Celebrating 20 Years of Cybersecurity Excellence

Celebrating 20 Years of Cybersecurity Excellence

The post Celebrating 20 Years of Cybersecurity Excellence appeared first on Digital Defense, Inc ...
Social Distance Club

My top 5 videos of the year

| | Blog, video
Following on from last weeks post in which I summed up my top 5 blogs of the year, the sequel that one person asked me for was, what were the most watched ...

A Holistic Approach to Kubernetes Security and Compliance

| | Blog
Taking a holistic approach to security and risk is essential for any organization that uses Kubernetes or other cloud based container platform. As an open source container orchestration system for automating deployment, ...
™

UTSA Endowment for Cybersecurity and Software Engineering Students

The post UTSA Endowment for Cybersecurity and Software Engineering Students appeared first on Digital Defense, Inc ...

The Critical Role of Network Detection and Response in Improving Enterprise Security [Q&A with Vito Rallo of PwC]

Vito Rallo is Director of Cyber Incident and Threat Management at PwC. He and his team provide offensive security and incident and threat management services to medium and large enterprises. Prior to ...

CVE-2020-13769: SQL Injection in Ivanti Endpoint Manager

Virsec Security Research Lab Vulnerability Report The Virsec Security Research Lab, helmed by Virsec CTO, Satya Gupta, provides timely, relevant analysis about prevalent security vulnerabilities. 1.1        Vulnerability Summary LDMS/alert_log.aspx in Ivanti Endpoint ...

Featured Use Case: Why a Large US Utility Company Turned to MixMode to Address Utility Grid Vulnerabilities

A large utility company approached MixMode with the following scenario: The enterprise SOC was utilizing a shared SIEM application that was being utilized by several stakeholders: the networking team, the SCADA team, ...

CVE-2020-17040: Authentication Bypass in Windows Hyper-V Security Feature

Virsec Security Research Lab Vulnerability Report The Virsec Security Research Lab, helmed by Virsec CTO, Satya Gupta, provides timely, relevant analysis about prevalent security vulnerabilities. 1.1        Vulnerability Summary Windows Hyper-V Security Feature ...
Drupal Core: Behind the Vulnerability

Drupal Core: Behind the Vulnerability

As you may recall, back in June, Checkmarx disclosed multiple cross-site scripting (XSS) vulnerabilities impacting Drupal Core, listed as CVE-2020-13663, followed by a more technical breakdown of the findings in late November ...
The-US-Govt-is-Creating-Standards-for-IoT-Devices-Blog-Featured

The U.S. Government is Creating Security Standards for IoT Devices

A new Internet of Things bill directs NIST to create minimum cybersecurity standards for IoT devices owned or controlled by the U.S. government. The post The U.S. Government is Creating Security Standards ...