Security Bloggers Network

Weekly Top 10

Latest Posts

Consider Cybersecurity topics, authors and tags that you are interested in when trying to search. You can also enter your own custom search criteria. You can also select a topic or syndication source below to filter all the blog posts.

Cybersecurity is a buzzword you hear on the evening news and think about when setting up your website. Now more than ever, your brand needs to consider the security of the data you collect and how to protect both your digital property and the personal information of your users from hackers at all times. Hackers ...
Read More
|
Zero Trust Security (also called Zero Trust Architecture) is an IT security model regarding network infrastructure that has been gaining some steam in the marketplace these days. There has been a confluence of events that worked together to make that happen, but given Microsoft®’s dominance in various areas of IT, admins are often left wondering ...
Read More
|
via the comic delivery system monikered Randall Munroe at XKCD! ...
Read More
|
Source Credit: Shmoo Con 2019, Archive.org, also available at 0xdade's YouTube Channel. Enjoy! ...
Read More
|
FreeRADIUS is the leading RADIUS server and has been for quite some time. As an open source solution, it has been incredibly well received for multiple decades now. Part of that recognition stems from the fact that FreeRADIUS has been critical to IT networks while maintaining its functionality in the face of father time. That ...
Read More
|
Well that's good news... via Graham Cluley, writing at the TripWire blog, steps into the Google Chrome extension fray with one small, but meaningful move to the better in that realm - the release (by Google, Inc. (Nasdaq: GOOG) of a new password warning tool that informs the user of said pwnage (or, conversely, notage, ...
Read More
|
WiGLE has been around a while and is a great site to explore the pervasiveness or sparsity of Wi-Fi (and cellular) networks around the globe. While interactive use is fun, WiGLE also has a free API (so long as you obey the EULA and aren’t abusive) that lets you explore a little deeper if you ...
Read More
|
SCA tools are an essential part of your AppSec toolkit, because free and open source software—just like free puppies—comes with hidden costs and risks. This entry in our BSIMM Monthly Insights series was contributed by guest author Stacy Monroe with Principal. The hidden costs and risks of free puppies I was recently reminded of a ...
Read More
 The post Webinar: How to Become a Certified Ethical Hacker (CEH) appeared first on InfoSec Resources. Webinar: How to Become a Certified Ethical Hacker (CEH) was first posted on February 18, 2019... Go on to the site to read the full article ...
Read More
|
[A Look Back – Reposted from 5/28/15] I received my Apple Watch shipment, just the ...
Read More
|
The term Identity-as-a-Service (IDaaS) joined our lexicon in the late 2000s as a description for web application single sign-on (SSO) platforms. Since then, though, the term has taken on a new and broader meaning. In this article, we’ll provide a modern introduction to Identity-as-a-Service. Establishing IDaaS When web application SSO solutions first emerged, they wanted ...
Read More
|
54 percent of companies will increase IT security spending in 2019, and almost a third will do so by 10 to 20 percent or more, according to a study by eSecurity Planet. The reason? Fear of data breaches and the penalties under new privacy regulations like Europe’s GDPR ...
Read More
|
Introduction CompTIA’s A+ is an entry-level certification that’s considered one of the best certifications for those pursuing a career in IT tech support and field operations and was named one of 10... Go on to the site to read the full article ...
Read More
|
Introduction The MCSE has always been one of the most highly regarded certs in the IT Industry. It is also one of the longest ones as well. Its first focus was on the concepts and implementation of... Go on to the site to read the full article ...
Read More
Torrent sites are banning CracksNow, a popular source of torrent uploads, after discovering that the uploader of cracks and keygens was distributing ransomware. CracksNow was labeled as “trusted” before a number of users started noticing bad things happening to their computers. Torrentfreak shows one of the more recent examples in a screenshot depicting comments to ...
Read More
|
The U.S. government — along with a number of leading security companies — recently warned about a series of highly complex and widespread attacks that allowed suspected Iranian hackers to siphon huge volumes of email passwords and other sensitive data from multiple governments and private companies. But to date, the specifics of exactly how that ...
Read More
|
My guest for this episode of the Inner Circle podcast is Marcus Carey–founder and CEO of Threatcare. Carey is also co-author of the book Tribe of Hackers, which was released just a couple weeks ago and has amassed a ton of positive reviews and feedback. One of the things I like–and respect–about Carey is his ...
Read More
|
On February 8, the Australian government announced its computer network was hit by a major cyberattack. Following investigations by the country’s cyber experts, Australian Prime Minister Scott Morrison announced on Monday that the government fell victim to a nation-state cyberattack, writes The Guardian. Duncan Lewis, the head of the Australian Security Intelligence Organization, offered no ...
Read More
|
Mobile app development has become a key factor for the success of any business. And as mobile apps have grown more popular among users, it’s important for developers to make security of the apps as important as its features. In mobile apps, security is paramount, as the data within the app may be at risk ...
Read More
|
Security Boulevard
DevOps is an evolving philosophy, and now is the time–just as you start embracing DevOps in your organization–to start building security into both your DevOps philosophy and processes. DevOps philosophy started with the core principles of W. Edwards Deming’s points on Quality Management, binding the development of services and their delivery to IT Operations. AsRead ...
Read More
|
As I looked over the schedule for Check Point’s CPX 360 conference, one keynote session jumped out at me, not because of the topic but because of the name of the presenter: Freaky Clown, in all caps. “You’ll want to go to that one,” someone from Check Point told me. “Hacker keynotes are always interesting.” ...
Read More
|
Security Boulevard
This is your Shared Security Weekly Blaze for February 18th 2019 with your host, Tom Eston. In this week’s episode: Preventing illegal robocalls, should you be scared of your laptop’s webcam, and recent hacks of popular dating apps. Silent Pocket is a proud sponsor of the Shared Security Podcast! Silent Pocket offers a patented Faraday ...
Read More
|
This post considers the perception clash that exists between what users perceive to be their most valuable accounts (email and social networks) and those they think they should protect the most (online banking). This perception disconnect is potentially harmful, as it may lead users to invest their limited willingness to secure accounts into the wrong ...
Read More
|
I must preface this post with the posit that if you’re doing anything interactive() with Amazon Athena you should seriously consider just using their free ODBC drivers as it’s the easiest way to wire them up to R DBI- and tidyverse-wise. I’ve said as much in previous posts. Drop a note in the comments if ...
Read More
|
via the respected information security capabilities of Robert M. Lee & the superb illustration talents of Jeff Hass at Little Bobby Comics. Permalink ...
Read More
|
It has been five years since I published my first Diary at the SANS Internet Storm Center on the topic of getting more involved in your local community. Now that January is almost over and those new year resolutions you made last month may or may not still be in place, I want to give ...
Read More
|
Source Credit: Shmoo Con 2019, Archive.org, also available at 0xdade's YouTube Channel. Enjoy! ...
Read More
|
AWS® cloud infrastructure has been replacing traditional data centers for many years now. While many IT organizations have moved their on-prem and collocated data center infrastructure to AWS, a significant number of organizations are undergoing the shift now. The reason for doing so is that shifting to AWS can save organizations a tremendous amount of ...
Read More
|
Wait… What? via Bobbi Nodell, writing at the University of Washington, and reporting on the University of Washington School of Medicine's new DeepSqueek rodent audio translating software and their efforts to translate and comprehend rodent communications through the use of DeepSqueek (paywall).. "Two young scientists at the University of Washington School of Medicine developed a ...
Read More
|
With the changing IT landscape, many in the IT industry are trying to get a grasp on endpoint management. Much of this is to do with the fact that the endpoint management industry has gone through a number of transformations over the years. With that being the case, it is worthwhile to do a modern ...
Read More
|
Computer forensics is a very important branch of computer science in relation to computer and Internet related crimes. Earlier, computers were only used to produce data but now it has expanded to all... Go on to the site to read the full article ...
Read More
|
Risk Based Security came out with their annual data breach report this past week. Overall, 2018 brought the second-highest number of reported data breaches of any year on record. “It’s been an unusual year for breach activity,” commented Inga Goddijn, executive vice president of Risk Based Security. “We’ve been monitoring breach events for more than ...
Read More
LDAP is one area of interest for MSPs as they continue to take over the management of IT networks large and small. The most innovative MSPs are developing a wide range of offerings to suit the specific needs of their individual clients, which often includes LDAP authentication. The challenge for MSPs has historically been that ...
Read More
|
Zero Trust Security (ZTS) is an idea that has been gaining steam for a few years, but it really hasn’t been able to take off. The reason? ZTS requires totally rethinking the historical, perimeter approach to network security (exemplified by Microsoft® Active Directory® and the domain controller). In this article we’ll discuss this friction between ...
Read More
|
The average workday of IT admins are chock full of tasks and to-dos. With IT infrastructure now being more critical to businesses than ever, IT admins are in demand. So, the value of everything they do must be analyzed and understood, especially from an executive’s perspective. Thankfully, the benefits of user management can be easily ...
Read More
|
via Doug Cameron, reporting for The Wall Street Journal, comes a well-crafted artificial intelligence screed(paywall) that just might have a truly positive impact. Targeting wildfires in Califormia, the DoD will swing it's massive research and development apparatus targeting the devastation left by these fires. Now, if the Department can just develop software looking for incompetent ...
Read More
|
Below you will find the most recent trends we are seeing the market worldwide. You can also check out the highlights from previous reports below ...
Read More
|
The best IT admins are always looking for ways to step-up their network security. One of the most impactful measures is to segment your network and control traffic via VLAN (virtual local area network) tagging. But if you’ve never segmented a network before and you don’t know what VLAN tagging is or why it’s important, ...
Read More
|
Authored by: Luigino Camastra, Jan Širmer, Adolf Středa and Lukáš Obrdlík ...
Read More
|
What is Azure® AD (Active Directory®? Is it a cloud alternative to Microsoft®’s leading on-prem directory service, Active Directory? What can Azure AD do? If you’ve been asking these questions, you’re not alone. Microsoft has confused a number of IT admins with its naming of Azure Active Directory, and many can’t help but initially think ...
Read More
|
via the comic delivery system monikered Randall Munroe at XKCD! ...
Read More
|
Our latest technical blog from the Onapsis Research Labs provides details about securing SAP clients. SAP, SAP Security, sap clients, s4hana, HANA, netweaver, ABAPResearchLaura Cabrera02/15/2019 ...
Read More
|
Hackers are exploiting vulnerabilities in a WordPress plug-in that was patched months ago without being publicly announced. A different vulnerability has been found in the same plug-in during a recent forensic investigation and has now been patched. In late January, security researchers from security firm Defiant investigated a compromised website built on WordPress for a ...
Read More
|
Security Boulevard
Why secure WiFi? Resulting from the IT network’s move from wired ethernet connections to WiFi, many IT admins and MSPs have been uneasy about security. The tradeoff between security and convenience has been no more apparent than in this shift from wired to WiFi network connections. WiFi presents IT admins with a great deal of ...
Read More
|
Loading...