Roger Thornton of Fortify says as companies spend more on information security, the number of exploits continues to rise. He says it's time to re-examine the security around software.
By ZDNet Staff
| May 31, 2005 -- 20:22 GMT (13:22 PDT)
| Topic: Security
Digital Health and Wellness
How technology can save the NHS
Samsung Galaxy Note 9 is official: Here's what's new
Photos: BlackBerrys through the ages
The scariest tech of 2017, period, end of sentence
GoDaddy takes down 15,000 subdomains used for online scams
GoDaddy resets passwords for several hundred compromised accounts.
Justify your investment in the people and awareness side of security
Changing security culture and behavior through awareness and training has the power to make teams more impactful.
An inside look at how credential stuffing operations work
Data breaches, custom software, proxies, IoT botnets, and hacking forums -- all play a role.
Confidence in the internet is wobbling: Here's how to fix it, says cyber chief
Tech industry has a responsibility to fix security for the next generation, says NCSC head.
Court enforces need for warrant before police can access your real-time phone location
Police said using real-time location data from smartphones under six hours old was fine. The courts fought back.
Windows 10: Microsoft ditches its 'ancient, obsolete' expiring password policy
Organizations will no longer get a red mark for not implementing Microsoft's recommended 60-day password expiration policy.
You’ve been hacked, now what? How the UK’s cybersecurity and privacy watchdogs deal with incidents
New framework looks to improve understanding about how to react following a cyberattack.
Cybersecurity: This free tool lets you test your hacker defences
NCSC initiative is based off real hacking scenarios and looks to bolster cybersecurity of businesses.
New Oracle WebLogic zero-day discovered in the wild
Chinese cyber-security firm warns about impending attacks on Oracle WebLogic servers.