Tag: lifecycle management

  • The Register: FTC urges smart device makers to disclose software update lifecycles

    Source URL: https://www.theregister.com/2024/11/27/ftc_smart_product_makers/ Source: The Register Title: FTC urges smart device makers to disclose software update lifecycles Feedly Summary: You need to know in advance when your kit will be bricked or downgraded – it’s the law Makers of software-enabled products have been put on notice by the US Federal Trade Commission (FTC) for failing…

  • Alerts: CISA Adds Three Known Exploited Vulnerabilities to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2024/11/21/cisa-adds-three-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Three Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-44308 Apple Multiple Products Code Execution Vulnerability CVE-2024-44309 Apple Multiple Products Cross-Site Scripting (XSS) Vulnerability CVE-2024-21287 Oracle Agile Product Lifecycle Management (PLM) Incorrect Authorization Vulnerability…

  • Slashdot: D-Link Tells Users To Trash Old VPN Routers Over Bug Too Dangerous To Identify

    Source URL: https://it.slashdot.org/story/24/11/20/189224/d-link-tells-users-to-trash-old-vpn-routers-over-bug-too-dangerous-to-identify?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: D-Link Tells Users To Trash Old VPN Routers Over Bug Too Dangerous To Identify Feedly Summary: AI Summary and Description: Yes Summary: D-Link has advised users of older VPN routers to replace their devices due to a serious remote code execution vulnerability. This issue exemplifies the critical security risks…

  • CSA: How to Manage Non-Human Identities Effectively

    Source URL: https://www.oasis.security/resources/blog/non-human-identity-management-program-guide-step-by-step Source: CSA Title: How to Manage Non-Human Identities Effectively Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the implementation of Non-Human Identity Management (NHIM) programs, highlighting practical steps organizations can take to secure digital identities—ranging from defining goals to automating lifecycle management. This is particularly relevant for professionals in…