Cybersecurity
Open Source Does Not Equal Secure
Way back in 1999, I wrote about open-source software: First, simply publishing the code does not automatically mean that people will examine it for security flaws. Security researchers are fickle and busy ...
The Critical Role of Network Detection and Response in Improving Enterprise Security [Q&A with Vito Rallo of PwC]
Vito Rallo is Director of Cyber Incident and Threat Management at PwC. He and his team provide offensive security and incident and threat management services to medium and large enterprises. Prior to ...
Security and COVID-19: Securing the New Normal
The year 2020 is likely to go down in history as one of the most memorable and pivotal periods in generations, due to the COVID-19 pandemic that has affected everyone and everything ...
How a Healthcare Leader Unlocked the Secret to Exceptional Patient Care
Technology is transforming the way healthcare organizations deliver patient care. As people continue to hold their… The post How a Healthcare Leader Unlocked the Secret to Exceptional Patient Care appeared first on ...
VMware Horizon Architecture: Planning Your Deployment
What is VMware Horizon? Virtual desktop infrastructure (VDI) products like VMware Horizon enable IT departments to run desktop applications and virtual machines in the data center or cloud, and deliver these desktop ...
Holiday Shopping Scams and Tips to Stay Safe
In our November monthly episode we discuss the scams that you may encounter this holiday shopping season due to the pandemic and our top tips on how to stay safe and more ...
Cyber Thieves are Shopping for You Online
For those of us who partake in holiday shopping, we will be making our purchases... The post Cyber Thieves are Shopping for You Online appeared first on Gurucul ...
Amazon Sidewalk, Federal IoT Security Law, Facebook Messenger Bug
In episode 149 for November 30th 2020: Police begin to pilot a program to live-stream Amazon Ring cameras, new details about Amazon Sidewalk, Congress unanimously passes a federal Internet of Things security ...
DevSecOps: 4 Reasons You Need One
Those familiar with the world of software and application development are probably aware of the concept of DevOps. But what about DevSecOps? DevSecOps essentially adds another layer to the process by combining ...
IT security under attack blog series: Instant domain persistence by registering a rogue domain controller
In this blog in the IT security under attack series, we will learn about an advanced Active Directory (AD) domain controller (DC) attack to obtain persistence in AD environments. Dubbed DCShadow, this ...

