Remove Malware Remove Program Management Remove Research Remove Security
article thumbnail

Microsoft warns of critical Windows DNS Server vulnerability that’s ‘wormable’

The Verge

Such a flaw could allow attackers to create special malware that remotely executes code on Windows servers and creates malicious DNS queries that could even eventually lead to a company’s infrastructure being breached. a principal security program manager at Microsoft.

Windows 131
article thumbnail

Leaping Ahead; A Federal Bridge to Transition Cyber-related Products at the Department of Homeland Security

CTOvision

By Charles Brooks Editor’s note: This post by Charles Brooks focuses on an area of importance to not just the federal enterprise but to the larger cyber security community. -bg. TTP is a program of collaboration and operates under the Cyber Security Division (CSD) of S & T.

Security 237
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Join Architects, Planners, Program Managers, Data Scientists at 4th Annual Cloudera Federal Forum in DC 25 Feb

CTOvision

Data Security—What’s New and What’s Next? Chief Security Architect, Office of the CTO, Cloudera. Security Spotlight: Focus on HIPAA and PCI Compliance. Chief Security Architect, Office of the CTO, Cloudera. Director of Product Management, Cloudera. Security and Compliance in the Era of Big Data.

article thumbnail

Former Amazon exec inherits Microsoft’s complex cybersecurity legacy in quest to solve ‘one of the greatest challenges of our time’

GeekWire

Charlie Bell, a former Amazon Web Services executive, is now the leader of Microsoft’s newly formed, 10,000-person security engineering organization. He absorbed the 477-page technical tome in one weekend and returned to Redmond ready to change how Microsoft made software — prioritizing security and reliability over new features.

Microsoft 106
article thumbnail

Best IT and Tech Blogs – Must Read Information Technology Resources 2019

Galido

Information technology is the use of any tech devices, infrastructure, software and processes to create and process, store, secure and exchange all forms of digital data. Our articles are typically focused on software recommendations, business, security, interesting topics and search engine optimization and marketing. Search Security.

Resources 113
article thumbnail

Tech Blogs – Best Must Read Tech Resources 2019

Galido

These areas of tech include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. Security Tech Blogs. Techworld Security Blog. They offer useful relevant topics on security and tech security news.

Resources 107
article thumbnail

Best Tech Blogs – Must Read Tech Resources 2019

Galido

These areas of tech include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. Security Tech Blogs. Techworld Security Blog. They offer useful relevant topics on security and tech security news.

Resources 107