In September of 2017, Equifax announced that extremely sensitive data, including social security numbers and driver’s license information, had been exfiltrated by hackers via the Apache Struts framework used to develop the credit rater’s website – a framework that powers thousands of large enterprises’ websites as well. Given the scope of the damage enabled by criminal possession of the data, the potential consequences to consumers and banks, and the costs of remediation, are staggering. What’s tragic is that the same attack method used to exploit this vulnerability as a zero-day could also be used to exploit a . . .
TABLE OF CONTENTS
United States Cybersecurity Magazine
- Human Machine Teaming
- You Build It, You Secure It
- Cybersecurity Morbidity and Mortality Conferences
- Your Web Applications are Under Attack: Are You Ready?
- Q&A Interview with Zane Lackey of Signal Sciences
- Feature Article
- LMI Practical Government Management For An Increasingly Complex World
- Opting in to Cyber Vulnerablity Part 2: Technical Education in America
- Cyber Deterrence and Active Cyber Defense
- 16 Tons of Technical Debt: An Operational Perspective on Security Automation
- Legacy Modernization as a Cybersecurity Enabler
- Security by Design
- BUILDING FOR SUCCESS: The Importance of Cloud Security