Wednesday, April 3, 2019

Ghidra fixes stomp bugs in NSA's open sourced reverse-engineering tool

Security Digest
Information security news and advice from TechTarget's network | April 3, 2019
TechTarget
FEATURED STORY
Ghidra update squashes serious bugs in NSA reverse-engineering tool
by Michael Heller, Senior Reporter
The NSA answered lingering questions around what kind of support it would provide for Ghidra after releasing the tool as open source with a patch that fixed serious bugs. (SearchSecurity.com)
Advertisement
NEWS
 
Study: Cybersecurity professionals taking on more data privacy duties
At the SecureWorld Boston conference, ISSA unveils data that shows cybersecurity professionals are taking on more data privacy duties. Experts sound off on what it signifies. (SearchSecurity.com)
 
Fortinet: 5G to present new edge computing security concerns
Although the rollout of 5G connectivity will enable new edge computing opportunities, John Maddison, executive VP at Fortinet, said it will also require new security considerations. (SearchSecurity.com)
EXPERT ADVICE
 
6 questions to ask before evaluating secure web gateways
Learn which six questions can help an organization identify its web security and business needs and its readiness to implement a secure web gateway. (SearchSecurity.com)
 
What you need to know for effective zero-trust in the cloud
A zero-trust security strategy means something completely different in cloud environments than it does on premises. Learn how to achieve true zero-trust in the cloud. (SearchCloudSecurity.com)
 
HPE takes aim at STEM and cybersecurity education, awareness
HPE CISO Liz Joyce worked with the Girl Scouts on an educational cybersecurity game for girls and ensures HPE's Women in Cybersecurity encourages more women to join the industry. (SearchSecurity.com)
 
4 steps to ensure virtual machine security in cloud computing
Enterprises are now operating in a cloud-virtual world. Understanding four steps to ensure virtual machine security in cloud computing environments is crucial. (SearchSecurity.com)
 
How to secure network devices in a hostile world
Find out how to secure network devices by locking down the biggest, riskiest holes to protect them from exploits long before some or all of the network crashes. (SearchSecurity.com)
 
Container security best practices help mitigate risks and threats
Find out how container security best practices can address the four most common types of container and orchestrator vulnerabilities. Then mitigate threats with the right processes and tools. (SearchSecurity.com)
 
Symantec Web Security Service vs. Zscaler Internet Access
Learn how cloud-based secure web gateway products Symantec Web Security Service and Zscaler Internet Access compare when it comes to features, benefits, pricing and support. (SearchSecurity.com)
 
Simplify incident response for zero-day vulnerability protection and beyond
Protection against a zero-day vulnerability and other cyber-risks is complicated, but simplifying cybersecurity incident management could be the key to protecting online assets. (SearchSecurity.com)
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Security Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2019 TechTarget. All rights reserved.
TechTarget

No comments: