On Tuesday December 12, 2017 researchers Hanno Böck and Juraj Somorovsky announced a “new but old” vulnerability (The ROBOT Attack) found from certain TLS implementations.
This is the third part of our blog series "Things that security auditors will nag about and why you shouldn't ignore them". In these blogs, Nixu's security consultants explain issues that often come up when assessing the security of web applications, platforms and other computer systems.
This is the third blog in the series on the migration of Role Based Access Control to Attribute Based Access Control.
Nixu Corporation
Press release, December 18, 2017 at 9:30 AM EET
Nixu Corporation
Press release, December 19, 2017 at 9:05 AM EET
If you have been following the media at all, you no doubt have run into the topic of Bitcoins and how their value keeps on skyrocketing. Stories of early adopters becoming millionaires are in the covers of just about every publication these days.
My colleague Matti Suominen wrote a nice article regarding the dangers of Bitcoin wallets (or cryptocurrencies in general).
Digital transformation done right. We help to ensure that trust, security and business continuity is taken into account in all phases of your digital transformation.
We enable your innovation by securing your intellectual property, your customer data ecosystems and your privacy. Our security engineering teams have decades of experience in IoT and connected devices.
We help you improve your ability to react during incidents and increase cybersecurity awareness in your organization.
Enhance the security of your products and your software development process.
We enable you to leverage the benefits of cloud transformation in a secure and reliable way and assure the relevant risks are mitigated to an acceptable level.
World-class Cybersecurity and Digital Identity teams at your service. Our certified experts are capable of running your whole cybersecurity environment from people to processes and technology – or a part of it.
We help to prove the credibility of your digital business. We provide a wide variety of information security and privacy services.
We protect your core processes and people 24/7. We monitor, contain and remediate security threats within your business processes and provide you with ability to detect early and react quickly.
We make your digital transformation successful by securing your industrial environments. With us, you can be sure that the security of your environment will be done right, enabling true safety & reliability.