article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

For instance, major vulnerability was discovered lurking in the GNU C Library, or GLIBC, an open source component that runs deep inside of Linux operating systems used widely in enterprise settings. Virsec, meanwhile, is among a small group of innovators that have set out to tackle memory exposures more directly.

article thumbnail

Building the Relationship Between RM and IT

The Texas Record

In our RM group, we can envision the day when we are all in the game together with the same uniforms (language), rules (direction), and playing field (agency-wide).” Our programmers invite me to meetings involving any new system with a data retention consideration. MW : “ Still a work in progress.

IT 60