Keynote: 25 Years in AppSec: Looking Back, Looking Forward - Adam Shostack

OWASP® Global AppSec US 2021 Virtual – Aakash Shah’s ‘Why Checking Your Infrastructure-As-Code For Misconfigurations Is Not Enough, How To Secure Your Cloud Native Applications’

Our thanks to both the OWASP® Foundation and the OWASP Global AppSec US 2021 Virtual Conference for publishing their well-crafted application security videos on the organization’s’ YouTube channel. Permalink ...
Biden cybersecurity maritime China

Teleport Adds Windows Support to Infrastructure Security Gateway

Teleport today announced that the open source Teleport Access Plane it created to provide IT teams with identity-based access to IT infrastructure is now available for both Windows Desktop and Windows Server ...
Security Boulevard
threat-hunting program. threat hunting, teams, intelligence, Edge Devices data threats IT cybersecurity defense attack alerts machine identity management insider threats security phishing Cybersecurity Threats on the Rise

Cisco Survey Surfaces Legacy Infrastructure Security Challenges

A global survey of 5,123 active IT, security and privacy professionals conducted by YouGov on behalf of Cisco found well over a third of organizations (39%) are relying on what they consider ...
Security Boulevard
budget

The Economic Shutdown’s Impact on Security Budgets

Cybersecurity spending, even if only driven by industry and government regulatory compliance mandates, has proven itself to be relatively resilient through previous downturns. Will this downturn prove different? Toward the end of ...
Security Boulevard
The True Danger To North America: Unmanaged & Embedded Infrastructural Technical Debt

The True Danger To North America: Unmanaged & Embedded Infrastructural Technical Debt

via Alexis C. Madrigal - writing for The Atlantic - comes this prescient piece, targeting technical debt within the United States's physical infrastructure. Quite likely, the single , most dangerous and looming ...

ITproportal feature: How penetration testing can help secure your company’s infrastructure

Infrastructure security is a top priority for all IT managers. Organisations must be proactive in locating network vulnerabilities and resolving them, in order to prevent attacks that can cause system downtime, data ...
Tunguska Event.jpg

When a Tree Falls in St. Louis, Will the Power Go Out?

A superlative bit of combinatorial scholarship coming out of St. Louis University, where Sean Hartling, Vasit Sagan, Paheding Sidike, Maitiniyazi Maimaitijiang and Joshua Carron have lashed-up geospatial sciences, machine learning, UAVs, and ...

Shmoocon 2019, Adam Everspaugh’s ‘Un-f*$#ing Cloud Storage Encryption’

Source Credit: Shmoo Con 2019 at Archive.org, also available at 0xdade's YouTube Channel. Enjoy! Permalink ...

ZeroNights 2018, Alexandre Gazet’s, Fabien (0xf4b) Perigaud’s & Joffrey (@_Sn0rkY) Czarny’s ‘Turning Your BMC Into A Revolving Door’

From The Video Description: "Unmonitored and unpatched BMC (remote administration hardware feature for servers) are an almost certain source of chaos. They have the potential to completely undermined the security of complex ...
  Photo Credit: Vincent-Ferron

A New Way In: The Cloudflare IPFS Gambit

Photo Credit: Vincent-Ferron Dependent - of course - on your point-of-view - i.e, whether you are on the IPFS Hypermedia File System construct, or not. Intrigued? I was, hence the designation of ...