software
Small, fast and easy. Pick any three.
By Seth Hall, Co-Founder & Chief Evangelist, Corelight Zeek has been the darling of security defenders looking to get deep visibility into network traffic. Over the last two decades, Zeek has become ...
Apple Notarized Malware by Mistake, Hackers Ran it Through Third-Party Website
Notarized apps should be safe on macOS Threat actors try to deploy “approved” malware through website Apple revoked certificates, but malware is still up Apple’s notarization system let a piece of malware ...
How to Choose Linux Kernel Live Patching Software
In 1991, two unrelated events occurred, each the promise of two very different kinds of freedom: the death of the Cold War and the birth of Linux. Kernel live patching arrived in ...
Why CISOs Should Own Application Rationalization
Reducing overlap and mitigating potential security gaps are just two reasons why application rationalization is a sound strategy A major cybersecurity concern many organizations and executives may not be aware of but ...
4 Best Practices for Securing Your Open Source Components
The post 4 Best Practices for Securing Your Open Source Components appeared first on CCSI ...
Thirty-four Years in IT – Addressing Application Security (Part 7)
In the 2008-2009 period, we finally started to seriously address application layer security in our development group.By that time is was clear that the threat to hosted applications had moved up the ...
Top 25 Most Dangerous Vulnerabilities, Smart City Privacy, DuckDuckGo vs. Google
In episode 94 of our monthly show for November 2019: The 25 most dangerous vulnerabilities, the privacy of new “smart cities”, and which search engine keeps your searches more private? It’s DuckDuckGo ...
A Closer Look at IoT Security Solutions
IoT security looms large as more companies embrace transformational technologies Companies looking to get the most out of their mobile solutions typically employ the help of app developers, who can help in ...
Thirty-four Years – Networking and Software Development (Part 2)
At the college we were extremely fortunate to have a president who had a very forward looking view of technology. In the mid 1980s he was already using personal computers regularly and ...
3 things finance professionals need to know about the GDPR
Are you part of an in-house finance team? Or do you work for a finance provider – an accountancy firm, perhaps, or a financial advisory company? Like professionals in any other sector, ...

