An Accidental Discovery of a Backdoor Likely Prevented Thousands of Infections

| | Uncategorized
... Read more » The post An Accidental Discovery of a Backdoor Likely Prevented Thousands of Infections appeared first on Deepfactor ...

Hardware Vulnerability in Apple’s M-Series Chips

It’s yet another hardware side-channel attack: The threat resides in the chips’ data memory-dependent prefetcher, a hardware optimization that predicts the memory addresses of data that running code is likely to access ...

Security Vulnerability in Saflok’s RFID-Based Keycard Locks

It’s pretty devastating: Today, Ian Carroll, Lennert Wouters, and a team of other security researchers are revealing a hotel keycard hacking technique they call Unsaflok. The technique is a collection of security ...

How to choose the right penetration testing partner for your business

| | Uncategorized
In today’s digital landscape, cybersecurity threats are evolving at an alarming rate. With the growing number of cyber-attacks and data breaches, businesses must prioritise their security measures to protect sensitive... The post ...

On Secure Voting Systems

Andrew Appel shepherded a public comment—signed by twenty election cybersecurity experts, including myself—on best practices for ballot marking devices and vote tabulation. It was written for the Pennsylvania legislature, but it’s general ...
Advancing Access Governance Beyond Oracle AACG

Advancing Access Governance Beyond Oracle AACG

| | Uncategorized
Adapting to Change: Advancing AccessGovernance Beyond Oracle AACGIn 2016, Oracle announced it would no longer support its Governance, Risk, and Compliance (GRC) applications, including the Application Access Controls Governor (AACG). The AACG ...
NIST NVD “Under Construction”

NIST NVD “Under Construction”

| | News & Updates, Uncategorized
In recent weeks, NIST’s National Vulnerability Database (NVD) has been experiencing a slowdown. Since February 15, 2024, a prominent notice has adorned the NVD’s main page, signaling disruptions in vulnerability management. It ...
What is Key Management

What is Key Management?

| | Uncategorized
What is Key Management? Read our blog to understand the lifecycles, challenges, best practices and more. The post What is Key Management? appeared first on Akeyless ...

Licensing AI Engineers

The debate over professionalizing software engineers is decades old. (The basic idea is that, like lawyers and architects, there should be some professional licensing requirement for software engineers.) Here’s a law journal ...

Public AI as an Alternative to Corporate AI

This mini-essay was my contribution to a round table on Power and Governance in the Age of AI.  It’s nothing I haven’t said here before, but for anyone who hasn’t read my ...