Wednesday, April 5, 2017

Obama-era cybersecurity executive order extended by Trump

Security Digest
Information security news and advice from TechTarget's network | April 5, 2017
TechTarget
FEATURED STORY
Obama-era cyber executive order extended by Trump
by Michael Heller, Senior Reporter

A cyber executive order from the Obama era has been extended by President Trump to allow sanctions placed on cybercriminals who attack the U.S. (SearchSecurity.com)

Advertisement
NEWS
 
Symantec certificate authority issues listed by Mozilla developers

Mozilla developers respond to questionable Symantec certificate authority practices, as the security provider questions Google's proposed solutions. (SearchSecurity.com)

 
Experts debunk strong encryption claims by FBI's Comey

FBI Director James Comey clearly laid out his views on strong encryption and urged more conversation, but experts say his arguments fall flat and may even be misleading. (SearchSecurity.com)

 
Fortinet study shows HTTPS traffic has yet to surpass HTTP traffic
News roundup: HTTPS traffic has yet to surge, despite its security benefits, according to a report. Plus, the latest in the Apple extortion; a Mirai attack lasted 54 hours; and more. (SearchSecurity.com)
 
 
 

WikiLeaks' false flag attack allegations against CIA unfounded

Another set of documents from the Vault 7 CIA cache was released by WikiLeaks, but experts say the allegations of false flag attacks are unfounded and dangerous. (SearchSecurity.com)

 
Google's Project Zero Prize uncovers zero Android remote exploits
After six months, Google's Project Zero Prize competition uncovered zero Android remote exploits: no bugs, no prizes, no entries. (SearchSecurity.com)
 
Risk & Repeat: Google slams Symantec certificates
In this episode of SearchSecurity's Risk & Repeat podcast, editors discuss Google's proposed plan to distrust Symantec certificates following more allegations of mis-issuance. (SearchSecurity.com)
 
 
 
EXPERT ADVICE
 
User behavior analytics: Building a business case for enterprises

User behavior analytics can be beneficial to enterprises, but there are complexities involved. Expert Ajay Kumar explains what companies should know about this new technology. (SearchSecurity.com)

 
What enterprises need to know about cloud IAM before implementation
Cloud IAM services are growing in popularity among enterprises, but it's not a simple implementation. Expert Matthew Pascucci explains what to know before using a cloud IAM service. (SearchCloudSecurity.com)
 
 
 
 

1024-bit encryption keys: How 'trapdoored' primes have caused insecurity

Encryption algorithms using 1024-bit keys are no longer secure, due to the emergence of 'trapdoored' primes. Expert Michael Cobb explains how the encryption backdoor works. (SearchSecurity.com)

 
How did firmware create an Android backdoor in budget devices?

An Android backdoor was discovered in the Ragentek firmware used in almost three million low-cost devices. Expert Michael Cobb explains how to prevent attacks on affected devices. (SearchSecurity.com)

 
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Security Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2017 TechTarget. All rights reserved.
TechTarget

No comments: