17) www.darkreading.com
Rackspace Cloud Identity Api 2.0 (2016-08-17) developer.rackspace.com
New Research Shows More than 30% of Employees Put Their Companies at Risk of Data Breach Due to Phishing Attacks (2016-08-17) www.itsecurityguru.org
Millions Of Keyless Volkswagen Cars Can Be Hacked: Research (2016-08-17) www.darkreading.com
Lack of process and security culture are chief factors leaving firms open to cyber attack (2016-08-17) www.itsecurityguru.org
Best Security Practices to Prevent Costly Social Engineering Attacks (2016-08-17) www.itsecurityguru.org
Attackers Playbook Top 5 Is High On Passwords, Low On Malware (2016-08-18) www.darkreading.com
Who Is to Blame for IoT Security Risks? (2016-08-18) dzone.com
Sage data breach highlights the risk of the insider threat (2016-08-18) www.pcworld.com
Here is what companies are doing to secure the IIoT (2016-08-18) industrialiot5g.com
Fortinet Security Fabric: Infoworld White Paper (2016-08-18) resources.infoworld.com
A researcher claims 2 bank apps can be hacked using iPhones Live Photos (2016-08-18) www.businessinsider.com
Complete AWS IAM Reference (2016-08-18) dzone.com
Malware Infected All Eddie Bauer Stores in U.S., Canada (2016-08-19) www.itsecurityguru.org
Research finds security risks prevent consumers from cbuying into mobile banking (2016-08-19) www.itsecurityguru.org
M-Files and AIIM Survey Reveals Frequency of Information Security Breaches (2016-08-19) www.itsecurityguru.org
Employee Arrested For Breach At Software Firm Sage (2016-08-19) www.darkreading.com
Why Security Needs Automation: Users Ingore 87% of Security Warnings Anyway (2016-08-19) continuum.cisco.com
The Windows 10 Anniversary Update is breaking webcams (2016-08-19) www.pcworld.com
Access control system streamlines building access in Illinois village (2016-08-21) americancityandcounty.com
Passwords ?broken?, warning rethink on security needed (2016-08-22) www.itsecurityguru.org
I Thought I Was a Security Rockstar. I Was Just Stupid (2016-08-22) www.liquidmatrix.org
Security Weekly #477 ? Security News (2016-08-22) securityweekly.com
Why biometrics are less secure than passwords (2016-08-22) www.itsecurityguru.org
Cloud Use Increases Attack Surface, But Security Not Keeping Up (2016-08-22) www.infosecurity-magazine.com
Anatomy Of A Social Media Attack (2016-08-23) www.darkreading.com
ThreatQuotient Secures $12M in Series B Funding (2016-08-23) www.finsmes.com
Bounty hunters are legally hacking Apple and the Pentagon ? for big money (2016-08-23) www.itsecurityguru.org
Epic Games forum hack underscores the need to install security patches (2016-08-23) www.pcworld.com
Hit-And-Run Tactics Fuel Growth In DDoS Attacks (2016-08-23) www.darkreading.com
Ashley Madison misled users with a fake security award (2016-08-23) www.pcworld.com
Your Software is Safer in Docker Containers (2016-08-23) blog.docker.com
Securing the Enterprise Software Supply Chain Using Docker (2016-08-23) blog.docker.com
Trailbot ? Monitor your files and react upon unwanted modification (2016-08-23) trailbot.io
When Securing Your Applications, Seeing Is Believing (2016-08-24) www.darkreading.com
Protecting Microsoft Email with Duo (2016-08-24) duo.com
Security Leadership The Art Of Decision Making (2016-08-24) www.darkreading.com
Poor security ?aided? Ashley Madison hack (2016-08-24) www.itsecurityguru.org
?Grand Theft Auto? Fan Site Hacked (2016-08-24) www.itsecurityguru.org
Announcing Password Breach Detection for Auth0 (2016-08-24) auth0.com
Newly Released Exploits Affect Cisco, Juniper Other Vendors (2016-08-24) duo.com
Informatica CEO: Data security is an unsolved problem (2016-08-25) www.pcworld.com
CrowdStrike Integrates Scanning Engine With VirusTotal (2016-08-25) www.darkreading.com
United Airlines Sets Minimum Bar on Security (2016-08-25) www.itsecurityguru.org
How the Consumer Product Safety Commission is (Inadvertently) Behind the Internet?s Largest DDoS Attacks (2016-08-25) blog.cloudflare.com
More security companies sharing information in malware fight (2016-08-25) disruptiveviews.com
Confusing Security Risks with Moral Judgments (2016-08-25) www.schneier.com
ICS-CERT Releases WMI for Detection and Response White Paper (2016-08-25) ics-cert.us-cert.gov
In Case You Missed These: AWS Security Blog Posts from June, July, and August (2016-08-25) blogs.aws.amazon.com
Here?s Exactly Why SMS Two-Factor Is Not Enough (2016-08-25) continuum.cisco.com
A quarter of banks? data breaches are down to lost phones and laptops (2016-08-26) www.itsecurityguru.org
Medical device security ignites an ethics firestorm (2016-08-26) www.pcworld.com
(2016-08-26) www.programmableweb.com
Hackers call for federal funding, regulation of software security (2016-08-26) www.the-parallax.com
Security Considerations for Container Orchestration (2016-08-29) blogs.adobe.com
Improve Security (Groups) Using VPC Flow Logs and AWS Config (2016-08-29) dzone.com
Crank up security on your site with some of our most recommended #PageRules (2016-08-29) www.cloudflare.com
Can Security-as-a-Service help UK businesses plug the skills deficit? (2016-08-30) www.itsecurityguru.org
NGINX Release Targets Application Security (2016-08-30) www.infoq.com
Social Engineering?s Role in Malicious Macros and OLE (2016-08-30) www.itsecurityguru.org
More Than 1 Million IoT Devices Compromised by Single Malware Family (2016-08-30) continuum.cisco.com
Balancing security and convenience in online commerce (2016-08-30) www.itsecurityguru.org
Hackers access SCAN Health Plan, breach data of more than 100,000 patients (2016-08-30) www.itsecurityguru.org
1.7 Million Opera Sync Users May Have Been Affected by Data Breach (2016-08-30) www.itsecurityguru.org
Should We Have a Standardized Score for Data Breaches? (2016-08-30) continuum.cisco.com
Dropbox hack affected 68 million users (2016-08-31) www.bbc.co.uk
After Breaches At Other Services, Spotify Is Resetting Users Passwords (2016-08-31) motherboard.vice.com
Security Weekly #478 ? Security News (2016-08-31) securityweekly.com
InterContinental unit Kimpton Hotels hit by payment card data breach (2016-08-31) www.reuters.com
Stateless Sessions for Stateful Minds: JWTs Explained and How You Can Make The Switch (2016-08-31) auth0.com
Using Azure AD Service Principals to Secure Applications (2016-08-31) dzone.com
More Than 40% Of Attacks Abuse SSL Encryption (2016-08-31) www.darkreading.com
The Dropbox hack is real (2016-08-31) www.itsecurityguru.org
Intruders Pilfered Over 68 Million Passwords In 2012 Dropbox Breach (2016-08-31) www.darkreading.com
Flaw in Facebook password resets could allow random account takeovers; severity of bug disputed (2016-08-31) www.scmagazine.com
How to Bring Security Best Practices to Life in Your Organization (2016-08-31) www.infosecurity-magazine.com
How Point of Sale Breaches Happen (2016-08-31) www.bitsighttech.com
The Problem with Securing Single Page Applications (2016-08-31) stormpath.com
FairWare ransomware infects servers through exposed Redis instances (2016-09-01) www.pcworld.com
Hackers use BMW, Amazon and Chanel brands to launch social media attacks (2016-09-01) www.itsecurityguru.org
Social Media Fraud Spikes, Study Finds (2016-09-01) www.darkreading.com
New standard in firewall change automation released by FireMon (2016-09-01) www.itsecurityguru.org
Security Weekly #478 ? Heather Mahalik, SANS (2016-09-01) securityweekly.com
Alarms are being raised about connected vehicle security (2016-09-01) disruptiveviews.com
Swisscom deploys BICS crowdsourcing solution FraudGuard (2016-09-01) disruptiveviews.com
SWIFT Reveals New Hacking Attempts On Member Banks (2016-09-01) www.darkreading.com
Password-Stealing Trojan Now Also Attacks With Cerber Ransomware (2016-09-01) www.darkreading.com
Vulnerabilities found in cars connected to smartphones (2016-09-01) www.itsecurityguru.org
Platform Security (2016-09-01) developer.samsung.com
Password Expiration (2016-09-01) www.infosecblog.org
Security Best Practices for Kubernetes Deployment (2016-09-01) blog.kubernetes.io
Last.fm breach from 2012 affected 43 million users (2016-09-01) www.pcworld.com
Hackers Had Access to OneLogIn Data for More Than a Month (2016-09-01) www.infosecurity-magazine.com
Learn How to Encrypt your Data and Security Best Practices (2016-09-01) www.ctl.io
43 million Last.fm users passwords were stolen, so stop using that one old password already (2016-09-02) www.businessinsider.com
Point-of-sale data breaches have now reached the cloud (2016-09-02) www.pcworld.com
Content Security (DRM) with the Native Player SDKs (2016-09-02) docs.brightcove.com
$40 Homemade ?Arduino radio device? can Intercept Vehicle Key Fobs ? More Than 100 Million Cars are Vulnerable (2016-09-02) blog.adafruit.com
MedSec/Muddy Waters The Future Of IoT Security (2016-09-02) www.darkreading.com
VMworld: Can you trust your API? (2016-09-02) www.welivesecurity.com
New cloud attack takes full control of virtual machines with little effort (2016-09-02) arstechnica.com
Cloud Security Alliance: 10 Ways To Achieve Access Control For Big Data (2016-09-03) www.darkreading.com
43M Last.fm Passwords Hacked in 2012 Breach (2016-09-03) www.pcmag.com
Explore Docker Images For Security Concerns (2016-09-05) dzone.com
Cryptographic Key Reuse Remains Widespread In Embedded Products (2016-09-06) www.darkreading.com
ITOps in the Modern Ops World (2016-09-06) dzone.com
Yelp Offers Up To $15K Per Bug Via New Bounty Program (2016-09-06) www.darkreading.com
How security enables digital transformation (2016-09-06) blogs.ca.com
We Build Security for People (2016-09-06) duo.com
?Catastrophic? DDoS Attack Pummels Linode Servers over Labor Day Weekend (2016-09-06) www.itsecurityguru.org
Tweet: How Dwolla reduced fraud by 50% with Sift Science https://t.co/cYE2FfTFGg https://t.co/HM2gjcaqI5 (2016-09-06) twitter.com
Intel Security Spins Off To Private Equity In $4.2B Deal (2016-09-07) www.crn.com
ISPs treat cyber security as a top priority (2016-09-07) www.itsecurityguru.org
The security industry needs updating ? not just the cyber one (2016-09-07) disruptiveviews.com
Optimizing time allocation for network defence (2016-09-07) cybersecurity.oxfordjournals.org
Brazzers Porn Forum Hacked, User Data Exposed (2016-09-07) www.pcmag.com
Get Smarter About Threat Intelligence (2016-09-07) www.darkreading.com
Gugi malware targets Android banking apps, bypasses Marshmallow permission feature (2016-09-07) www.itsecurityguru.org
Data Breaches At U.S. Office Of Personnel Management Was Preventable, Investigation Finds (2016-09-07) www.huffingtonpost.com
How Can I Move To Public Cloud And Still Stay Secure? (2016-09-07) dyn.com
Tweet: How to steal any developer#039;s local database https://t.co/uJSIznIkYx by @bvdbijl (2016-09-07) twitter.com
One Cryptomalware Attack Can Cost an SMB up to $99K (2016-09-08) www.itsecurityguru.org
Chrome to start labeling HTTP connections as non-secure (2016-09-08) www.zdnet.com
Help Us to Help You Get to the Next Big Thing in DNS Security (2016-09-08) community.infoblox.com
Yelp Launches Public Bug Bounty Program (2016-09-08) www.pcmag.com
Google Chrome to start marking HTTP connections as insecure (2016-09-08) www.pcworld.com
Partners, Analysts Thrilled By Intel Security Deal To Become Stand-Alone Security Vendor (2016-09-08) www.crn.com
Printers now the least-secure things on the internet (2016-09-08) www.itsecurityguru.org
Securing the Skies: Cybersecurity in Aviation (2016-09-08) www.csoonline.com
Next-generation security means a step beyond people, process and technology (2016-09-08) www.itsecurityguru.org
HackProof Systems Challenges Hackers To Breach Server Security (2016-09-08) www.darkreading.com
Data hoarders are shining a spotlight on past breaches (2016-09-08) www.pcworld.com
Hedge Fund and Cybersecurity Firm Team Up to Short-Sell Device Maker (2016-09-08) www.nytimes.com
The Security Risks of Third-Party Data (2016-09-08) thelasttechie.com
A Software-Defined Approach to Networking and Security (2016-09-08) thenewstack.io
Chromium Blog: Moving Towards a More Secure Web (2016-09-08) blog.chromium.org
IoT Pilots should include basic security functional elements for experience Mastering IoT security means mastering new security techniques | Constellation Research Inc. (2016-09-08) www.constellationr.com
Clash of Ops: How Security turns Stateless into Stateful (2016-09-08) devcentral.f5.com
App Shopper: AntiKeylogger Doctor - AntiVirus keylogger scanner remover (Utilities) (2016-09-08) appshopper.com
Intel Spins Off McAfee to Private Equity Firm (2016-09-09) www.pcmag.com
The dangers of connecting phones to connected cars (2016-09-09) www.itsecurityguru.org
Leading Cybersecurity Companies Create Connected Security Alliance to Solve the Data Breach Problem (2016-09-09) www.itsecurityguru.org
The How and Why of Container Vulnerability Management (2016-09-09) blog.openshift.com
USBKill Power Surge Test Tool can Blow Up and Damage Any PC, Laptop or TV (2016-09-09) www.itsecurityguru.org
Tweet: Cloudflare has graciously arranged to host the vDOS attack log, which is pretty large as text files go https://t.co/gfK3VdR0zn (2016-09-09) twitter.com
Hypervisor security ero-Xen: How guest VMs can hijack host servers (2016-09-10) www.theregister.co.uk
Application Firewall for Cisco ACI (2016-09-12) marketplace.cisco.com
The IoT and Cloud security measures ? not as well developed as needed (2016-09-12) www.designworldonline.com
Paladion Networks Launches New Security Service (2016-09-12) www.cxotoday.com
Security Certifications Highly Valued But Not Always Verified (2016-09-13) www.darkreading.com
How To Ensure Service Delivery: During DDoS Attacks (2016-09-13) dyn.com
Beware the Drive-by Attack (2016-09-13) www.itsecurityguru.org
The USB Killer Now Has Commercial Competition (2016-09-13) hackaday.com
A Moving Target: Tackling Cloud Security As A Data Issue (2016-09-13) www.darkreading.com
Portrait Of A Bug Bounty Hacker (2016-09-13) www.darkreading.com
Zero-day vulnerability found within MySQL database application (2016-09-13) www.zdnet.com
A total of 89 per cent of users wouldn?t know if their mobile device had been cyber attacked (2016-09-14) www.itsecurityguru.org
Keep It Simple: Security For A Complex Enterprise (2016-09-14) www.darkreading.com
324,000 Financial Records with CVV Numbers Stolen From A Payment Gateway (2016-09-14) www.itsecurityguru.org
Volkswagen is founding a new cybersecurity firm to prevent car hacking (2016-09-14) www.pcworld.com
Security through Community: Introducing the Vendor Security Alliance (2016-09-15) blog.docker.com
Data Loss Risks Rise In The Age Of Collaboration (2016-09-15) www.darkreading.com
Google Safe Browsing API is here to make Android apps a whole lot safer from malware (2016-09-15) www.digitaltrends.com
Use Intelligent IPAM to Better Secure your Network from Rogue and Infected Devices (2016-09-15) community.infoblox.com
Stop Blaming Users. Make Security User-Friendly. (2016-09-15) www.darkreading.com
Google Chrome To Flag Non-HTTPS Logins, Credit Card Info Not Secure (2016-09-15) www.darkreading.com
Industrial Internet Consortium Delivers Industrial Internet Security Framework (2016-09-19) dzone.com
Industrial IoT is inching toward a consensus on security (2016-09-19) www.pcworld.com
What Smart Cities Can Teach Enterprises About Security (2016-09-19) www.darkreading.com
Webroot Expands Network Security, IoT Capabilities With Acquisition Of CyberFlow Analytics (2016-09-19) www.crn.com
Researcher Finds Nearly 800,000 FTP Servers Accessible without Authentication (2016-09-19) continuum.cisco.com
Demystifying Threat Intelligence (2016-09-19) community.infoblox.com
Hacking WordPress Sites on Shared Servers (2016-09-19) blog.sucuri.net
Internet of Things Security from the Ground Up (2016-09-20) www.codeproject.com
More Than 90 Percent of European Businesses Have Been Hit by a Data Breach (2016-09-20) continuum.cisco.com
BooleBox: The Top Secure Solution To Protect Your Companys Sensitive Data (2016-09-20) www.darkreading.com
Rise Of Machine Learning: Advancing Security With ML (2016-09-20) www.darkreading.com
GitHub - massivedynamic/openftp4: A list of all FTP servers in IPv4 that allow anonymous logins. (2016-09-20) github.com
PowerUpSQL - A PowerShell Toolkit for Attacking SQL Server (2016-09-20) www.digitalmunition.me
Insurer Warns of Drone Hacking Threat (2016-09-20) www.infosecurity-magazine.com
Study finds smart home tech gaining in popularity, yet still woefully insecure (2016-09-21) www.itsecurityguru.org
Kaspersky Lab Expands Its Threat Intelligence Platform (2016-09-21) www.cxotoday.com
HTML standardization group calls on W3C to protect security researchers from DRM (2016-09-22) www.eff.org
7 Ways Cloud Alters The Security Equation (2016-09-22) www.darkreading.com
Box Announces Four New Security and Governance APIs (2016-09-22) www.programmableweb.com
Why it?s time to start developing a drone security strategy (2016-09-22) www.networkworld.com
DHS Assistant Secretary: Internet Of Things Security Is A Public Safety Issue (2016-09-22) www.crn.com
7 Factors That Make Security Organizations More Effective (2016-09-22) www.darkreading.com
How Security Enables Digital Transformation (2016-09-22) dzone.com
10 Ways To Lock Down Third-Party Risk (2016-09-22) www.darkreading.com
Securing API against DDoS attacks (2016-09-23) security.stackexchange.com
How Dropbox Scaled and Secured their API (2016-09-24) www.programmableweb.com
State Of The Exploit Kit (2016-09-26) www.darkreading.com
Reshaping web defenses with strict Content Security Policy (2016-09-26) security.googleblog.com
Partners Cheer Microsofts Product Moves Around Security, Cloud And Containers (2016-09-26) www.crn.com
API Best Practices: Security (2016-09-26) apigee.com
Skyhigh Networks raises $40m funding to tap cloud security market (2016-09-26) www.cbronline.com
Yahoo Sued By User Over 2014 Hacking (2016-09-27) www.darkreading.com
Hack It Yourself Before Getting Hacked (2016-09-27) www.cxotoday.com
MA: Is Security Industry Set For A Paradigm Shift? (2016-09-27) www.cxotoday.com
Yahoo! data dump indicates need for web monitoring (2016-09-27) www.itsecurityguru.org
Spamhaus Warns of a Rise in IPv4 Network Hijacks (2016-09-27) www.itsecurityguru.org
Microsoft leads $9 million investment round in container security startup Aqua Security (2016-09-27) www.zdnet.com
Automation, AI among key takeaways for security execs, ecosystem (2016-09-27) www.zdnet.com
Will Yahoo?s Data Breach Help Overhaul Online Security? (2016-09-27) knowledge.wharton.upenn.edu
Securing Your IoT Deployment (2016-09-27) www.codeproject.com
Progress on security for the Industrial Internet of Things (2016-09-28) disruptiveviews.com
Why and How Every Organization With APIs Must React Immediately to the Yahoo! Breach (2016-09-28) www.programmableweb.com
OnHub: Powerful protection for peace of mind (2016-09-28) security.googleblog.com
Yahoo failed to prioritize security: report (2016-09-28) thehill.com
How to Engage Developers in App Security (2016-09-28) dzone.com
Improving Security Savvy Of Execs And Board Room (2016-09-28) www.darkreading.com
Malware Tries to Detect Test Environment (2016-09-28) www.schneier.com
Invest in Cloud Security With a 4-Point Plan (2016-09-28) dzone.com
API Security: Keeping Data Private but Accessible (2016-09-28) dzone.com
Fast Security Is Not Always High Security (2016-09-28) dzone.com
More Than Half Of IT Pros Employ Insecure Data Wiping Methods (2016-09-28) www.darkreading.com
Dont Hide DRM in a Security Update (2016-09-28) www.eff.org
Army of webcams used in net attacks (2016-09-29) www.bbc.co.uk
A Bug Bounty Reality-Check (2016-09-29) www.darkreading.com
Cloudflare#039;s Traffic Control Could Be Used to Target Specific API Security Concerns (2016-09-29) www.programmableweb.com
Enhanced third-party access protection for Google Sheets (2016-09-29) gsuite-developers.googleblog.com
Containers, Security, and Double Dipping (2016-09-29) dzone.com
Fear Loathing In The Cloud (2016-09-29) www.darkreading.com
NHS Digital aims to put healthcare on firm cyber security footing (2016-09-29) www.itsecurityguru.org
Data Protection By Design (2016-09-29) pkware.cachefly.net
Time to Kill Security Questions?or Answer Them With Lies (2016-09-29) www.wired.com
Ransomware spreads through weak remote desktop credentials (2016-09-30) www.pcworld.com
EFF Asks Court to Block U.S. From Prosecuting Security Researcher For Detecting and Publishing Computer Vulnerabilities (2016-09-30) www.eff.org
Eight Big Data Security Issues in the Enterprise (2016-09-30) dzone.com
A Yahoo insider believes the hackers could really have stolen over 1 billion accounts (YHOO) (2016-09-30) www.businessinsider.com
Yahoo hack may become test case for SEC data breach disclosure rules (2016-09-30) www.reuters.com
Your next DDoS attack, brought to you courtesy of the IoT (2016-10-01) boingboing.net
What Does the Massive Yahoo Hack Mean for Banks? (2016-10-01) bankinnovation.net
Tweet: How to ensure your #APIs aren#039;t naked https://t.co/uMVx2xRuLe #Security https://t.co/GMocO04tBk (2016-10-01) twitter.com
Box Introduces Four New Security and Governance APIs (2016-10-02) www.infoq.com
IoT botnet highlights the dangers of default passwords (2016-10-03) www.pcworld.com
Security Design: Stop Trying to Fix the User (2016-10-03) www.schneier.com
Who Makes the IoT Things Under Attack? (2016-10-03) krebsonsecurity.com
Homeland Security Warns Certain Huawei Devices Vulnerable To DDoS (2016-10-04) www.itsecurityguru.org
Organisations a long way from plugging the gaps in their IT estate to prevent data leakage (2016-10-04) www.itsecurityguru.org
Assembling a Container Security Program [New Series] (2016-10-04) www.securosis.com
Have hackers turned my printer into an offensive weapon? (2016-10-04) www.bbc.co.uk
Johnson Johnson says insulin pump could be hacked (2016-10-04) www.bbc.co.uk
Some insulin pumps vulnerable to hacks (2016-10-04) thehill.com
Securing Every Application (2016-10-04) duo.com
Defining Security Automation Goals (Part I) (2016-10-04) blogs.adobe.com
Akamai buys Soha Systems to add more security to its cloud networking business (2016-10-04) techcrunch.com
Is WhatsApp Hacked? (2016-10-04) www.schneier.com
Akamai acquires enterprise security firm Soha (2016-10-04) www.zdnet.com
OTA Issues Checklist For Securing IoT Devices (2016-10-05) www.darkreading.com
BRIEF-U.S. Department of Homeland Security warns on vulnerabilities in JJ insulin pumps (2016-10-05) www.reuters.com
Arizona Official Says Hack Of Voter Data Came Via Employee Email (2016-10-06) www.darkreading.com
Urgent security shift required as severity of data breaches continues (2016-10-06) www.itsecurityguru.org
Apigee Sense Protection: Act on Threats to Your APIs (2016-10-06) apigee.com
(2016-10-06) www.itsecurityguru.org
Group Security in the Firebase Database (2016-10-06) firebase.googleblog.com
Tweet: Apigee Sense Protection: Take action on threats to your #APIs https://t.co/Ozl1stzpLB (2016-10-06) twitter.com
Data Science Security: Overcoming The Communication Challenge (2016-10-07) www.darkreading.com
Software-Defined Security: The Missing Piece in Your SDDC Strategy (2016-10-07) sdn.cioreview.com
Bruce Schneier: ?We Need to Save the Internet From the Internet of Things? (2016-10-07) motherboard.vice.com
Should the Government Be More Involved in IoT Security? (2016-10-10) continuum.cisco.com
Black Hat Europe 2016: BooleBox: A New Perspective On Enterprise Data Protection (2016-10-10) www.darkreading.com
Securing the Digital Enterprise with API Management (2016-10-10) www.tibco.com
Tweet: Europe to push new security regulations amid IoT mess https://t.co/0ZtGpQsek6 (2016-10-10) krebsonsecurity.com
A new security imperative (2016-10-11) blogs.ca.com
Where Is Your Data Safer? In the Cloud Or On Premise? (2016-10-11) resources.infosecinstitute.com
NTT Security Standardizes Managed Security Services Offerings On Qualys (2016-10-11) www.crn.com
DDOS Protection for Public Cloud Customers (2016-10-11) resources.infosecinstitute.com
BRIEF-Prevas participates in research project within IoT security (2016-10-11) www.reuters.com
Say Cheese - a snapshot of the massive DDoS attacks coming from IoT cameras (2016-10-11) blog.cloudflare.com
Security Awareness Training Anti-Phishing Simulation (2016-10-11) securityiq.infosecinstitute.com
Eko Malware Targets Facebook Users (2016-10-12) www.itsecurityguru.org
Attackers Exploit Weak IoT Security (2016-10-12) www.darkreading.com
Internet Routing Security Effort Gains Momentum (2016-10-13) www.darkreading.com
7 Ways Electronic Voting Systems Can Be Attacked (2016-10-13) www.darkreading.com
IoT Default Passwords: Just Dont Do It (2016-10-13) www.darkreading.com
Keep IoT A-OK ? Hackers Capitalise on Software Vulnerabilities (2016-10-13) www.itsecurityguru.org
Almost 6,000 online shops hit by hackers (2016-10-13) www.bbc.co.uk
IoT Devices as Proxies for Cybercrime (2016-10-13) krebsonsecurity.com
Vera Bradley Stores Report Payment Card Breach (2016-10-13) www.darkreading.com
ICS-CERT issued advisory ICSA-16-287-01 OSIsoft PI Web API 2015 R2 Service Acct Permissions Vuln to ICS-CERT (2016-10-13) ics-cert.us-cert.gov
12-year-old SSH vulnerability in IoT devices being abused (2016-10-13) www.itproportal.com
Splunk Cisco Web Security Appliance (WSA) ? BFF: ?Dear IT-Admin: My Internet is so slow? (2016-10-14) blogs.splunk.com
VMware vSphere hardening for virtual machine security with Puppet (2016-10-14) puppet.com
Instegogram: Leveraging Instagram for C2 via Image Steganography (2016-10-14) www.endgame.com
Security Insights into the LXD Container Hypervisor (2016-10-15) www.infoq.com
WhatsApp has made too many compromises that put user security and privacy at risk. (2016-10-15) www.eff.org
How We See the Future of Information Security (2016-10-17) resources.infosecinstitute.com
RSA Execs: Future Is Bright For Security Partners (2016-10-18) www.crn.com
SITA Completes ISO Certification for Information Security at Changi Airport (2016-10-18) airfax.com
Public Wi-Fi Use Grows, Despite Security Risks (2016-10-18) www.darkreading.com
The Dangers of In-Flight Wi-Fi: Airplanes ?Unique? Hacking Grounds (2016-10-19) netguide.co.nz
Walking the Tight Rope of REST API Security: Best Practices Will Hold You Steady (2016-10-19) blog.smartbear.com
ThreatConnect Shares Incident Information on Major Financial Institution Domain Squat (2016-10-19) www.threatconnect.com
Survey findings reveal that most businesses don?t have comprehensive programs to tackle firmware security risks (2016-10-19) www.itsecurityguru.org
How Vendors Are Moving Beyond IoT Security Concerns (2016-10-19) www.crn.com
In-Flight Wi-Fi: Latest Attack Vector for Cyber Theft Requires VPN Protection (2016-10-19) www.itwire.com
How to Protect Civil Aviation From Cyberattacks (2016-10-19) aviationweek.com
Grey Hats and Blue Skies, Dealing with Airline Security (2016-10-19) www.csoonline.com
(2016-10-19) www.codeproject.com
Warning About In-Flight Wi-Fi (2016-10-19) www.photoreview.com.au
The Importance of Securing Your Database (and the Cost of Failure) (2016-10-20) dzone.com
(2016-10-20) www.itsecurityguru.org
7 Great Tips to Get the Most Out of Your Threat Intelligence with Infoblox (2016-10-20) community.infoblox.com
?The need to stay alert as data breach costs rise? (2016-10-21) www.itsecurityguru.org
IT Asset Management: A Key in a Consistent Security Program (2016-10-21) blogs.adobe.com
Flipping Security Awareness Training (2016-10-21) www.darkreading.com
ThreatConnect Shares Incident Information on a Phishing Page Serving Fake Login for University (2016-10-21) www.threatconnect.com
Making Smart Cities Safe In The IoT Era (2016-10-31) www.cxotoday.com
How Network Security is Compromised by Advanced Threats (2016-10-31) resources.infosecinstitute.com
Microsoft Launches Security Program For Azure IoT (2016-10-31) www.darkreading.com
Google Security Engineer Claims Android Is Now As Secure as the iPhone (2016-11-01) motherboard.vice.com
NCCIC/ICS-CERT Advanced Analytical Laboratory Malware Trends White Paper (2016-11-01) ics-cert.us-cert.gov
A security breach greater than Gatsby (2016-11-01) blogs.ca.com
Tips for Building a Safe and Secure API (2016-11-01) psdtoblog.wordpress.com
Why Enterprise Security Teams Must Grow Their Mac Skills (2016-11-01) www.darkreading.com
LastPass on mobile is now free (2016-11-02) techcrunch.com
Why Light Bulbs May Be the Next Hacker Target (2016-11-02) www.nytimes.com
Hackers hustle to hassle un-patched Joomla! sites (2016-11-02) www.itsecurityguru.org
How Hackers Could Steal Your Cellphone Pictures From Your IoT Crock-Pot (2016-11-02) motherboard.vice.com
LastPass Offers Free Password Sync Across Devices (2016-11-03) www.darkreading.com
The Internet of Things Got Hacked (2016-11-03) blog.opto22.com
Heisenberg Cloud Spots Exposed Database Services, Misconfigurations (2016-11-03) www.darkreading.com
Box beefs up cloud storage security and IT controls (2016-11-05) www.huntnews.in
How to Build Security Into the QA Cycle (2016-11-05) dzone.com
Changing IoT Passwords Wont Stop Attacks. Heres What Will. (2016-11-07) www.darkreading.com
Firefox Removing Battery Status API (2016-11-07) www.schneier.com
At last security for the IIoT is high on the agenda ? for most (2016-11-08) disruptiveviews.com
Limiting Damage from Data Breaches (2016-11-08) dzone.com
The 7 Types Of Security Jobs, According To NIST (2016-11-08) www.darkreading.com
Managing Vendor Security Risk (2016-11-08) dzone.com
How to avoid a self-inflicted DDoS Attack (2016-11-09) cloudplatform.googleblog.com
Your Network, IoT, Cloud Computing, And The Future (2016-11-09) dyn.com
Open Database Exposes Millions of Job Seekers? Personal Information (2016-11-10) motherboard.vice.com
How Security Scorecards Advance Security, Reduce Risk (2016-11-10) www.darkreading.com
Self-Propagating Smart Light Bulb Worm (2016-11-10) www.schneier.com
Signing into One Billion Mobile App Accounts Effortlessly with OAuth2.0 (2016-11-12) www.blackhat.com
More cyber thefts, new hacking tactics confirmed by SWIFT (2016-12-13) disruptiveviews.com
Scammers spreading celebrity nude PDFs on Facebook, pushing malware installation (2016-12-13) www.itsecurityguru.org
Skype and WhatsApp face tougher EU customer data security rules (2016-12-13) disruptiveviews.com
FACT SHEET: Release of the Joint United States-Canada Electric Grid Security and Resilience Strategy (2016-12-13) ics-cert.us-cert.gov
Cyber attacks on Swift payment network are continuing – and are succeeding (2016-12-13) www.itsecurityguru.org
Yahoo Says 1 Billion User Accounts Were Hacked (2016-12-14) www.nytimes.com
Security Assessment and Testing (2016-12-14) resources.infosecinstitute.com
Yahoo discloses hack of 1 billion accounts (2016-12-14) thehill.com
Biometric Vehicle Access System Market by Authentication type, Future Technology, Vehicle Type, and Region - Global Forecast to 2021 (2016-12-14) oliberta.com
Anti-Malware Is Necessary In The Data Center: 3 Examples (2016-12-14) www.darkreading.com
Vendor Accountability The Security Supply Chain (2016-12-14) www.darkreading.com
Feature announcement: advanced permissions (2016-12-14) postmarkapp.com
Yahoo says one billion accounts exposed in newly discovered security breach (2016-12-14) www.reuters.com
Study: Bounty Hunters Expect Open Communication above Payouts (2016-12-15) continuum.cisco.com
Security Operations (2016-12-15) resources.infosecinstitute.com
Data Center Physical Security (2016-12-15) resources.infosecinstitute.com
Microsoft Execs: Identity, Threat Intelligence Driving Companys Security Strategy (2016-12-15) www.darkreading.com
Yahoo Data Breach: What Do I Do Now? (2016-12-15) www.privacyrights.org
Understanding Access Control (2016-12-15) resources.infosecinstitute.com
Yahoo Reveals Biggest Hack; Over 1Bn Accounts Compromised (2016-12-15) www.cxotoday.com
Software-defined security for burnout avoidance (2016-12-15) blog.cloudpassage.com
Centralized Security Governance Practices To Help Drive Better Compliance (2016-12-15) blogs.adobe.com
Commerce survey: Cyber researchers fear legal repercussions (2016-12-15) thehill.com
Embedded Devices and Cyber Security (2016-12-15) resources.infosecinstitute.com
Self-driving cars are prone to hacks — and automakers are barely talking about it (2016-12-15) www.businessinsider.com
Hurricanes, Earthquakes Threat Intelligence (2016-12-15) www.darkreading.com
Malvertising campaign targets routers and every device connected to router (2016-12-15) www.itsecurityguru.org
Confidential Blog Post On Email Security (2016-12-15) ctovision.com
Database Architecture and Security (2016-12-15) resources.infosecinstitute.com
Stolen Yahoo User Data Sold for $300K (2016-12-16) www.pcmag.com
Using Authy Two-Factor Authentication in Node.js and AngularJS (2016-12-16) dzone.com
NAB accidentally sends out overseas customers banking details (2016-12-16) www.newsjs.com
Feedback from The Apache Software Foundation on the Free and Open Source Security Audit (FOSSA) (2016-12-16) blogs.apache.org
What the Galactic Empire Could Learn From OWASP (2016-12-17) stormpath.com
Bug Bounty: Is It The Right Solution to Catching Security Threats? (2016-12-18) dzone.com
Britain urged to increase cyber security in financial services (2016-12-18) www.reuters.com
Insurers handling hundreds of breach claims (2016-12-18) www.bbc.co.uk
Top 5 REST API Security Guidelines (2016-12-18) news.securemymind.com
LinkedIns skill learning unit Lynda.com hit by hack (2016-12-19) www.pcworld.com
In the Eye of Hailstorm (2016-12-19) blog.opendns.com
Project Wycheproof (2016-12-19) security.googleblog.com
Ciscos Vision of Next Generation Cybersecurity (2016-12-19) guardtime.com
Hide My WP - Amazing Security Plugin for WordPress! (2016-12-27) www.telechargementsz.com
The carrot and stick of data breaches (2016-12-27) techcrunch.com
8 Boldest Security Predictions For 2017 (2016-12-27) www.darkreading.com
WordPress: block anonymous Rest API access (2016-12-27) hacker-bot.tumblr.com
The 10 Biggest Data Breaches Of 2016 (2016-12-28) www.crn.com
Mozilla Releases Security Update (2016-12-28) www.us-cert.gov
WordPress: block anonymous Rest API access (2016-12-28) www.ghacks.net
Introducing Advanced Features in Zoho Vault to Curb Security Threats and Boost Productivity (2016-12-29) www.zoho.com
InterContinental Hotels Probes Possible Card System Breach (2016-12-29) www.darkreading.com
Secure Messaging Takes Some Steps Forward, Some Steps Back: 2016 In Review (2016-12-29) www.eff.org
Most Young Gig Economy Companies Way Behind On Protecting User Data: 2016 In Review (2016-12-29) www.eff.org
NH Department of Health and Human Services Announces Data Breach (2016-12-29) www.itsecurityguru.org
Effects of the 2011 DigiNotar Attack (2016-12-29) www.schneier.com
The Bug Bounty Model: 21 Years Counting (2016-12-29) www.darkreading.com
The economics of mandatory security breach reporting to authorities (2016-12-30) cybersecurity.oxfordjournals.org
Risky business: Fine-grained data breach prediction using business profiles (2016-12-30) cybersecurity.oxfordjournals.org
OWL Insecure Internet of Energy Monitors (2017-01-02) hackaday.com
The Age of Resilience – Security in 2017 (2017-01-02) techcrunch.com
German fintech company N26 left red-faced after security hole discovered (2017-01-02) disruptiveviews.com
Be Prepared for Many More Data Breaches This Year (2017-01-02) www.cxotoday.com
Connect and HTTP Strict Transport Security (2017-01-03) blogs.adobe.com
Topps, maker of sports cards, discloses data breach (2017-01-03) www.itsecurityguru.org
Class Breaks (2017-01-03) www.schneier.com
The Maximus Smart Motion Security Light looks like it could light up a prison yard (2017-01-04) www.pcworld.com
Data breach exposes US Army doctor details (2017-01-04) www.itsecurityguru.org
System Configuration of Biometrics-The Network Topologies (2017-01-04) resources.infosecinstitute.com
IT security sucks — part 2 (2017-01-04) blog.cloudpassage.com
FTC Launches Contest For Technology Tool To Protect Home IoT Devices (2017-01-04) www.darkreading.com
The FTC’s Internet of Things (IoT) Challenge (2017-01-04) krebsonsecurity.com
FTC launches $25K internet-of-things security challenge (2017-01-04) thehill.com
Bitdefender’s second Bitdefender Box sniffs your home’s network to detect hackers (2017-01-04) www.macworld.com
Hackers could explode horribly insecure smart meters, pwn home IoT (2017-01-04) www.itsecurityguru.org
The future for APIs - how management and security will have to come of... (2017-01-04) www.idgconnect.com
FTC Files Complaint Against D-Link Over Router, Camera Security Issues (2017-01-05) www.crn.com
MongoDB and Ransomware (2017-01-05) www.compose.com
The U.S. government showed just how easy it is to hack drones (2017-01-05) www.recode.net
UPDATE 1-U.S. sues D-Link, alleges lax security in routers, cameras (2017-01-05) www.reuters.com
The BC/DR Impact of GDPR (2017-01-05) www.itsecurityguru.org
Think Like a Hacker (2017-01-05) community.infoblox.com
Ghost Hosts Bypass URL Filtering (2017-01-05) www.darkreading.com
Penetration Testing and the Law (2017-01-05) resources.infosecinstitute.com
The (In)Security of IoT (2017-01-05) www.forumsys.com
CISSP Risk Management Concepts 2 (2017-01-05) resources.infosecinstitute.com
Feds allege security flaws in D-Link routers, cameras (2017-01-05) thehill.com
Mitigating Access Control Attacks (2017-01-05) resources.infosecinstitute.com
Ransomware Attackers Are Going Old School with Social Engineering (2017-01-06) continuum.cisco.com
D-Link Calls The FTCs Router And IP Camera Security Allegations Baseless (2017-01-06) www.crn.com
New Android Malware Attacks Your Wireless Router Through Your Phone (2017-01-06) www.itsecurityguru.org
OWASP Security Knowledge Framework: The Missing Tutorial (2017-01-06) dzone.com
FTC Sues D-Link Over Insecure Routers, Cameras (2017-01-06) www.pcmag.com
FTC Charges D-Link With Unsecure Routers And IP Cameras (2017-01-06) www.darkreading.com
The Advantages and Benefits of Automating Web Security (2017-01-06) resources.infosecinstitute.com
The CISSP CBK Domains: Info and Updates (2017-01-09) resources.infosecinstitute.com
Communications and Network Security (2017-01-09) resources.infosecinstitute.com
Krebs’s Immutable Truths About Data Breaches (2017-01-09) krebsonsecurity.com
The Secrets of Wi-Fi Credentials (2017-01-09) www.codeproject.com
Foundational Security Operations Concepts (2017-01-09) resources.infosecinstitute.com
Security Governance Principals (2017-01-09) resources.infosecinstitute.com
Stock-tanking in St. Jude Medical security disclosure might have legs (2017-01-09) www.pcworld.com
The Porcupine Attack: investigating millions of junk requests (2017-01-09) blog.cloudflare.com
Tweet: The GitHub Bug Bounty is turning three, which makes it about 95% potty trained. Let#039;s celebrate with payout bonuses! https://t.co/FbMRcNcjDd (2017-01-09) github.com
Gogo Inflight Wi-Fi Boosts Security with Bug Bounty Program (2017-01-10) www.eweek.com
The Best Techniques to Avoid Phishing Scams (2017-01-10) resources.infosecinstitute.com
Security talks at Google during the RSA Conference (2017-01-10) cloudplatform.googleblog.com
FTC Offers $25K for IoT Security Fix (2017-01-10) www.pcmag.com
Extortionists Wipe Thousands of Databases, Victims Who Pay Up Get Stiffed (2017-01-10) krebsonsecurity.com
Bug Uncovered in St. Jude Medical Pacemakers, Defibrillators (2017-01-10) www.pcmag.com
Troy Hunt: A data breach investigation blow-by-blow (2017-01-10) www.troyhunt.com
Improving Visibility in Security Operations with Search-Driven Lookups (2017-01-11) blogs.splunk.com
Google Cloud Platform launches Key Management Service in beta (2017-01-11) marketingnewsweb.wordpress.com
New Cybersecurity Regulation for NY Financial Services (2017-01-11) duo.com
Latest Trends in Cybersquatting (2017-01-11) resources.infosecinstitute.com
Credit Freeze: The New Normal In Data Breach Protection? (2017-01-11) www.darkreading.com
Google’s Cloud Platform gets a new key management service (2017-01-11) techcrunch.com
Managing encryption keys in the cloud: introducing Google Cloud Key Management Service (2017-01-11) cloudplatform.googleblog.com
Browser Autofill – Convenient, but Dangerous to Your Security (2017-01-11) www.eagleeyenetworks.com
ISC Releases Security Updates for BIND (2017-01-11) www.us-cert.gov
How we secure our infrastructure: a white paper (2017-01-12) cloudplatform.googleblog.com
Twofish Power Analysis Attack (2017-01-12) www.schneier.com
Corporate financial data theft and customer information breaches are top two cyber concerns plaguing enterprises (2017-01-12) www.itsecurityguru.org
Security Through Transparency (2017-01-12) security.googleblog.com
EU Dissatisfied With US Clarification On Yahoo Secret Email Scan (2017-01-12) www.darkreading.com
Security overtakes availability as main priority for application deployment (2017-01-12) www.itsecurityguru.org
GitHub - google/key-transparency: A transparent and secure way to look up public keys. (2017-01-12) github.com
Tweet: Amazon CloudWatch Logs receives Provisional FedRAMP-High Authorization to Process Sensitive Government Log Data.hellip; https://t.co/bTaIcBgkWy (2017-01-12) twitter.com
5 Fundamental Security Features your Industrial Assets Must Have (2017-01-13) blog.opto22.com
It turns out that halfway clever phishing attacks really, really work (2017-01-13) boingboing.net
TruffleHog Sniffs Github for Secret Keys (2017-01-13) hackaday.com
Setting up DMARC to Defeat Email Abuse (2017-01-13) bhconsulting.ie
Dont Let Your Apps and Databases Become a Ransomware Targets: How to Protect Your Database (2017-01-13) dzone.com
Most Businesses Fail To Secure Customer Data: Study (2017-01-16) www.cxotoday.com
Critical flaw lets hackers take control of Samsung SmartCam cameras (2017-01-16) www.pcworld.com
10 Security Vulnerabilities That Broke the World Wide Web in 2016 (2017-01-16) resources.infosecinstitute.com
EZVIZ Husky review: This weatherproof camera gives you an eye on the outside of your home (2017-01-16) www.pcworld.com
Apex Predator: Everything You Need To Know About Alias Solutions (2017-01-17) dyn.com
API Security: An Overview (2017-01-17) dzone.com
Google reveals how it flagged 25,000 Android apps for malware (2017-01-18) thenextweb.com
OptoNews: New blog posts on security in automation (2017-01-18) blog.opto22.com
Confessions of a “Hacker” and How to Protect Your Enterprise (2017-01-18) www.bmc.com
Self-Service IT Thrives in the Clouds (2017-01-18) www.bmc.com
Mobile Security Gap Threatens Enterprises (2017-01-18) www.darkreading.com
Endpoint Detection and Response: 3 Ways to Implement an EDR Capability in Your Security Program (2017-01-18) www.redcanary.com
App Security Improvements: Looking back at 2016 (2017-01-19) security.googleblog.com
The 4 Top Barriers To Effective Incident Response (2017-01-19) www.darkreading.com
IC3 Warns of Employment Scams Targeting College Students (2017-01-19) www.us-cert.gov
Building and Securing Koa and Angular 2 with JWT (2017-01-19) auth0.com
Security Awareness Training for the European Union General Data Protection Regulation (EU GDPR) (2017-01-19) resources.infosecinstitute.com
Attackers start wiping data from CouchDB and Hadoop databases (2017-01-19) www.pcworld.com
An Introduction to tmux (2017-01-19) resources.infosecinstitute.com
Dont Fall for This Sophisticated Gmail Phishing Scam (2017-01-19) www.pcmag.com
Hacking the Army (2017-01-19) techcrunch.com
Number Of Data Breach Disclosures Jumped 40% in 2016 (2017-01-19) www.darkreading.com
Barracuda Networks Brings DevOps Processes to IT Security (2017-01-20) www.itbusinessedge.com
The command-line, for cybersec (2017-01-20) blog.erratasec.com
Army bug bounty program pays hackers #039;around $100,000#039; (2017-01-20) thehill.com
Handling HTTPS Requests With Akka-HTTPS Server (2017-01-20) dzone.com
Comodo: Massive Talent Shortage Driving Business To Security-As-a-Service Providers (2017-01-20) www.crn.com
BRIEF-Yahoo faces SEC probe over data breaches - CNBC, citing DJ (2017-01-22) www.reuters.com
Yahoo under SEC investigation for keeping the lid on data breaches for years (2017-01-23) thenextweb.com
Retailers, it’s time to reduce the hacker threat (2017-01-30) www.itsecurityguru.org
Data Asset Protection (2017-01-30) resources.infosecinstitute.com
Netflix Scam Spreads Ransomware (2017-01-30) www.darkreading.com
Securing APIs With Zato and Vault: Part I (2017-01-30) dzone.com
Cops use pacemaker data as evidence to charge homeowner with arson, insurance fraud (2017-01-30) www.networkworld.com
An Introduction to Threat Intelligence Feeds (2017-01-31) dzone.com
Tax Identity Theft Awareness Week (2017-01-31) www.us-cert.gov
Feature announcement: two-factor authentication (2017-01-31) postmarkapp.com
Easy-to-exploit authentication bypass flaw puts Netgear routers at risk (2017-01-31) www.pcworld.com
Over 300 Bn Passwords Will Be Prone To Cyber Attacks By 2020: Report (2017-01-31) www.cxotoday.com
Why Do Spammers Love The Internet Of Things? (2017-01-31) ctovision.com
Are IoT Devices Putting Your Organization at Risk? (2017-01-31) www.businessnewsdaily.com
Google Paid $3 Million To Bug Hunters In 2016 (2017-01-31) www.darkreading.com
Disclosure of Additional Security Fix in WordPress 4.7.2 (2017-02-01) wp-cron.com
WordPress Web API Vulnerability (2017-02-01) blogs.akamai.com
HPE Acquires Niara To Create What Keerti Melkote Is Calling The Industrys Top Visibility And Attack Detection System (2017-02-01) www.crn.com
Real-Time Security for AWS (2017-02-01) dzone.com
NHS staff trigger Google cyber-defences (2017-02-01) www.bbc.co.uk
Review of Approov for Mobile API Security (2017-02-02) nordicapis.com
Metasploit Can Now Be Directly Linked To Hardware For Vulnerability Testing (2017-02-02) www.darkreading.com
WordPress REST API Content Injection (2017-02-02) securityshelf.com
Children’s Medical Center Pays $3.2 Million Penalty Over Data Breach (2017-02-02) cyware.com
50 Percent of Americans Don’t Trust Institutions to Protect Their Data (2017-02-03) www.itsecurityguru.org
How Google Took on Mirai, KrebsOnSecurity (2017-02-03) krebsonsecurity.com
Banks Still Not Confident To Detect Cybersecurity Breach: Study (2017-02-03) www.cxotoday.com
InterContinental confirms payment card breach at 12 U.S. hotels (2017-02-03) www.reuters.com
WordPress Quietly Fixes Serious Security Flaw (2017-02-03) www.darkreading.com
IRS Warns Of New W-2 Phishing Attacks (2017-02-03) www.darkreading.com
Popular hacking tool, Metasploit security kit can now hack IoT devices... (2017-02-03) www.computermagazine.com
When youre under cyberattack, silence isnt golden (2017-02-04) www.americanbanker.com
Cybercriminals are biting into Android users’ banking data while banks not moving fast enough to adopt preventative technology (2017-02-06) www.itsecurityguru.org
A Hacker Just Pwned Over 150,000 Printers Left Exposed Online (2017-02-06) www.itsecurityguru.org
WordPress REST API Vulnerability is Being Actively Exploited, Hundreds of Thousands of Sites Defaced (2017-02-06) wptavern.com
Darknet Forum Launches Its Own Bug Bounty Program (2017-02-06) continuum.cisco.com
Securing IoT devices from within (2017-02-06) gcn.com
Email authentication: improving awareness and adoption with “Deliverability Checkup” (2017-02-06) blog.mailup.com
The Web Bluetooth Security Model (2017-02-06) medium.com
Akamai Fortifies Web Security Solutions Portfolio (2017-02-07) www.benzinga.com
Researchers’ quantum hacking machine may help protect against quantum computing hacks (2017-02-07) www.itsecurityguru.org
Akamai fortifies security solutions portfolio (2017-02-07) www.totaltele.com
Akamai Beefs Up Web Security Services Line (2017-02-07) www.channelpartnersonline.com
Should Service Providers Turn DDoS Prevention into a Service? (2017-02-07) gigaom.com
Cryptkeeper Bug (2017-02-07) www.schneier.com
802.11s Security and Google WiFi (2017-02-07) security.googleblog.com
Draft: Financial Services – Financial API - Part 1: Read Only API Security Profile (2017-02-07) openid.net
Enterprise firewalls are man-in-the-middling HTTPS sessions like crazy, and weakening security (2017-02-08) boingboing.net
Visualizing 2016’s Top Threats (2017-02-08) blog.opendns.com
Yahoo hit with data-breach class-action lawsuit claiming credit-card details stolen (2017-02-08) www.siliconbeat.com
HackerOne scores $40 million investment as bug bounty platform growth continues (2017-02-08) techcrunch.com
Sophos Acquisition Targets Endpoint Security (2017-02-08) www.darkreading.com
Is Multifactor Authentication The Best Way To Secure Your Accounts? Myths And Reality (2017-02-08) auth0.com
Dutch Voter Guide Website Leak Highlights Privacy Concerns (2017-02-08) www.darkreading.com
Facebook Aims To Shape Stronger Security Practices (2017-02-08) www.darkreading.com
Load balancing combines DDOS prevention with application performance (2017-02-08) itknowledgeexchange.techtarget.com
How Retail Firms Can Counter Cyber Threats In The Digital Age (2017-02-08) www.cxotoday.com
Sports Direct hid data breach from staff (2017-02-09) www.bbc.co.uk
RSA 2017 prediction: endpoint security (2017-02-09) www.isvoc.com
Network Security Policy (2017-02-09) resources.infosecinstitute.com
Hanwha Techwin Smart Security Manager (2017-02-09) ics-cert.us-cert.gov
New Platform for Security Analysts (2017-02-09) dzone.com
Windows Trojan hacks into embedded devices to install Mirai (2017-02-09) www.pcworld.com
Channel Beat: ForeScout Technologies Announces a Partner Program, Cisco Umbrella Provides Secure Internet Gateway In Cloud (2017-02-10) www.crn.com
WordPress security weak spot lets hackers infiltrate and vandalise (2017-02-10) www.cbronline.com
Majority of Companies Still Struggle to Find Qualified Security Candidates (2017-02-13) continuum.cisco.com
Yelp’s bug bounty improves security and attracts talent (2017-02-13) techcrunch.com
Tenable Network Security expands partner ecosystem (2017-02-13) www.comms-dealer.com
Attackers Deface 1.5M Sites Using WordPress API Vulnerability (2017-02-13) continuum.cisco.com
Qualys brings web application security automation to a new level (2017-02-13) www.helpnetsecurity.com
Intel Security Mends Cybersecurity Fragmentation with Unifying Strategy (2017-02-14) newsroom.intel.com
London (API Summit) Calling: Is Your Modern Architecture Secure? (2017-02-14) www.forumsys.com
Anomali Talks Threat Intelligence Info Sharing (2017-02-14) www.darkreading.com
New Approach to Continuous Docker Container Security (2017-02-14) dzone.com
WordPress: A million sites defaced in attacker ‘feeding frenzy’ (2017-02-14) business-reporter.co.uk
ElasticSearch Ransomware Attacks Highlight Need for Better Security (2017-02-14) dzone.com
Man in the Cloud Attacks: Prevention and Containment (2017-02-15) resources.infosecinstitute.com
IoT Security: A Ways To Go, But Some Interim Steps For Safety (2017-02-15) www.darkreading.com
F-Secure Sense IoT Security Device Coming Soon (2017-02-15) www.pcmag.com
The Human Factor Remains Strong In Data Breach Incidents (2017-02-15) www.cxotoday.com
Study: Majority of Oil and Gas Orgs Are Highly Vulnerable, Few Have Plans to Fix It (2017-02-16) continuum.cisco.com
Alphabets Eric Schmidt: Security Is Key For Preserving Internet As We Know It (2017-02-16) www.crn.com
Launching our public bug bounty program (2017-02-16) medium.com
A Developer’s Stages of Grief After a Failed Security Assessment: Part One (2017-02-16) dzone.com
Seven Critical Steps to Revamp Your Enterprise Data Security (2017-02-17) dzone.com
Responsive Cookie Law Consent Notification (Miscellaneous) (2017-02-19) codecanyon.net
5 Cybersecurity Need-to-Knows When Preventing Expensive Data Breaches (2017-02-20) ctovision.com
Cisco Accelerates Digital Network Transformation with New Virtualization and Security Technologies (2017-02-21) newsroom.cisco.com
RSAC 2017: BeyondCorp - How Google Protects Its Corporate Security Perimeter Without Firewalls (2017-02-21) duo.com
Cross-Site Request Forgery is dead! (2017-02-21) scotthelme.co.uk
Meet Securitybot: Open Sourcing Automated Security at Scale (2017-02-22) blogs.dropbox.com
SGIP White Paper Addresses Protecting Smart Grids from Electromagnetic Phenomena (2017-02-22) www.remotemagazine.com
Using RASP to Make Bug Bounty Programs More Efficient (2017-02-22) dzone.com
Serverless REST API with Angular, Persistence and Security (2017-02-22) auth0.com
Tweet: After three years of Bug Bounty, @GitHubEng shared their blueprint for dealing with reports big and small.hellip; https://t.co/A1bLuZtC6K (2017-02-22) twitter.com
Incident report on memory leak caused by Cloudflare parser bug (2017-02-23) blog.cloudflare.com
Netflix Debuts Stethoscope Open-Source Security Tool (2017-02-23) www.darkreading.com
Survey: Most Attackers Need Less Than 12 Hours To Break In (2017-02-23) www.darkreading.com
Tweet: Incident report on memory leak caused by Cloudflare parser bug - https://t.co/rTZ4bFw3uJ (2017-02-23) twitter.com
Tweet: No 1Password data was put at risk through the bug reported earlier today. https://t.co/S7G62Qw85Q (2017-02-23) twitter.com
Suspect Arrested In Connection With Mirai Botnet (2017-02-24) www.darkreading.com
Cloudflare leak: Please reset your CCID password (2017-02-24) creativecommons.org
Missteps in Securing Autonomous Vehicles (2017-02-24) www.codeproject.com
DigitalOcean, Your Data, and the Cloudflare Vulnerability (2017-02-24) www.digitalocean.com
iPhone Robbers Try to iPhish Victims (2017-02-24) krebsonsecurity.com
Ransomware takes center stage at the RSA Conference (2017-02-24) blog.datagravity.com
Cloudflare’s bug bounty program is terrible (2017-02-24) thenextweb.com
Security should be top priority for mobile developers to protect consumers (2017-02-24) www.itsecurityguru.org
Cloudflare Leaked Web Customer Data For Months (2017-02-24) www.darkreading.com
Cloudflare data leakage doesn’t reveal 1Password secrets (2017-02-24) www.macworld.com
Partners: Cloudflare Software Bug Shows Need For Better Business Data Security Measures (2017-02-24) www.crn.com
How to secure your data after the Cloudflare leak (2017-02-24) techcrunch.com
Cloudflare Cyber Security Bug – CloudBleed (2017-02-27) www.eagleeyenetworks.com
Could you hack into a car? If so, a cyber security career awaits! (2017-02-27) www.itsecurityguru.org
Patients put at risk after 700,000 sensitive hospital letters go missing including test results from biopsies and patient treatment plans (2017-02-27) www.itsecurityguru.org
Internet-Connected Teddy Bear Leaked 2 Million Recordings of Parents and Kids (2017-02-27) motherboard.vice.com
CloudFlare states Adafruit not part of the @Cloudflare issue(s) #cloudbleed @adafruit (2017-02-27) blog.adafruit.com
Fintechs assure customers their data unaffected by Cloudbleed (2017-02-27) www.americanbanker.com
Debugging CDNs: A Need for Change (2017-02-27) blog.catchpoint.com
Data Handling Requirements (2017-02-27) resources.infosecinstitute.com
Tweet: RT @SlideWiki: Kurt talking about API security and using #kong https://t.co/egN8UWCV7K #SlideWiki hackathon V3.0 @VUamsterdam https://t.co/hellip; (2017-02-27) twitter.com
Proactively Responding to #CloudBleed with Splunk (2017-02-28) www.splunk.com
Targeted Attacks On Critical Infrastructure On The Rise (2017-02-28) www.cxotoday.com
Zones of Trust: A New Way of Thinking about IoT Security (2017-02-28) www.darkreading.com
Tweet: Quantifying the Impact of quot;Cloudbleedquot;: https://t.co/YrZlzAZKhj (2017-03-01) twitter.com
Tweet: Obsessed with the security of customer data? Ditto. We#039;re really excited to introduce you to Message Body Redactiohellip; https://t.co/2c0CC4lv4d (2017-03-01) twitter.com
Severe Security Vulnerabilities in Home, Business and Industrial Robots (2017-03-02) www.itsecurityguru.org
Hack Brief: A Slack Bug Could Have Been Everyone’s Worst Office Nightmare (2017-03-02) www.wired.com
Boeing data breach traced to employee who needed help from their spouse (2017-03-02) www.itsecurityguru.org
Whitelist Evasion Example: Threat Detection #723 (2017-03-02) www.redcanary.com
Buzzword Watch: Prosilience (2017-03-02) www.schneier.com
Australia’s ‘Essential Eight’ Sets the Standard for Sensitive Data Protection and Breach Notification (2017-03-02) www.carbonblack.com
Medical Devices Are the Next Security Nightmare (2017-03-02) www.wired.com
ThreatConnect Adds Seven Key Partners to its more than 100 Current... (2017-03-02) worldnews.se
Businesses Blame Rivals for Staging DDoS Attacks (2017-03-03) www.itsecurityguru.org
Healthcare facilities widely compromised by Medjack, malware that infects medical devices to steal your information (2017-03-03) boingboing.net
HackerOne Offers Free Service for Open Source Projects (2017-03-03) www.darkreading.com
Cloudpets Data Breach Affects Over 820,000 Customers (2017-03-03) auth0.com
Trustwave discovers hidden backdoor in Chinese IoT devices (2017-03-03) www.itsecurityguru.org
Tweet: We#039;re on the hunt for an experienced Security Compliance Analyst to oversee regulatory initiatives. Apply now:hellip; https://t.co/A9w9hvbZ1S (2017-03-03) twitter.com
Security News This Week: An IoT Teddy Bear Leaked Millions of Parent and Child Voice Recordings (2017-03-04) www.wired.com
WhiteHat Certified Secure Developer Program (2017-03-04) dzone.com
NEW FILELESS ATTACK USING DNS QUERIES TO CARRY OUT POWERSHELL COMMANDS (2017-03-06) www.itsecurityguru.org
Journalists: How hacking details matter (2017-03-06) blog.erratasec.com
Consumer Reports to grade tech products on security, privacy (2017-03-06) www.pcworld.com
CA to acquire security testing firm Veracode for $614M (2017-03-06) www.pcworld.com
Testing products for data privacy and security (2017-03-06) boingboing.net
ThreatConnect Announces Seven Partner Integrations (2017-03-07) www.dbta.com
WordPress 4.7.3 Fixes Cross Site Scripting Vulnerabilities (2017-03-07) shopmatrix.eu
Security considerations in a DevOps pipeline (2017-03-07) blog.cloudpassage.com
Nest Adds a Security Feature It Should Have Had All Along (2017-03-07) gizmodo.com
The Drive for Standardization (2017-03-08) blog.fortinet.com
The White House’s favorite ‘secure’ messaging app is riddled with bugs (2017-03-08) thenextweb.com
4 ways cyber attackers may be hacking your IoT devices (2017-03-08) thenextweb.com
An Authoritative Guide to CORS (Cross-Origin Resource Sharing) for REST APIs (2017-03-08) www.programmableweb.com
Nest Adds 2-Factor Authentication (2017-03-08) www.pcmag.com
Why Printers Still Pose a Security Threat (2017-03-08) www.darkreading.com
How to Protect Your Web Application Against DDoS Attacks by Using Amazon Route 53 and an External Content Delivery Network (2017-03-08) aws.amazon.com
Securing Todays Elastic Attack Surface (2017-03-09) www.darkreading.com
Most Federal Government Websites Lack Basic Security (2017-03-09) www.darkreading.com
CIA’s Weeping Angel provides a stark warning to device manufacturers on IoT security (2017-03-09) www.itsecurityguru.org
Share The Love: Using ThreatConnect as a Threat Intelligence Sharing Platform for ISACs, ISAOs, and their Members (2017-03-09) www.threatconnect.com