Remove 12
article thumbnail

SAP Security Patch Day for May 2019 fixes many missing authorization checks

Security Affairs

This month, there are no critical or Hot News notes published, but there are three High Priority Notes, as well as two other SAP Security Notes affecting SAP Solution Manager (reported by the Onapsis Research Labs).” ” reads a blog post published by SAP security firm Onapsis. Two flaws received a CVSS score of 6.3,

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

This week, in our last podcast of the year, we revisit some of the biggest information security stories from the past 12 months. As is now traditional, I’ve installed myself in the porter’s chair next to the fire in the library, ready to recap some of the year’s more newsworthy information security events.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Here are the top Twitter accounts to follow for the latest commentary, research, and much-needed humor in the ever-evolving information security space. Krebs wrote for The Washington Post between 1995 and 2009 before launching his current blog KrebsOnSecurity.com. Read more: Top IT Asset Management Tools for Security.

article thumbnail

MY TAKE: A primer on how ransomware arose to the become an enduring scourge

The Last Watchdog

Beazley also reported that SMBs, which tend to spend less on information security, were at a higher risk of being hit by ransomware than larger firms, and that the healthcare sector was hardest hit by ransomware attacks, followed by financial institutions and professional services. This column originally appeared on Avast Blog.).

article thumbnail

Identity-based Cryptography

Thales Cloud Protection & Licensing

Revocable IBE [12] provides a scalable revocation method. To read more, on our Horizons blog. Horizons explores and prototypes new data security technologies and techniques, particularly in distributed cloud environments. Identity-Based Cryptography 2009: 31-44. Hierarchical identity-based cryptography. References.