While it may be obvious that addressing vulnerabilities eats up the most time for IT security pros, what may surprise you is the source of those vulnerabilities.
- If you can’t detect a breach within 3 hours, your data is probably already gone
- Wi-fi security is KRACK’d, ‘catastrophic’ impact on 820 million Android devices
- KRACK Wi-Fi attack threatens all networks: How to stay safe and what you need to know
- KRACK: Researcher discovers flaws in WPA2 authentication
- The week in security: CSO50 winners doing security right where so many others still aren’t