Red Team 101: Understanding Kali Linux

Red Team 101: Understanding Kali Linux

Your security environment is complicated. You’re invested in multiple security tools – antivirus, firewalls, IDS, IPS, SIEM, DLP, and more. If you haven’t invested in a red team, however, you’re doing security wrong. How could you know that your expensive defenses are working unless you’ve tested them out? ... Read More
Bug Spells Doom for Nearly-Vacant Google+ Network

Bug Spells Doom for Nearly-Vacant Google+ Network

Did you ever have a Google Plus account? Neither did we, but a few people did, and most of their information just got leaked in a bug that affected 500,000 people. As a result, the search giant has shut their social media experiment down. Gone doesn’t mean forgotten however, and ... Read More
Working with Our Partners to Mitigate the Faxploit Threat

Working with Our Partners to Mitigate the Faxploit Threat

At Safe-T, we’ve been delivering innovative, award-winning solutions based on our Software Defined Access solution for years. Part of the value we offer is in accelerating ROI by enabling customers to plug-in solutions from third-party security vendors, enhancing existing protections ... Read More
How to Protect Your SMB Clients from Ransomware

How to Protect Your SMB Clients from Ransomware

No company is too small to be devastated by a ransomware attack. In fact, small and medium-sized businesses (SMBs) are prime targets, and the number--and cost--of such attacks continues to rise ... Read More
How to Speed Up DevOps in 3 Steps

How to Speed Up DevOps in 3 Steps

DevOps is at a difficult transition point. Once the sole domain of startups looking to “move fast and break things”, the DevOps philosophy is now being taken up by large incumbents and Fortune 500 companies – and failing ... Read More
Botnets: The Living Dead of The Malware World

Botnets: The Living Dead of The Malware World

Mirai. Reaper. Hajime. The biggest IoT botnet threats to the healthcare industry today ... Read More
You Can’t Fix Authentication Without Fixing Access

You Can’t Fix Authentication Without Fixing Access

Think of the last time you logged into your network. Let’s assume that you used a traditional VPN, with a traditional IAM scheme underneath. This isn’t a bad assumption, because 25% of all internet traffic goes over a VPN ... Read More

If You Still Use PGP, READ THIS NOW

In this instance, the all-caps in the headline aren’t hyperbole – they’re an emergency. “Email is no longer a secure communication medium,” according to researchers at Germany’s Münster University of Applied Sciences ... Read More
How Ransomware Is Changing Cybersecurity and What To Do About It

How Ransomware Is Changing Cybersecurity and What To Do About It

| | Ransomware
A new report from IBM shows that the total number of breached records dropped about 25% last year, an amount representing 2.5 billion files. Unfortunately this did not mean that information security professionals suddenly discovered how to stop cyberattacks altogether. Most of the drop comes from files that have been ... Read More
VPNs Aren’t Dead

VPNs Aren’t Dead, They Just Need to Evolve

Companies have long relied on VPNs to secure corporate data and devices for remote workers, suppliers, contractors and other people authorized to access the company network. As technology continues to evolve, VPNs have held strong as a tried-and-true method for corporate security. However, the nearly 20-year-old technology is being seen ... Read More
Security Boulevard
Loading...