Friday, February 8, 2019

How does site isolation defend against Spectre vulnerabilities?

TechTarget
Latest Technology News & Expert Advice     February 08, 2019
TechTarget
Issue Highlights:
How does site isolation defend against Spectre vulnerabilities?
Zero-trust security means new thinking plus practical steps
Ticketmaster breach: How did this card skimming attack work?
How to perform an ICS risk assessment in an industrial facility
Is there a viable breach notification tool?
How does site isolation defend against Spectre vulnerabilities?
Spectre exploits how processors manage performance-enhancing features. Expert Michael Cobb explains Google Chrome's initiative to use site isolation as a defense mechanism.
Zero-trust security means new thinking plus practical steps
Implementing a security policy that, essentially, trusts no one and nothing doesn't have to be overwhelming if you understand the basics behind the security model.
Ticketmaster breach: How did this card skimming attack work?
The hacking group Magecart was recently found to have run a card skimming campaign that put customer information at risk. Learn how this attack worked from Nick Lewis.
How to perform an ICS risk assessment in an industrial facility
An important step to secure an industrial facility is performing an ICS risk assessment. Expert Ernie Hayden outlines the process and why each step matters.
Is there a viable breach notification tool?
A breach notification tool from Firefox Monitor and Have I Been Pwned could help consumers understand more quickly if their email or other vital information has been hacked.
This newsletter is published by TechTarget.

TechTarget Member Services, 275 Grove Street, Newton, MA 02466.
Contact: webmaster@techtarget.com

Copyright 2019 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners.

When you access content from this newsletter, your information may be shared with the sponsors or future sponsors of that content as described in our Privacy Policy.

Privacy Policy | Unsubscribe
TechTarget

No comments: