Trending Now
Featured news
How to build an incident response framework
Frameworks provide the structure for an effective incident response program. Here's where to turn for guidance on what to include. - Read more
Tech News
Tech
I’m locked in!
Welcome to this week’s edition of the Threat Source newsletter.I’ve struggled a lot over the last few years with balance. I want to follow the...
Security
APT review of the year
What were the most interesting developments in terms of APT activity throughout the year and what can we learn from them?
Not an easy question...
Most popular
Imperva Cloud Security Now Available Through UK Government’s GCloud 10 Digital Marketplace
Building on the success of Imperva listing our market-leading, single stack Incapsula cloud platform for DDOS protection; CDN; load balancing and WAF on the...
Siemens SINEC OS
View CSAF
Summary
SINEC OS before V3.3 contains third-party components with multiple vulnerabilities. Siemens has released new versions for the affected products and recommends to update...
Centrify Scores Highest for Both “Workforce Users Accessing SaaS” and “Business-to-Business” in New Gartner...
Gartner just released their first ever “Critical Capabilities for Access Management, Worldwide, 2018” report, and we are proud to see that Centrify has scored...
Unauthenticated access to local configuration
CVSSv3 Score: 9.3
An exposure of sensitive information to an unauthorized actor vulnerability in FortiFone Web Portal page may allow...



![FW: [Case Study] Automated Change Management](https://www.dataproof.co.za/wp-content/uploads/2019/08/fw-case-study-automated-change-management-100x59.png)







