Blog
Celebrating 20 Years of Cybersecurity Excellence
The post Celebrating 20 Years of Cybersecurity Excellence appeared first on Digital Defense, Inc ...
My top 5 videos of the year
Following on from last weeks post in which I summed up my top 5 blogs of the year, the sequel that one person asked me for was, what were the most watched ...
A Holistic Approach to Kubernetes Security and Compliance
Taking a holistic approach to security and risk is essential for any organization that uses Kubernetes or other cloud based container platform. As an open source container orchestration system for automating deployment, ...
UTSA Endowment for Cybersecurity and Software Engineering Students
The post UTSA Endowment for Cybersecurity and Software Engineering Students appeared first on Digital Defense, Inc ...
The Critical Role of Network Detection and Response in Improving Enterprise Security [Q&A with Vito Rallo of PwC]
Vito Rallo is Director of Cyber Incident and Threat Management at PwC. He and his team provide offensive security and incident and threat management services to medium and large enterprises. Prior to ...
CVE-2020-13769: SQL Injection in Ivanti Endpoint Manager
Virsec Security Research Lab Vulnerability Report The Virsec Security Research Lab, helmed by Virsec CTO, Satya Gupta, provides timely, relevant analysis about prevalent security vulnerabilities. 1.1 Vulnerability Summary LDMS/alert_log.aspx in Ivanti Endpoint ...
Featured Use Case: Why a Large US Utility Company Turned to MixMode to Address Utility Grid Vulnerabilities
A large utility company approached MixMode with the following scenario: The enterprise SOC was utilizing a shared SIEM application that was being utilized by several stakeholders: the networking team, the SCADA team, ...
CVE-2020-17040: Authentication Bypass in Windows Hyper-V Security Feature
Virsec Security Research Lab Vulnerability Report The Virsec Security Research Lab, helmed by Virsec CTO, Satya Gupta, provides timely, relevant analysis about prevalent security vulnerabilities. 1.1 Vulnerability Summary Windows Hyper-V Security Feature ...
Drupal Core: Behind the Vulnerability
As you may recall, back in June, Checkmarx disclosed multiple cross-site scripting (XSS) vulnerabilities impacting Drupal Core, listed as CVE-2020-13663, followed by a more technical breakdown of the findings in late November ...
The U.S. Government is Creating Security Standards for IoT Devices
A new Internet of Things bill directs NIST to create minimum cybersecurity standards for IoT devices owned or controlled by the U.S. government. The post The U.S. Government is Creating Security Standards ...

