…read more Source::
Category: IT News
IT News
How the BloodHound tool can improve Active Directory security
by
•…read more Source::
Hospital takes aim at patient health data security with AI tools
by
•…read more Source::
Cloud-based email security tools barricade entry to Exchange
by
•…read more Source::
Why the Bleichenbacher attack is still around
by
•…read more Source::
What are some useful multifactor authentication examples?
by
•…read more Source::
Zero-day Telegram vulnerability exploited for cryptomining
by
•…read more Source::
Public key pinning: Why is Google switching to a new approach?
by
•By SearchSecurity.com(editor@searchsecurity.com) After introducing HTTP Public Key Pinning to the internet two years ago, the upcoming Chrome will replace it with the Expect-CT header. Matt Pascucci explains the switch. …read more Source::
How HTTP security headers can defend enterprise systems
by
•By SearchSecurity.com(editor@searchsecurity.com) HTTP security headers that have the right configurations can be used as defense methods against cyberattacks. Expert Judith Myerson outlines how to use headers this way. …read more Source::
Canvas fingerprinting: How does it compromise security?
by
•By SearchSecurity.com(editor@searchsecurity.com) Mozilla recently decided to pull the HTML canvas element from the Firefox browser. Learn from expert Matt Pascucci what this means for the security and privacy of users. …read more Source::