Small, fast and easy. Pick any three.

Small, fast and easy. Pick any three.

By Seth Hall, Co-Founder & Chief Evangelist, Corelight Zeek has been the darling of security defenders looking to get deep visibility into network traffic. Over the last two decades, Zeek has become ...
Apple Notarized Malware by Mistake, Hackers Ran it Through Third-Party Website

Apple Notarized Malware by Mistake, Hackers Ran it Through Third-Party Website

Notarized apps should be safe on macOS Threat actors try to deploy “approved” malware through website Apple revoked certificates, but malware is still up Apple’s notarization system let a piece of malware ...
Linux

How to Choose Linux Kernel Live Patching Software

In 1991, two unrelated events occurred, each the promise of two very different kinds of freedom: the death of the Cold War and the birth of Linux. Kernel live patching arrived in ...
Security Boulevard
application

Why CISOs Should Own Application Rationalization

Reducing overlap and mitigating potential security gaps are just two reasons why application rationalization is a sound strategy A major cybersecurity concern many organizations and executives may not be aware of but ...
Security Boulevard
cloud security

4 Best Practices for Securing Your Open Source Components

The post 4 Best Practices for Securing Your Open Source Components appeared first on CCSI ...
Thirty-four Years in IT - Addressing Application Security (Part 7)

Thirty-four Years in IT – Addressing Application Security (Part 7)

| | career, security, software
In the 2008-2009 period, we finally started to seriously address application layer security in our development group.By that time is was clear that the threat to hosted applications had moved up the ...
Top 25 Most Dangerous Vulnerabilities, Smart City Privacy, DuckDuckGo vs. Google Search

Top 25 Most Dangerous Vulnerabilities, Smart City Privacy, DuckDuckGo vs. Google

In episode 94 of our monthly show for November 2019: The 25 most dangerous vulnerabilities, the privacy of new “smart cities”, and which search engine keeps your searches more private? It’s DuckDuckGo ...
IoT security

A Closer Look at IoT Security Solutions

IoT security looms large as more companies embrace transformational technologies Companies looking to get the most out of their mobile solutions typically employ the help of app developers, who can help in ...
Security Boulevard
Thirty-four Years - Networking and Software Development (Part 2)

Thirty-four Years – Networking and Software Development (Part 2)

| | career, software
At the college we were extremely fortunate to have a president who had a very forward looking view of technology. In the mid 1980s he was already using personal computers regularly and ...