Hackathon: Authenticating header-based apps

| | Uncategorized
One of the most exciting things about working at a startup is influencing how the company grows over time. Strata’s CEO loves it when people tell him something is impossible, and that ...
News alert: Simbian launches with $10M to build autonomous, GenAI-powered security platform

News alert: Simbian launches with $10M to build autonomous, GenAI-powered security platform

Mountain View, Calif. – April 11, 2024 – Simbian today emerged from stealth mode with oversubscribed $10M seed funding to deliver on fully autonomous security. As a first step towards that goal, the company is introducing the industry’s ...

Backdoor in XZ Utils That Almost Happened

Last week, the internet dodged a major nation-state attack that would have had catastrophic cybersecurity repercussions worldwide. It’s a catastrophe that didn’t happen, so it won’t get much attention—but it should. There’s ...

Securing APIs through penetration testing

| | Uncategorized
APIs (Application Programming Interfaces) have become the backbone of many modern applications, and indeed the foundation of some businesses services. APIs enable seamless communication between applications, services and systems, allowing... The post ...
A laptop with a cloud computing illustration on the screen, placed on a desk with a cityscape in the background. Keyword.

Managing identity in a merger, acquisition or divestiture

| | Uncategorized
5 best practices to smoothly transition identity providers from an acquired company Mergers and acquisitions (M&A) are crucial in growing and expanding businesses. M&As have benefits that include increasing market share, diversifying ...

US Cyber Safety Review Board on the 2023 Microsoft Exchange Hack

US Cyber Safety Review Board released a report on the summer 2023 hack of Microsoft Exchange by China. It was a serious attack by the Chinese government that accessed the emails of ...

xz backdoor Part 2: On the Importance of Runtime Security in the Age of OSS Backdoors

| | Uncategorized
... Read more » The post xz backdoor Part 2: On the Importance of Runtime Security in the Age of OSS Backdoors appeared first on Deepfactor ...
The importance of a post-penetration test action plan

The importance of a post-penetration test action plan

| | Uncategorized
As cyber threats continue to evolve and become more sophisticated, businesses must stay one step ahead in protecting their sensitive data and network infrastructure. Penetration testing is an essential tool... The post ...

XZ Utils Backdoor

The cybersecurity world got really lucky last week. An intentionally placed backdoor in XZ Utils, an open-source compression utility, was pretty much accidentally discovered by a Microsoft engineer—weeks before it would have ...

Declassified NSA Newsletters

Through a 2010 FOIA request (yes, it took that long), we have copies of the NSA’s KRYPTOS Society Newsletter, “Tales of the Krypt,” from 1994 to 2003. There are many interesting things ...