HHS Updates Security Risk Assessment Tool

Data Breach Today

Why Do So Many Entities Still Struggle with Security Risk Analysis? Many HIPAA enforcement actions taken by federal regulators have chastised organizations for their poor security risk assessments.

Risk 141

HHS Updates Security Risk Assessment Tool

Data Breach Today

The Department of Health and Human Services has updated its HIPAA security risk assessment tool to better assist small and mid-sized healthcare entities and their vendors in performing a comprehensive risk analysis.

Risk 190

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Instagram’s New Security Tools are a Welcome Step, But Not Enough

Krebs on Security

Instagram users should soon have more secure options for protecting their accounts against Internet bad guys. For years, security experts have warned that hackers are exploiting weak authentication at Instagram to commandeer accounts.

Security Tool Sprawl Reaches Tipping Point

Dark Reading

How a new open source initiative for interoperable security tools and a wave of consolidation could finally provide some relief for overwhelmed security analysts and SOCs

9 Top Database Security Tools

eSecurity Planet

Here are 9 top database security tools to help you protect that data Databases contain some of the most critical data in an organization.

9 Top Active Directory Security Tools

eSecurity Planet

Active Directory can't protect against every security risk. Here are 9 Active Directory security tools that can help

Risk 90

Leaked NSA Hacking Tools

Schneier on Security

In 2016, a hacker group calling itself the Shadow Brokers released a trove of 2013 NSA hacking tools and related documents. Now we have learned that the Chinese used the tools fourteen months before the Shadow Brokers released them.

GitHub introduces new tools and security features to secure code

Security Affairs

GitHub announced the introduction of several new tools and security features to help developers secure their code. The popular code repository hosting service GitHub continues its efforts in helping its customers in developing and maintaining a secure code.

Top Vulnerability Scanning Tools

eSecurity Planet

Staying on top of vulnerabilities is a critical IT security practice. Here are a dozen vulnerability scanning tools that can help

SEC Xtractor – Experts released an open-source hardware analysis tool

Security Affairs

Security and consulting company SEC Consult announced the release of an open-source hardware analysis tool dubbed SEC Xtractor. Security firm SEC Consult announced the release of an open-source hardware analysis tool dubbed SEC Xtractor.

7 Low-Cost Security Tools

Dark Reading

Security hardware doesn't have to be expensive or complex to do the job. Here are seven examples of low-cost hardware that could fill a need in your security operations

Free Tool: Honey Feed

Security Affairs

Cybersecurity expert Marco Ramilli shared another tool of his arsenal that extracts suspicious IPs from undesired connections, his HoneyPots. Hi folks, today I’d like to point you out another tool of mine which extracts suspicious IPs from undesired connections.

Uninstall or Disable PGP Tools, Security Researchers Warn

Data Breach Today

Exploitable Vulnerabilities Could Reveal Plaintext of Encrypted Emails European computer security researchers say they have discovered vulnerabilities that relate to two techniques used to encrypt emails: PGP and S/MIME.

VMware addressed flaws in its Workstation and Tools

Security Affairs

VMware has informed its users that it has patched two high-severity vulnerabilities that affect its Tools and Workstation software. VMware has patched two high-severity flaws that affect its Tools and Workstation software.

IT 109

Cybercrime Tool Prices Continue to Rise on Darknet Sites

Data Breach Today

Payment Card and Passport Data Are Most Sought-After Commodities, Report Finds The prices for specific types of cybercriminal tools on darknet sites continue to rise, according to a recent analysis by security firm Flashpoint.

OilRig’s Jason email hacking tool leaked online

Security Affairs

A few hours ago, a new email hacking tool dubbed Jason and associated with the OilRig APT group was leaked through the same Telegram channel used to leak other tools. Now the group released a tool that was allegedly used by OilRig “for hacking emails and stealing information.”

A free Decryptor tool for GandCrab Ransomware released

Security Affairs

Good news for the victims of the latest variants of the GandCrab ransomware , NoMoreRansomware released a free decryption tool. Victims of the latest variants of the GandCrab ransomware can now decrypt their files for free using a free decryptor tool released on the the NoMoreRansom website.

Enterprise Architecture Tools Are Key to Managing Ideation and Innovation


Organizations largely recognize the need for enterprise architecture tools, yet some still struggle to communicate their value and prioritize such initiatives. Enterprise Architecture Tools: The Fabric of Your Organization.

Choosing Security Tools for Your Business — the Right Way


I remember the days when network security meant firewalls, anti-virus software and strong passwords. A lot of time, effort and money are being spent, and it looks like things are getting done in terms of security and minimizing business risks, but that’s not always the case.

MDM 56

NSA Pitches Free Reverse-Engineering Tool Called Ghidra

Data Breach Today

For the Record, There's No Backdoor,' NSA's Rob Joyce Tells RSA Conference Here's free software built by the National Security Agency called Ghidra that reverse-engineers binary application files - all you have to do is install it on your system.

Is Your Organization Suffering from Security Tool Sprawl?

Dark Reading

Most companies have too many tools, causing increased costs and security issues

Government Agency Partners on New Tool for Election Security

Dark Reading

The Cybersecurity and Infrastructure Security Agency has partnered with VotingWorks on an open source tool to aid election result audits

Analysis: Russian Hackers Hijack Iranian Hacking Tools

Data Breach Today

The latest edition of the ISMG Security Report analyzes how the Russian hacking group Turla has been coopting Iranian hacking tools. Plus: Avast's CCleaner hit by second attack; sizing up draft regulations for the California Consumer Protection Act

Top Penetration Testing Tools

eSecurity Planet

Penetration testing should be an ongoing practice for all IT security teams. Here are the best pen test tools for finding your vulnerabilities

Jamf named most popular device security tool by Okta


Okta’s 2020 Business @ Work report recognizes Jamf Pro as the most popular device security tool and one of the fastest growing solutions in the enterprise.

Free Tools Boost 2020 Election Security, But Not Enough

WIRED Threat Level

More companies than ever are offering low-cost security services for election bureaus and campaigns. Security Security / National SecurityIt’s still not clear how much they’ll actually help.

'Virtual Assistant' EHR Tools: Privacy, Security Issues

Data Breach Today

Data integrity and privacy issues are among potential concerns related to voice-activated "virtual assistant" tools that some vendors are beginning to offer for their electronic health record systems, says privacy and security expert Kate Borten

Cisco released 4CAN hardware tool to find flaws in automotive computers

Security Affairs

Cisco has released a hardware tool, called 4CAN , developed to help researchers to discover vulnerabilities in automotive systems. . Cisco has released a new hardware open-source tool called 4CAN that aims to help the automotive industry in security vehicles.

Cisco Warns of Critical Network Security Tool Flaw


The critical flaw exists in Cisco's administrative management tool, used with network security solutions like firewalls.

Android 7.0+ Phones Can Now Double as Google Security Keys

Krebs on Security

and higher can now be used as Security Keys , an additional authentication layer that helps thwart phishing sites and password theft. But Google said starting this week, any mobile phone running Android 7.0+ (Nougat) can serve the same function as a USB-based security key.

12 Free, Ready-to-Use Security Tools

Dark Reading

These free tools can help you analyze what your company is up against and point ways to developing a more thorough security program There's no excuse for not knowing your exposure.

MY TAKE: Why new tools, tactics are needed to mitigate risks introduced by widespread encryption

The Last Watchdog

However, the sudden, super-saturation of TLS, especially over the past two years, has had an unintended security consequence. The bad guys know full well that legacy security systems were designed mainly to filter unencrypted traffic.

Toyota presented PASTA (Portable Automotive Security Testbed) Car-Hacking Tool

Security Affairs

Takuya Yoshida from Toyota’s InfoTechnology Center and his colleague Tsuyoshi Toyama are members of a Toyota team that developed the new tool, called PASTA (Portable Automotive Security Testbed).

Paper 114

What the Marriott Breach Says About Security

Krebs on Security

Or a previously unknown security flaw gets exploited before it can be patched. They’re reshuffling the organizational chart so that people in charge of security report to the board, the CEO, and/or chief risk officer — anyone but the Chief Technology Officer.

Google Analytics Emerges as a Phishing Tool


Web Security Akamai Bing cybercriminals Google Analytics Hackers malicious activity Phishing phishing tool site visitor behavior web analytics Websites Yandex

Experts released a free Decryption Tool for GandCrab ransomware

Security Affairs

Good news for the victims of the infamous GandCrab ransomware, security experts have created a decryption tool that allows them to decrypts files without paying the ransom. “This tool recovers files encrypted by GandCrab ransomware versions 1, 4 and 5.”

Enterprise Architecture Tools and the Changing Role of the Enterprise Architect


Enterprise architecture tools are becoming more important than ever. Enterprise architecture tools allow an organization to map its applications – complete with their associated technologies and data – to the business functions they power.