The Shared Responsibility of Cloud Security

|
102618-ptx-cloud-security-shared-security-in-the-cloud_0.png Language Undefined Privileged Account ManagementEven doubters now agree that the forecast of the future of cloud computing is sunnier than ever. As more and more people and organizations transition to cloud services, the question of how to keep the cloud secure becomes more important than ever. Though initially unclear, ... Read More
Reversing and Exploiting with Free Tools: Part 3

Reversing and Exploiting with Free Tools: Part 3

|
Language English Latest from CoreLabsIn part two of this series, we learned to solve the exercise stack1 using x64dbg, debugging tool that allows us to analyze a program by running it, tracing it, even allowing us to set breakpoints, etc ... Read More
Reversing and Exploiting with Free Tools: Part 2

Reversing and Exploiting with Free Tools: Part 2

|
Language English Latest from CoreLabsIn part one of this series, we focused on installing several tools that will be useful for reversing and exploiting security weaknesses on Windows. These tools are free to access, so anyone can use them to learn and try out the useful exercises that this article ... Read More

Cloud Watching: Ensuring Security in Every Cloud Environment

|
ptx-cloud-security-blog-1920x744_0.jpg Language Undefined UncategorizedThough the common vernacular is “The Cloud,” the truth is, there are multiple cloud environments and providers available to organizations looking to utilize this growing technology. Read on to learn about the different types of cloud environments, and the biggest security obstacle each presents. Cloud Types Terminology ... Read More

Cloud Misconfiguration and the Curse of the Inadvertent Employee

|
cybersecurity-generic-article-hologram-900x412_0.gif Language Undefined UncategorizedWe all know that to err is human. The problem is some mistakes are an order of magnitude larger than others. If you forget to buy apples at the store, that’s unfortunate. But if you forget to lock down your cloud server with the proper security controls ... Read More

When Security Becomes a DevOps Blind Spot

|
cybersecurity-generic-blog-cloud-lock-1920x744_1.gif Language Undefined UncategorizedSpeed is essential in today’s business climate, hence the rise of DevOps. Unifying development and operations compresses development cycles and enables more frequent deployments that align closely with business objectives. It’s no wonder executives love DevOps. But one question is often left unasked in DevOps strategy meetings: ... Read More