Uncategorized
Open Source Does Not Equal Secure
Way back in 1999, I wrote about open-source software: First, simply publishing the code does not automatically mean that people will examine it for security flaws. Security researchers are fickle and busy ...
What Does a Unified Security Strategy in the Public Cloud Look Like?
Gain insight about how to build a unified security strategy across large network organizations and how to translate it to the public cloud The post What Does a Unified Security Strategy in ...
Understanding the 2019 Capital One Attack
Learn about how the Capital One attack was carried out, why Web Application Firewalls failed to prevent the attack, and how the attack could have been prevented. The post Understanding the 2019 ...
Moving from Threat Hunting to Threat Catching
The goal of a Threat Hunter is to find an attacker in the middle of an attack before they can cause damage. This entails hunting through thousands of requests trying to pick ...
Impressive iPhone Exploit
This is a scarily impressive vulnerability: Earlier this year, Apple patched one of the most breathtaking iPhone vulnerabilities ever: a memory corruption bug in the iOS kernel that gave attackers remote access ...
Manipulating Systems Using Remote Lasers
Many systems are vulnerable: Researchers at the time said that they were able to launch inaudible commands by shining lasers — from as far as 360 feet — at the microphones on ...
90% of Companies Faced Increased Cyberattacks During COVID-19
A recent global study by Tanium of 1,000 CXOs reported on the effects of COVID-19 on enterprise and government organizations. 90 percent of those surveyed said they experienced an increase in cyberattacks ...
Undermining Democracy
Last Thursday, Rudy Giuliani, a Trump campaign lawyer, alleged a widespread voting conspiracy involving Venezuela, Cuba, and China. Another lawyer, Sidney Powell, argued that Mr. Trump won in a landslide, the entire ...
Does AD CS Work in the Cloud?
Digital certificates have taken over as the preferred method of network authentication because of their proven superiority to passwords in security and user experience. Many organizations recognize this and want to take ...
What’s the Difference between RADIUS, TLS, and EAP-TLS?
There are many components involved in running a secure network. It’s very easy to get bogged down by different terminology and be confused on what exactly each component does. This is especially ...

