How to secure your CMS without patching
In as little as four hours, the bad guys can reverse engineer a software patch for an open-source content management system (CMS) and build an exploit capable of turning millions of websites into spammers, malware hosts or DDoS attackers. "There's just not enough time for normal site owners to apply the updates," said David Jardin, a member of the German association CMS Garden, which promotes the use of open source CMS software including Drupal, Joomla, WordPress and others.To help ordinary users patch more quickly, CMS Garden is participating in a government-funded project, Secure Websites and Content Management Systems (Siwecos), to make the websites of SMEs more secure. To read this article in full or to leave a comment, please click here


SevOne will soon be able to monitor VMware and Nuage SDN environments too.
It hired Huawei to make the transition.
Deal calls for deployment of MIMO antenna and carrier aggregation technology.
Other Cisco-McAfee security integrations are in the works.
128 doesn't use tunnels or overlays.
Red Hat expects OpenShift to be its biggest revenue driver over the next three years.