Remove 2014 Remove Information Security Remove Open Source
article thumbnail

Millions of Apple Applications Were Vulnerable to CocoaPods Supply Chain Attack

Tech Republic

The vulnerabilities have since been patched, but had quietly persisted since the CocoaPods migration in 2014.

article thumbnail

Stand By For Reporting From the Intelligence and National Security Summit 18-19 Sep 2014 #Intelligence2014

CTOvision

Managing Director Security. Chief Information Security Officer. Deputy Chief Information Officer. Chief Information Security Officer. Director for Analysis, Open Source Center. United Airlines. Kimberly Dozier. Contributing Writer. The Daily Beast & Bradley Chair. Army War College.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Fuzzing Files: The Anatomy of a Heartbleed

ForAllSecure

In late March 2014, two teams of security researchers independently started fuzz testing OpenSSL, an open source utility that encrypts traffic from a web browser to a server and forms the basis of trusted transactions online. Responsible Disclosure. Both teams of researchers reported the details to the vendor first. "You

article thumbnail

The Fuzzing Files: The Anatomy of a Heartbleed

ForAllSecure

In late March 2014, two teams of security researchers independently started fuzz testing OpenSSL, an open source utility that encrypts traffic from a web browser to a server and forms the basis of trusted transactions online. Responsible Disclosure. Both teams of researchers reported the details to the vendor first. "You

article thumbnail

The Fuzzing Files: The Anatomy of a Heartbleed

ForAllSecure

In late March 2014, two teams of security researchers independently started fuzz testing OpenSSL, an open source utility that encrypts traffic from a web browser to a server and forms the basis of trusted transactions online. Responsible Disclosure. Both teams of researchers reported the details to the vendor first. "You

article thumbnail

The Cybersecurity Sprint: Are we safe yet?

Cloud Musings

To improve on the current sad state of government cybersecurity , the Federal Information Security Management Reform Act (FISMA Reform) , has been proposed as a new bill.

Dell 70
article thumbnail

Security Ledger Podcast: Security Automation Is (And Isn't) The Future Of InfoSec

ForAllSecure

But how exactly will artificial intelligence help bridge the information security skills gap? And even with the help of machine learning algorithms, what kinds of security work is still best left to humans? They won with Mayhem, an assisted intelligence application security testing solution.