SAML Library Bug Allows Authentication Bypass
A recently identified bug in the SAML protocol could have let attackers log in as other users.
A recently identified bug in the SAML protocol could have let attackers log in as other users.
After years of litigation a federal jury convicted Chinese turbine manufacturer Sinovel of conspiracy to commit trade secret theft, theft of trade secrets, and wire fraud last month.
After years of litigation a federal jury convicted Chinese turbine manufacturer Sinovel of conspiracy to commit trade secret theft, theft of trade secrets, and wire fraud last month.
After years of litigation a federal jury convicted Chinese turbine manufacturer Sinovel of conspiracy to commit trade secret theft, theft of trade secrets, and wire fraud last month.
Learn about Data-Centric Audit and Protection or DCAP in Data Protection 101, our series on the fundamentals of information security.
According to a study published last week hospital breaches accounted for one third of all data breaches and affected the largest number of victims from 2009 to 2016.
According to a study published last week hospital breaches accounted for one third of all data breaches and affected the largest number of victims from 2009 to 2016.
Coldroot, a new strain of macOS malware that's eluded detection for more than a year has a keylogger and can gain persistence with root privileges.
Coldroot, a new strain of macOS malware that's eluded detection for more than a year has a keylogger and can gain persistence with root privileges.
Coldroot, a new strain of macOS malware that's eluded detection for more than a year has a keylogger and can gain persistence with root privileges.